RSA Encryption

1). Using the Web or other resources, write a brief paper about RSA encryption, its history, its methodology, and where it is used. 2). Send a brief message (ten words minimum) using the Caesar Cypher.

Read more

cyber security

Research Paper Assignment Guide English 101/Mr. Butler   Directions: Write a well-developed thesis-based essay that relates in some way to an interesting or critical aspect of your major or career goals. You may also select a topic that you feel passionate about, enough to warrant research and inquiry on a deeper level. This essay should be robust enough to require the use of secondary sources, but not be so complex that it cannot be adequately discussed in eight to ten pages.   You are required to use research to complete this assignment.  You must use a minimum of ten secondary, academic sources, and only two of them may be from the web.  Please notice that the “web” is a specific entity and does not include online journals and databases found via the college’s library. I highly recommend that you use HCC’s Library databases exclusively. You must pass this project to pass the course.   Rubric Content (65%) Grammar/Mechanics/MLA Style (35%) Minimum Requirements: 2,500 – 3,000 words (minimum range 8-10 pages, double spaced, 12 pt. font, Times New Roman, 1” margins) Project is clearly organized around a specific topic Uses formal diction and tone Introduction develops an appropriate technique to interest the reader In-text parenthetical documentation from at least 10 credible academic sources (preference is given to academic journal articles, but some books or websites can be used) Shows evidence of careful revision for clarity, grammar, and punctuation Works Cited page listing at least 10 sources cited in the paper   You will be evaluated on the following: Use of a thesis statement that clearly articulates purpose and point of view Your ability to incorporate secondary sources both grammatically and stylistically This includes your ability to use MLA format to cite sources within your text and use a Works Cited page The ability to use and cite quotations, paraphrases, and summaries of both primary text and secondary sources Use of an objective third person perspective (no more use of “I” or “you”) A meaningful introduction that clearly adds background to your paper’s purpose, leading to a thesis statement and a conclusion that adequately ends the paper A minimal number of spelling and grammatical errors   All graded assignments included in this paper are: 200 points – Research Paper 75 points Annotated Bibliography of minimum twelve sources 25 points Formal Outline   What is an Annotated Bibliography? An annotated bibliography is a list of sources found while conducting research on a topic.  During the research process, you will have to evaluate the effectiveness of your sources.  For your assignment, you must find a minimum of twelve sources that you document in correct MLA format and then write about two to three sentences explaining the usefulness of the source.  All of the sources you use for your annotated bibliography do not need to be cited in your final research paper.   What should a Formal Outline look like? You may choose any outlining style that works for you, but I highly recommend the style and format that appears below.    Formal Outline   I. Introduction: background information on the topic/why is it important?             A: sub-topic             B: sub-topic             C: sub-topic             D: thesis   II. Body Paragraph development – key points from the research (the “meat” of your paper)             A: Five paragraphs exploring subtopic A (then number 1-5 for each paragraph)             B: Four paragraphs exploring subtopic B (then number 1-4 for each paragraph)             C: Three paragraphs exploring subtopic C (then number 1-3 for each paragraph)   III. Conclusion: be sure to summarize the key/main points and then explain what was learned from the research             A: Restate thesis             B: Summary of subtopic A             C: Summary of subtopic B             D: Summary of subtopic C             E: Summative statements about topic as a whole/purpose             F: Final thoughts/explain importance of research and topic (can be multiple items)    

Read more

Social Networking and Cyber Warriors

Discuss how a cyber warrior can use a social networking site to gain information. General Requirements 1. Document Format. a. MS Word document b. One-inch (1″) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. Double space, except for your bibliography’s entries. g. You must use 5 scholarly sources in supporting this assignment. 2. Citation Format: The Chicago Manual of Style. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Chicago format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM. 3. Your essay is due Sunday at 11:55 PM of the week due.

Read more

Problematic User Experience/ Lacks Usability

What do you find wrong with this site? (5 reasons)  ?Think about: which of Nielsen’s heuristics are not adhered to?  Does the  site violate any or all of Mike Biggs’ quality standards?  Are there gulfs of  execution or evaluation?  Are there issues with visual hierarchy,  readability, contrast?  ?How would you fix the problem? You can address each issue or explain how  you would redesign the website as a whole

Read more

Networking Principles and Security Mechanisms

6. Explain how businesses apply cryptography in maintaining information security and describe networking principles and security mechanisms.  In your explanation, summarize in your own words using at least 15 sentences.  Include a current event (with link) in your answer to help answer the question and be sure to discuss how it relates to the question.

Read more

Linux Rootkits

Do some research on Linux LD_PRELOAD rootkits and specifically the Jynx2 rootkit. There are a lot of really good articles and analysis. Some of them can get very technical, so for those of you who want to dig down in the weeds, go for it! I’m giving plenty of time for this one so that you can take the research as far as you’d like.  After researching this topic, write a report with the following: Title page Table of Contents List of Figures (if necessary) Introduction – an overview of LD_PRELOAD rootkits (1 page/500 words max) Body – Specific to Jynx2 (minimum 2 pages, maximum 3 pages, approx 1000 – 1500 words) A section describing hiding techniques A section describing interaction with the rootkit (connection, transferring files, etc.) A section explaining detection of the rootkit Conclusion – how this relates to APT (1 page/500 words max) Glossary – define at least three technical terms References

Read more

 Linux Server and Linux Workstations

Compares and contrasts Linux server and Linux workstation OS products between three separate and distinct Linux distros (i.e., RedHat, SuSe, Ubuntu ); and Addresses the specific issues of total cost of ownership, training, support, performance, reliability, and application availability. Documentation, Editing, and Formatting A quality outline will be free of any spelling, punctuation, or grammatical errors. A quality outline will include a title page, appropriate sections based on a table of contents (TOC), proper citations, and a bibliography. It will conform to APA guidelines, including citations and references Organization and Cohesiveness A quality outline will include an introduction based on a well formed thesis statement. Sentences and paragraphs will be clear, concise, and factually correct. Content A quality outline will address requirements to compare and contrast both the server and workstation products from three different Linux vendors. A quality outline will identify the three specific vendors, along with their server and workstation products, that will be compared in the paper. Some references  Hess, K. (2008). The 10 Best Linux Distributions. Retrieved from: http://www.daniweb.com/hardware-and-software/linux-and-unix/news/219749/the-10- best-linux-distributions# .   Margulius, D. (2003). The Real Cost of Switching to Linux. Retrieved from:             http://www.computerweekly.com/feature/The-real-cost-of-switching-to-Linux   McPherson, A. (2008). Estimating the Total Cost of Linux Distribution. Retrieved from:             http://www.linuxfoundation.org/sites/main/files/publications/estimatinglinux.html   Taylor, D. (2018, January 09). The 5 best Linux distros for the enterprise: Red Hat, Ubuntu, Linux Mint and more. Retrieved May 24, 2020, from https://www.computerworld.com/article/3245645/the-5-best-linux-distros-for-work-red-hat-suse-ubuntu-linux-mint-and-tens.html   Perschke, S. (2017, October 23). 5 top Linux server distros: How to choose the right one. Retrieved from https://www.networkworld.com/article/3221385/5-top-linux-server-distros-how-to-choose-the-right-one.html   Morelo, B. D. (2018). RedHat Versus SUSE: The Battle of Enterprise Linux Distributions – Linux Hint. Retrieved from https://linuxhint.com/redhat-vs-suse/   T. (2014). Debian vs Ubuntu vs Fedora vs CentOS vs Mint vs Red Hat vs openSuse –  Linux OS Servers 2017. Retrieved from http://www.threehosts.com/ratings/comparison-software/linux-vs-ubuntu-vs-centos-fedora-vs-debian-vs-red-hat-vs-open-suse-vs-mint.html

Read more

Biometrics Assignment

Discuss 5 different types of biometric authentication methods AND their security issues, not disadvantages which are irrelevant to the assignment.  Use spell/grammar check. Give enough information for someone to understand your selections. Cite sources in APAv6 format.

Read more

Facts on Overclocking CPUs

Research Paper: Topic: Facts on overclocking CPUs and what it does, and history of overclocking. Can be 2-3 pages. Can have 1-3 sources. Deadline can be anytime on Nov. 12 or 13 2020

Read more

Security Assessment Report

Risk management plays a critical role in protecting an organization’s information and assets. It ensures companies continue to do their business in accordance with their mission while maintaining their responsibility to customers. The risk assessment process is outlined in the resources linked in the Study Materials section. Review the Security Assessment Report (see link below) for Acme Company For each vulnerability indicated in the report, discuss what an appropriate response would be. Your paper should be 750 to 1375 words (3 to 5 pages). double spaced. Support your response with at least two outside sources, and be sure to cite them using APA format. https://www.xervant.com/docs/Security%20Assessment%20Report%20Sample.pdf

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information