Computer Science
[ORDER SOLUTION] Practical Cryptanalytic Attacks
Write 400600 words that respond to the following questions: Explain with example the practical cryptanalytic attacks on 3DES.Is it possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and counter modes? If yes, how. If not, why not?
[ORDER SOLUTION] IT Infrastructure Security Design
1. Using the IT infrastructure security design you created in Module 1, list the five highest risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers. Include the reasons why you chose each of the five risks. 2. The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk. Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose. Include your reason why you chose the strategy for each of the five risks.2. The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk. Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose. Include your reason why you chose the strategy for each of the five risks.
[ORDER SOLUTION] Blockchain
This week’s discussion centres around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not. Please discuss your explanation of Blockchain to include why it has been gaining so much popularity. – 275 words Resources: WALDO, J. (2019). A Hitchhikers Guide to the Blockchain Universe. Communications of the ACM, 62(3), 3842. https://doi.org/10.1145/3303868
[ORDER SOLUTION] Computer Security
Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.htmlhttps://www.lifewire.com/learn-how-antivirus-4102748 http://www.sans.org/newsletters/http://news.cnet.com/security/https://www.onlinesecurity.com/news-publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
[ORDER SOLUTION] User Domain Policies
Topic: Pick two best practices for User Domain Policies and explain what they are and provide examples of what could go wrong in an organization if these best practices are not followed. Instructions 1) APA format 2) References3) Body Citations 4) No Plagiarism 5) 350 words 6) 2 responses (every 150 words).Response#1(Venkatesh): 1. access Control Policy. Access control is an approach that guarantees users’ identity and that they are authorized to access the organizations data and information. Johnson and Merkow (2010) believe that the access control policy summarizes the controls on physical access to the information system and software to limit unauthorized access to sensitive data and computer networks. The policy ensures that the users have only access to what they require to perform their daily activities. According to Peltier (2016), this will define clearly that they should do the work that they have been scheduled for. Any additional activities that are not authorized should be considered against the user domain policy. 2. Password Policy Peltier (2016) defines a password policy as a set of rules and regulations that administrators develop to strengthen computer security by promoting the proper use of strong passwords. A password policy is mainly an official rule of a business that is taught as an aspect of security awareness training. Johnson and Merkow (2010) suggest that password policies enable users to establish the configuration, as well as the complexity of the appropriate passwords to apply in computer software. Business leaders can either develop advanced policies or utilize the present policies to fulfill organizational needs and requirements. Johnson and Merkow (2010) suggest that this will ensure that the users have their login credentials and that they do not share them with anyone else. Also, it will maintain the security of the domain, preventing access to other user’s information. If access control and password policies are not followed in an organization, then there could be no data or information security in the organization. Reponse#2(Aditya) Humans are considered as the weakest link in IT security and hence they should follow implemented security practices to minimize threats to the organizations. Two of those security practices arePassword practices According to a study conducted by the Ponemon Institute, negligent employees are the number one reason for data breaches accounting to 24% (Ekran, 2020). Not having strong or unique passwords coupled with the increase in the Internet of Things (IoT) is a recipe for disaster. Password protection is also a security issue. If the employees carelessly leave their passwords on a keyboard by simply writing them on a sticky note can lead to cybersecurity incidents. Hence, employees should make sure to have strong passwords on every device they use inside the organization and should also store them securely. Access control practices Maintaining adequate physical security should be a top priority for every organization. Unauthorized physical access can lead to data theft and theft of property including hard drives or USB sticks. Hence, organizations should implement access control practices to keep employees from accessing areas they are not supposed to. Enforcing the use of smart cards, fobs, password-protected computers and networks are some of the forms of access control practices.
[ORDER SOLUTION] COVID-Data Analysis
This is for Course Data Mining and Please write aboutCOVID – Data analysis in China and South Korea *( 1 page)COVID – Data analysis in Europe *(1 page)COVID – Data analysis in US * (2 pages)
[ORDER SOLUTION] Importance of Technology in An Organization
This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. As a Senior IT Project Manager, your responsibilities may include proficiently working with a variety of technologies, conduct meetings with stakeholders, create and forecast budgets, and design project plans. The CFO of your chosen organization wants the organization to purchase and integrate six new web servers. The CIO envisions more business travelers using the Web to purchase airline tickets and reserve rental cars and hotel rooms for business trips. The expansion of your company’s web capacity is needed. Research information about your chosen organization to complete this week’s assignment. Create a 3- to 5-page Request for Proposal (RFP) in Microsoft® Word for the CIO, which will minimize procurement-related risks for this project. The RFP should contain the following components: Purpose of the RFPOrganization’s background as it applies to the use of the request for new webserver analysis of procurement risk methods for managing procurement riskBasic requirements for the current and new hardware and software and hardware environment Statement of work/Requirements and schedule information Process for evaluating the RFP
[ORDER SOLUTION] SWOT and Linear Regression
Unit 1 Assignment: SWOT and Linear Regression Outcomes addressed in this activity: Unit Outcomes: types of risks in order to prioritize them. Distinguish the difference between risks and issues. Explain the root causes and consequences of risk. Course Outcome: IT528-1: Enumerate common types of risks and their potential ramifications for modern business. Purpose The purpose of this assignment is to practice developing a SWOT analysis to identify and plan for risk mitigation and then to prepare a linear regression model in R® that will address that risk. You will be expected to complete both a SWOT analysis and a linear regression model in this assignment.AssignmentInstructionsComplete the following steps: In a Microsoft® Word® document, create a SWOT table for the following scenario: Home & Hearth is an American company that distributes heating oil for homes in rural areas across the country. These homes are remote enough that they cannot connect to natural gas services that are a normal part of town and city life. They must purchase heating oil to be delivered to their properties by truck, usually once or twice a month, though sometimes more frequently in colder months. Home & Hearth has been delivering heating oil to such homes all across America since in 1976. The company has a strong network of suppliers of crude oil, and owns its own refineries in eight regional locations around the country to process the crude into heating oil. Although it has more than forty years of experience, the company has been caught off guard from time to time with too little crude oil on-hand when demand for their heating oil has increased, sometimes due to new accounts, sometimes due to harsher or longer than expected winters in some areas. When winters are short or mild, the company is sometimes left with tens of thousands of gallons of crude or refined heating oil on-hand. Heating oil can turn rancid (unusable) if it is not used within a few months, though there are some preservation techniques that can extend the shelf life of heating oil by refrigeration. The price of oil seems to be changing all the time, which frustrates the companys management as well. Over the years of their existence, oil-burning stoves, furnaces, and hot water tanks have also become much more efficient, and the technology continues to improve. As cities and towns across America have continued to grow, some of their customers have gained access to natural gas hookups, but the company has also seen an influx of new customers moving to the country to escape the congestion and bustle of more metropolitan areas. Note that although there is no hard-and-fast number of items, the paragraph gives enough information that every quadrant of your SWOT table should have at least two items, and could have more depending on your research and knowledge of the energy industry and supply chain concepts. Your lists should include both risks and issues Home & Hearth faces and should distinguish between them. Download the HeatingOil.csv data set file from Course Documents. Import it into using this command: HeatingOil <- read.csv(file.choose(), header=T)Create a linear regression model to predict heating oil usage based on the other variables in the data set. Place a screenshot of your linear regression model into your Word document. Write an interpretation of the predictive ability of your model and independent variables, with specific attention paid to independent variable coefficients and p-values. Conduct research about the energy industry, focusing specifically on SWOT/risks this industry faces. Write a summary of how your linear regression model could help Home & Hearth respond to risk. Contextualize your summary using the research that you found. You should cite a minimum of five sources. These should be related to SWOT, linear regression, and/or risk management in the energy sector. Do not cite the data set or the course textbook. Assignment Requirements Prepare your Assignment submission in Microsoft Word following standard APA formatting guidelines: Double spaced, Times New Roman 12-point font, one inch margins on all sides. Include a title page, table of contents and references page. You do not need to write an abstract. Label all tables and figures. Cite sources appropriately both in the text of your writing (parenthetical citations) and on your references page (full APA citation format).
[ORDER SOLUTION] Business Information System Analysis
Conduct business information systems needs analysis. Include the following in your needs analysis: Review current technologies what do you have and what do you need? Consider the desired outcome how will the organization change over the next several years and what need must be fulfilled? Determine options and alternatives can you update or upgrade existing systems and remain compatible with other systems, must you buy new systems, or can you create solutions internally? Recommend a solution what is the best choice given the options and alternatives available? Decide how to measure the effectiveness of the recommended solution how will you know it worked? Evaluate resources what are the costs in time, money, and productivity for the recommended solution for equipment, training, implementation, etc. Write a 1- to 2-page summary of your analysis. Create a 1-page systems change management template for the business information system from your needs analysis. Include the following in your change management template: How to request system changes documenting change requests, approvals, and details scope of the change sponsor implementation of changes including communication, training, submit your analysis summary and change management template.
[ORDER SOLUTION] Budget Analysis for a Fictitious Business
For this assignment, you will create a budget analysis for a fictitious business of your choice utilizing the Microsoft® Excel® application. You will input your own unique business data into an Excel spreadsheet, calculate various values obtained from your data, and then utilize the calculated values to create a column-style chart. The purpose of this assignment is for you to be exposed to best practices for utilizing a spreadsheet software application (e.g., Excel). In Row 1, type your worksheet title in bold font (e.g., ‘My Business’ Budget). Leave Row 2 empty. In Row 3, beginning with Column B, label the cells in three consecutive columns (B3, C3, D3) with the names of the three months of any yearly quarter (i.e., Jan, Feb, Mar) in bold font. Label the cells in the next three consecutive columns (E3, F3, G3) with the following: ‘Qtrly Total,’ ‘Qtrly Average,’ and ‘Qtrly Maximum’ in bold font. In Row 4 in Column A (Cell A4), label the cell ‘Income’ in bold font. List two sources of income in Column A in the rows immediately following ‘Income’ in a non-bold font (Cells A5, A6). In Row 7 in Column A (Cell A7), label the cell ‘Total Income’ in bold font. Leave Row 8 empty. In Row 9 in Column A (Cell A9), label the cell ‘Expenses’ in bold font. List four expenses in Column A in the rows immediately following ‘Expense’ in a non-bold font (Cells A10, A11, A12, A13) (e.g. Rent, Utilities, etc.). In Row 14 in Column A (Cell A14), label the cell ‘Total Expenses’ in bold font. Leave Row 15 empty. In Row 16 in Column A (Cell A16), label the cell ‘Net Income’ in bold font. Apply bottom border lines just above Total Income and Expense. 1) Determine the ‘Total Income’ values and ‘Total Expenses’ values using the ‘SUM’ function. Use ‘cell ranges’ to input data into the formulas. For example, input data using a ‘cell range’ format such as ‘B10:B13,’ not ‘B10+B11+B12+B13.’ 2) Determine the ‘Qtrly Total,’ ‘Qtrly Average,’ and ‘Qtrly Maximum’ values for each source of income and each expense using the ‘SUM,’ ‘AVERAGE,’ and ‘MAX’ functions. Use ‘cell ranges’ to input data into the formulas. For example, input data using a ‘cell range’ format such as ‘B5:D5,’ not ‘B5+C5+D5.’ 3) Determine the ‘Net Income’ values in columns B through D for the three month periods using subtraction formulas (Total Income – Total Expenses). 4) Apply the Accounting Number formatting to add dollar signs and limit to two decimal places. 5) Create a Chart Create a two-dimensional ‘column-style’ chart for the quarterly period once you have completed entering the budget data into your worksheet. Provide only the ‘Net Income’ values in cells B16, C16, and D16 in the chart. Provide a unique chart title and appropriate axes titles. Provide the ‘Month’ category data on the X-axis (horizontal). Provide the ‘Net Income’ value data on the Y-axis (vertical). Provide the monthly ‘Net Income’ data values at the top of each column.
Use Promo Code: FIRST15