Article/Paper Review

 

Please review the article(s) and/or paper(s) with respect to “Web and Cloud Threats” and discuss the summery of the articles/papers (500 words or more).

You must provide all the citations/references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

POS/409 Individual: List Collections

 

Your software development company wants to continue developing and enhancing a software for internal use. The Software Development Company is now requesting that you change your data structure from an array to a .Net List.

For this week’s assignment, the application is required to read from a file (data.txt) containing employees’ data. Your tasks include:

  • Use the data file from the previous week (data.txt)
  • The C# data structure class/methods must demonstrate the use of object-oriented collections
  • Implement an employee record objects List Collection
  • Meet specifications by displaying on a Windows Form Application

Program Input File:

Using Visual Studio® and C# programming concepts, and using the previous data.txt file as your source file, write a program to meet the specifications of the company’s request. The program should have the following characteristics:

  • Compile and execute without errors
  • Meet specifications by demonstrating file handling, List Collection data structure manipulation, and Windows Form output mastery by accomplishing the following:
    • Read employees’ data from a file
    • Input the data into a List Collection data structure
    • Display the employees’ data on the console
  • Logic flow is clear, concise, and effective
  • User inputs and outputs should be clear on screen
  • Validation for input types and data format
  • Appropriate indentation to logically illustrate program structure
  • Identifiers logically describe use
  • Naming conventions are consistent
  • Comments and headers to explain processing that is not obvious

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

XML assignment

 

For this particular assignment complete the following instructions and submit the assignment.

Please see XML related web site: http://xmlglobal.com/blog2.html

Your assignment is to:

  1. create an XML file to hold data.  Your XML should have 4 or more different tags with data. 
  2. create the code and CSS to display the records individually on the screen with buttons to navigate
  3. create the code and CSS to display the records in a list on the screen
  4. create the code and CSS to display the records in groups on the screen with buttons to navigate

The create the code assignments should be separate programs with a lot of cutting and pasting involved, but never-the-less separate programs

What I need when you submit is the XML and the code for the three programs plus the addresses where I can execute.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advance Biostats SPSS Assignment: Multiple Logistic Regression in Action

Due 4/13/19 7 p.m Est

Be on time and Original work

Know SPSS

Data Attached

Step By Step Guide

 

Multiple logistic regression is a model that uses analysis of predictor variables to make predictions as to the likelihood of occurrences of an outcome.

For this Assignment, you use multiple logistic regression to analyze a dataset. You identify assumptions required by multiple logistic regression and evaluate whether they have been met by the data. Finally, you interpret your results and evaluate the use of multiple logistic regression.

The Assignment

Use the Wk 7 Dataset (SPSS document)

  1. Variables and variable selection 
    1. Use a table to list the variables, Sex, Age in Years, Serum Cholesterol, Obese, and Hypertension, and each of their levels of measurement. 
    2. Create new variables Age_Cat and Chole_Cat:
      • Age_Cat: Convert Age in Years into a categorical variable with 2 categories, Less than 40, 40 and greater
      • Chole_Cat: Convert Serum Cholesterol into 3 categories, Under 200, 200-299, and 300 and greater

Add the new variables to each record by coding the responses to the original variable using the assigned categories. Be sure that the variable view in SPSS has the correct information on the 2 new variables. 

  1. Simple Binary Logistic Regression 
    1. Use Hypertension as the dependent variable and Chole_Cat as the independent variable in the first model. Report the Odds Ratio and significance of the Odds Ratio for the relationship between the dependent and independent variables. 
    2. Use Hypertension as the dependent variable and Serum Cholesterol (the original variable) as the independent variable in the second model. Report the Odds Ratio and significance of the Odds Ratio for the relationship between the dependent and independent variables. 
    3. How does the level of measurement for the independent variable affect the outcome (include the OR and its significance in your response)? How does the level of measurement of the independent variable change your interpretation of the Odds Ratio? 
  2. Multivariate Logistic Regression 
    1. Run a multivariate binary logistic regression model using SPSS and Hypertension as the dependent variable, Chole_Cat, Age_Cat, Obese, and Sex as the Covariates. Include the output in your submission. 
    2. Identify the Odds Ratio and the significance of the Odds Ratio for each of the covariates. How has the relationship between Chole_Cat and Hypertension changed with the addition of the other variables (compare to the output from # 2a)? 
    3. Test the assumption that the model fits the data using the Hosmer-Lemeshow Goodness of Fit test. Interpret the Chi Square statistic given in the output of this test and state what it means in terms of the assumptions needed to use logistic regression with this data. 
    4. Rerun the logistic regression model from #3a and use the save function to create the following new variables: Predicted Probabilities, Deviance Residuals, and Cook’s Distance. Evaluate the model using these saved variables and the following Scatter Plots. 
      • Create a Scatter Plot of the Deviance Residuals (DEV) and the variable ID: Are there any outliers? What does this mean when evaluating your model?
      • Create a Scatter Plot of Cook’s Distance (COO) and the variable ID: Are there any influential cases? What does this mean when evaluating your model?
      • Create a Scatter Plot of Deviance (DEV) and the Predicted Probabilities (PRE). Discuss whether anything in this scatterplot could cause you some concern in terms of your model.

      

(NOTE FROM INSTRUCTOR) Not all information generated from a SPSS analysis (in SPSS output window) need to be transferred to your paper You need to select  (copy and paste) relevant tables and graphs only and use them in your assignment.

Also, as you know, explanation and interpretation for each graph or table needs to be placed by the table or graph. 

It is difficult for reader of your work to keep going back and forth between your analysis and interpretation if they are not side by side.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Questions on PhD IT

In the event that any outside resources are used, those should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. Applicants must answer each of the four prompts for their program. 

  1. What are your research interests in the area of Information Technology? Why are you inspired to research in this area, and why do you think it is important to research in this area?
  2. Why did you select PhD in Information Technology? Why did you select XXXX ?
  3. As an individual, what are your strengths and weaknesses and how will they impact you as a PhD IT student?
  4. Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from XXXX? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organizational Risk Management Approach

Identify a SMB of your choice. In a 500-word paper, examine risk  management approaches the organization may consider deploying for mobile  device management and provide rationale for the prerequisites needed  for mobile device management as well as organizational readiness.

Make  sure to reference academic or NIST official publications (most current  year available via the Internet) or other relevant sources published  within the last 5 years.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Graduate Level Cybersecurity Assignment (Not a Paper)

1. Consider the Manchester Encoding technique.

a) Explain how a text (or a message) can be encoded by the Manchester encoding technique.

b) Pick the first character of your last name in uppercase and convert it to a binary code in 8 bits. For example, James Smith takes “S” to convert into a binary. What is the binary code of your last name initial?

c) Assume the clock bits are 10101010…. In this pattern. What is the encoded bits by applying the Manchester Encoding technique?

d) How can you decode it? Explain briefly.

2. Suppose that your laptop connects an access point (AP).

a) List the steps that take place at a laptop when it needs to connect an AP.

b) RC4 algorithm is a foundation of WPA2. Explain the concept (not the algorithm itself) of  RC4 briefly.

c) How a streaming key is used to encode a text in WPA2? Explain it briefly.

d) Consider the key = 1234 and the text = 7788. Apply RC4 illustrated (simplified) in class. What is the first key? Show the computation step:

HW5 A5/1 Encryption

This assignment is to practice A5/1 encryption. Refer to the feedback polynomials with the same clocking bits as the one discussed in class. Consider the following three registers to generate a key stream. 

Message to send: K

Key: 342312

LFSR:

R1 =  [1, 1, 0, 0, 0, 1, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 0, 0, 0]

R2 =  [1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 0, 0, 1, 0, 0, 0, 1, 0, 1, 0, 1, 0]

R3 =  [1, 0, 1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 1]

Please note that

– the LFSR represented in a list is opposite to that explained in the class slides. It means that R1 above the first bit is on the left, and the last 19th bit is on the right end.

– the clock bits of LFSR are 9th, 11th and 11th of R1, R2 and R3.

– The tapped bits for XOR from R1: 14th, 17th, 18th and 19th bit

– The tapped bits for XOR from R2: 21st and 22nd bit

– The tapped bits for XOR from R3: 8th, 21st, 22nd and 23rd bit

4.1  What is the operation to generate the first bit of the stream key?

4.2 What is the first bit of the key?

4.3  According to the clocking bits, which registers are picked for feedback?

4.4 What are the the first bit (indexed by 0) of each register, after feedback and shifting bit at the first key generation?

4.5  What is the first bit of the key?

4.6 What is the second bit of the key generation?

HW4 rc4 streaming encryption

Review the class slides of wifi streaming crypto algorithm, rc4.

Consider the following to apply to rc4 algorithm using an array of 8 bytes (You may want to rewatch the video lecture!).

Key T: 7136

S: 01234567

Now consider the message P to send. Let P = [ 5 5 5 3 ]. 

Step 1: Apply the Initialization Algorithm, discussed in class. By applying the first three iterations,

1) give the list S at each step of those three iterations.

Answer the following:

a. Show S for i=0

b. Show S for i=1

c. Show S for i=2

2) What is the first two keys?

3)  What is the cipher for that first message 5?

4)  What is the key to be generated for the second 5? What is its cipher?

Submit:

   Answer all in plaintext

Consider Steganography.

a) Explain the concept of steganography.

b) Show the steps of hiding a text message into an image according to the steganography concept described above.

c) Show the steps of extracting the text message from the stegano image stepped above.

d) Apply the method discussed in class to extract a character from the following RGB code. The method that you should apply is to take the least insignificant bit of each R, G and B color.

 R    G    B

254 125 99

255 124 98

255 125 99

255 125 99

255 125 99

… …

HW4  Network Forensic (5pts)

Network Forensic

Raspberry Pi is one of the most poswerful microcontrollers, on which Raspbian can run. Raspbian is one of the debian Linux distributions, and install a wifi access point (AP) and wireshark.

Wireshark is one of free and open-source packet analyzers. Using pcap (), there are tools capturing packets in GUI (Wireshark) and non-GUI (command-based TShark) running on cross-platform, released under the terms of the GNU.

1. Let your cell phone access the AP. Extract packets of your cell phone accesses and let given packets be contained in the file Packet.txt

2. Extract the IP assigned to your cell phone.

3. After that, filter wireshark packets to collect all activities of your cell phones (text, phone calls, internet through wifi).

Submission:

1)  screenshot of wireshark showing your cell phone IP

2) screenshot of wireshark packets about your cell phone accesses

HW3  Image Forensic (5pts)

Image Forensic

One of the widely-used images formats used by most smartphones and digital cameras is JPEG. JPEG image format has two types of compression: JFIF and EXIF.

Consider the two photo images

1) Extract the following metadata from the photos

          a. time

          b. latitude

          c. longitude

          d. altitude

2) Plot the physical locations of those photos on the google map (manually or by using plotter).

3) Describe a possible (fiction) criminal story which may be used as evidence.

Submission:

1)  a. Time; b. Latitude; c. longitude; d. Altitude, in plaintext

2) A google map image, or your camera photo

3) Description in plaintext

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Security

​Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try

to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?

 

Please be comprehensive and answer the exercise completely.  Your assignment does not need to be more than 1 page in length.

Submission Requirements

  

Format: Microsoft Word or compatible

  

Font: Times New Roman, 12-point, double-space

  

Citation Style: APA

  

A minimum of 3 Academic References

 

  

Review chapter 3 linking IT to business 

  

Discuss the key business metrics for 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

16-week hybrid course Cyberlaw outcomes and correlation of job to the course

     

 

1. Courses I Am Taking This Term   – Describe the 16 -week hybrid course (course #, course title, & course   description).

 

 

2. List Outcomes from Your 16 -Week   Course – List the outcomes (objectives) as written in the   course syllabus from the 16 – week hybrid course.

 

 

3. Apply Your Work Experiences to The   Course – Correlate your job responsibilities with the 16 -week   hybrid course outcomes listed above.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CL m-5 Ass-2

 

1. Please post the hyperlink to one federal statute which influences commerce on the internet and summarize in not less than 100 words what that statute accomplishes.

2. Please post the hyperlink to one state statute which influences commerce on the internet and summarize in not less than 100 words what that statute accomplishes.

3. Please post the hyperlink to one federal case which influences commerce on the internet and summarize in not less than 100 words what that case accomplishes.

4. Please post the hyperlink to one state case which influences commerce on the internet and summarize in not less than 100 words what that case accomplishes.

Everything in APA format.

On time Delivery.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now