week 2

Write a 1 to 2 page paper explaining the need for large prime numbers in the cybersecurity field. 

  • Use APA format
  • be sure to cite your sources
  • if you rephrase what you find on line be sure to cite the source

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

545dis4

275 words apa 2 sources

Research and discuss a recent example on one of the following attacks: brute-force, buffer overflow, content spoofing, credential/session prediction, cross-site scripting, cross-site request forgery, denial of service, format string, fingerprinting, HTTP response smuggling, HTTP response splitting, HTTP request smuggling, HTTP request splitting, integer overflows, or LDAP injection.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Management Systems

 I need an introduction and two main discussions with proper references and citations for the following topic: needed 700 words.

We all had the unfortunate experience of seeing how computers can, at times, make life’s journey about more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly implemented database that you’ve encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Short Research Paper

Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research.  Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment.  If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hi shasha

AS discussed 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

First Assignment (Worth 20 points)

Develop a survey of at least ten questions to find user requirements for the best possible smart telephone (one capable of both making and answering calls, and of running apps). Distribute your survey to at least five people you know, and produce a set of requirements from their answers. Indicate what additional requirements would remain to be determined. Submit your survey, the five sets of answers, your summary requirements, and your evaluation of what additional requirements remain to be specified, five people and get their answers.  

Submission for this Assignment:

1.  Your questionaire

2.  The five or more sets of answers

3.  Your summary requirements

4.  Your list of what additional requirements would be needed.

Check the powerpoint incase for help, also please ask me questions if you don’t understand something.

Thank You (:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

The following are the deliverables for this project:

Deliverables

  1. Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. Enterprise Key Management Policy: A two- to three-page double-spaced Word document.
  3. Lab Report: A Word document sharing your lab experience along with screenshots.

There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

Step 1: Identify Components of Key Management

Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handling, and identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges

In the previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

Step 4: Provide Additional Considerations for the CISO

You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.

  1. Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using DES, triple DES, or other encryption technologies. To complete this task, review the following resources:
    1. Uses of encryption
    2. Hash functions
    3. types of encryption
    4. DES
    5. triple DES
  2. Describe the use and purpose of hashes and digital signatures in providing message authentication and integrity. Review these resources on authentication to further your understanding. Focus on resources pertaining to message authentication.
  3. Review the resources related to cryptanalysis. Explain the use of cryptography and cryptanalysis in data confidentiality. Cryptanalysts are a very technical and specialized workforce. Your organization already has a workforce of security engineers (SEs). Cryptanalysts could be added to support part of the operation and maintenance functions of the enterprise key management system. Conduct research on the need, cost, and benefits of adding cryptanalysts to the organization’s workforce. Determine if it will be more effective to develop the SEs to perform these tasks. Discuss alternative ways for obtaining cryptanalysis if the organization chooses not to maintain this new skilled community in-house.
  4. Research and explain the concepts and practices commonly used for data confidentiality: the private and public key protocol for authentication, public key infrastructure (PKI), the X.509 cryptography standard, and PKI security. Read about the following cryptography and identity management concepts: public key infrastructure and the X.509 cryptography standard.

Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Step 5: Analyze Cryptographic Systems

In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring. Independently research commercially available enterprise key management system products, discuss at least two systems and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness and efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

  • Security index rating
  • Level of complexity
  • Availability or utilization of system resources

Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

Step 6: Develop the Enterprise Key Management Plan

In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.

A possible outline could be:

  • Introduction
  • Purpose
  • Key Components
  • Implementation
  • Operation
  • Maintenance
  • Benefits and Risks
  • Summary/Conclusion

The following are the deliverables for this segment of the project:

Deliverables

  • Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  • Lab Report: A Word document sharing your lab experience along with screenshots.

Submit your plan to the Assignments folder.

After submission, complete the final step of writing the enterprise key management policy.

Step 7: Develop the Enterprise Key Management Policy

The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.

Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.

Review and discuss the following within the policy:

Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.

Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

The following is the deliverable for this segment of the project:

Deliverables

  • Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Science & Big Data Analy (ITS-836-30) – Full Term

Q1:

1. How would you use GROUPING SETS to produce the same results as the following GROUP BY CUBE?

SELECT state, productID, SUM(volume) FROM sales GROUP BY CUBE (state, productID) ORDER BY state, productID

2. How would you show the sub totals for each week, for each state, and for each product? (No other totals or grand totals are required.) Suppose the table structure is

TABLE sales (productID VARCHAR, state CHAR(2), week DATE, volume INT)

3. Discuss the utility of grouping and group_id functions

Q2: Describe below how this code will work:

SELECT dt, region, revenue,
count(*) OVER (twdw) AS moving_count,
avg(revenue) OVER (twdw) AS moving_average
FROM moving_average_data mad
WINDOW twdw AS (PARTITION BY region
ORDER BY dt RANGE BETWEEN
‘7 days’::interval PRECEDING AND
‘0 days’::interval FOLLOWING
ORDER BY region, dt

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data mining Assignment

Write a minimum of 2.5 page paper that describes the basic concepts of Association Analysis. Also describe the market basket analysis with examples. Use Times 12 font, double space, with 1 inch margin. In addition to the 2.5 pages write-up, add answers to the following to your paper. For each of the following questions, provide an example of an association rule from the market basket domain that satisfies the following conditions. Also, describe whether such rules are subjectively interesting. Your answers should have detailed responses, failing which several points will be deducted. (a) A rule that has high support and high confidence. (b) A rule that has reasonably high support but low confidence. (c) A rule that has low support and low confidence. (d) A rule that has low support and high confidence. Note-1: for citations, use the following format: https://owl.purdue.edu/owl/research_and_citation/resources.html If any work is not cited or plagiarized, student will receive zero points for the Research paper. Note-2: If instructions of font size, margin and paper length are not followed, several points will be deducted.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario.

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

https://www.youtube.com/watch?v=T7_rQ-dOxeM&feature=emb_logo

https://www.youtube.com/watch?v=B8I9H5AHNCw&feature=emb_logo

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_footprinting.htm

https://learn-us-east-1-prod-fleet01-xythos.s3.us-east-1.amazonaws.com/5b75a0e7334a9/572491?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%274-CEHv9%2520Module%252002%2520Footprinting%2520and%2520Reconnaissance.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191220T235247Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20191220%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=55a9020b0039f48ed3a64185951893248d0fa3dcd092ba42046225eef19344b1

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now