Buffer overflow assignment

Exploit the vulnerable program (vulnerable.c) to obtain a shell. The vulnerable program and sample exploit (you need to edit the exploit to make it work) are in the Assignments folder which in turn is in the Documents folder in the TritonApps lab environment. Provide commands and the screenshots of the outputs to illustrate your exploit. [10 pts]

Answer the following questions related to the exploit:

a. Which function and statement in the program is the major cause of the vulnerability? Why? [10 pts]

b. What address are you using to overwrite the return address? How did you obtain this address? [10 pts]

c. Draw a figure of the overflow string that leads to a successful buffer overflow attack and a shell. The figure should highlight the important addresses and contents. [10 pts]

d. What offset worked for your exploit? How did you find the offset? [10 pts]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

follow the instructions to do the code

 the modification only in  faculty.h and faculty.cpp. don’t do any changes in the rest of the other files. 

1- The declaration of the Faculty class has been changed, in the private area, to use a std::list instead of an array as its implementing data structure.

Your task is to follow through on that change, making the necessary alterations to faculty.h and faculty.cpp to make this a working class. The necessary changes have already been made to the unit tests, the Department class, and to the main printSchedule.cpp application.

2- The major difference between lists and the earlier sequential structures that we have looked at is that elements are accessed via iterators instead of integer-based indices. Accordingly, you will need to

a.  rewrite the indexing-based code in faculty.cpp with iterator-based code.

b.  Remove the indexing-based getSection function from faculty.h and add appropriate declarations of iterator and const_iterator types and associated functions allowing access to a Faculty object’s sections.

3- To improve the usability of the Faculty class, you will also need to add

a. A constructor to allow Faculty objects to be constructed from a course name and a pair of iterators denoting a range of Section values in some arbitrary container.

b. A constructor to allow Faculty objects to be constructed from a course name and an initializer_list of sections.

4- Your code will be evaluated both on its ability to function correctly within the printSchedule application and on its ability to pass the various unit tests provided.

· In the test report, tests 0…7 test the printSchedule application. Tests numbered 8…25 check the unit tests.

a. Each even-numbered test checks for correct behavior of the code.

b. Each odd-numbered test checks to see if that same behavior is correct and entails no memory leaks or other common pointer/memory handling problems.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

A peer-reviewed scholarly journal article discussing electronic innovation and the government

InfoTech in a Global Economy (ITS 832)

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 3 pages overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use Google Scholar to find these types of articles ( https://scholar.google.com/ ) Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Creating a Company Culture for Security – Design Document

 
Question 1

Overview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets. They’ve hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

  • An external website permitting users to browse and purchase widgets
  • An internal intranet website for employees to use
  • Secure remote access for engineering employees
  • Reasonable, basic firewall rules
  • Wireless coverage in the office
  • Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module. 

What you’ll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization’s requirements and the following elements should be incorporated into your plan:

  • Authentication system
  • External website security
  • Internal website security
  • Remote access solution
  • Firewall and basic rules recommendations
  • Wireless security
  • VLAN configuration recommendations
  • Laptop security configuration
  • Application policy recommendations
  • Security and privacy policy recommendations
  • Intrusion detection or prevention for systems containing customer data

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python Neural Networks diabetes

 USE Jupyter Notebook

Given Code: ‘Part of answer’ but incomplete…..

# Importing libraries
import pandas as pd
import numpy as np
from sklearn.neighbors import KNeighborsClassifier
from sklearn.tree import DecisionTreeClassifier
from sklearn.model_selection import train_test_split
from sklearn import metrics


# Loading the dataset
data = pd.read_csv('diabetes.csv')

# Separating features and target
features = data[['Pregnancies', 'Glucose', 'BloodPressure', 'SkinThickness', 'Insulin', 'BMI', 'DiabetesPedigreeFunction', 'Age']]
target = data['Outcome']

# Splitting training and testing data in the ratio 70 : 30 respectively
x_train, x_test, y_train, y_test = train_test_split(features, target, random_state=0, test_size=0.3)


# KNN model
modelKNN = KNeighborsClassifier()

# Train the model
modelKNN.fit(x_train, y_train)

# Predict test set
y_pred_knn = modelKNN.predict(x_test)

# Print accuracy of the KNN model
print(modelKNN.score(x_test,y_test))

# Print Confusion matrix
print(metrics.confusion_matrix(y_test, y_pred_knn))

# Print Classification Report for determining precision, recall, f1-score and support of the model
print(metrics.classification_report(y_test, y_pred_knn))


# Decision Tree model
modelDT = DecisionTreeClassifier()

# Train the model
modelDT.fit(x_train, y_train)

# Predict test set
y_pred_dt = modelDT.predict(x_test)

# Print accuracy of the Decision Tree model
print(modelDT.score(x_test,y_test))

# Print Confusion matrix
print(metrics.confusion_matrix(y_test, y_pred_dt))

# Print Classification Report for determining precision, recall, f1-score and support of the model
print(metrics.classification_report(y_test, y_pred_dt))

Please do the data cleaning and feature selection…

Please use the given code/layout given below original question….

ORIGINAL QUESTION:

“”for more info check original .ipynb file””

Fill out the code below so that it creates a multi-layer perceptron with a single hidden layer (with 4 nodes) and trains it via back-propagation. Specifically your code should: 

  1. Initialize the weights to random values between -1 and 1
  2. Perform the feed-forward computation
  3. Compute the loss function
  4. Calculate the gradients for all the weights via back-propagation
  5. Update the weight matrices (using a learning_rate parameter)
  6. Execute steps 2-5 for a fixed number of iterations
  7. Plot the accuracies and log loss and observe how they change over time

First, initialise the parameters. This means determining the following:

Size of the network

Hidden layers (or a single hidden layer in this example) can be any size. Layers with more neurons are more powerful, but also more likely to overfit, and take longer to train. The output layer size corresponds to the number of classes.

Number of iterations

This parameter determines how many times the network will be updated.

Learning rate

Each time we update the weights, we do so by taking a step into the direction that we calculated will improve the accuracy of the network. The size of that step is determined by the learning rate. Taking small steps will slow the process down, but taking steps that are too large can cause results to vary wildly and not reach a stable optimum.

Next, fill in the code below to train a multi-layer perceptron and see if it correctly classies the input.

in[]# Reshape y
y =

# Initializing weights

W_1 =
W_2 =

# Definining number of iterations and learning rate(‘lr’)
num_iter =

learning rate =

in[]# Creating empty lists for loss values(error) and accuracy
loss_vals, accuracies = [], []

for j in range(num_iter):
# Do a forward pass through the dataset and compute the loss
 

# Decide on intervals and add on the current loss and accuracy to the respective list

# Update the weights

in[]# Plot the loss values and accuracy

Log loss and Accuracy over iterations Log Loss Accuracy 05 10 04 09 03 OB 02 07 01 06 0 iterations iterations

Higher number of iterations and lower learning rate seems to improve accuracy

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Chapter 11: Managing Systems Implementation

Task 2. Create the additional slide and narrative. Include three additional examples, and be sure to include at least one example where phased changeover would be suitable.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

software development life cycle (SDLC)

 Compare the six core processes in the software development life cycle (SDLC). What do you believe is the most significant difference is between a traditional approach to system development and an iterative/agile development approach? Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Presentation on Enterprise System and Enterprise Architecture Considerations

PowerPoint 

Thesis statement 

• 3-6 slides that provide an evaluation of what each organization did right and what it did wrong; and compare and contrast the organizations

• 1-4 slides on positioning of these case studies for their ability to enable the architecture (i.e. are the “hooks” in place to enable EA?) Very important!

And make sure to not make the slides too detailed as the professor instructed to have the majority of the info added as a note in the slide

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Most challenging feature in Excel

  • Minimum of 1 post using technologies such as Kaltura, PowerPoint, or any other tool to explain the concepts learned during the week.
  • Minimum of 1 scholarly source

Initial Post Instructions

This week we went over the different tools that we have available to analyze data in Excel. Share what you learned from this week, what was most interesting, or even what was the most challenging feature for you. Also share as to how you came up with your solutions in the assignments and the type of analysis you decided to use.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Building Excel

  • Microsoft Excel

You will analyze the data you collected and provided in your assignment last week. As you are working on each of the steps below, think about the analysis that you will provide to the research team. Follow the steps below to complete this analysis.

  1. Copy the file you created in week 5 and rename the new one “YourName_COMP150_W6_Assignment”.
  2. Open the file and duplicate the sheet where the initial table and data were created
  3. Rename the new sheet as “sorting & filters” and move it to the right of the original sheet
    1. Make the data look professional by using formatting options such as borders and table styles to place the data into a table.
    2. Select one of the text-based data columns such as names, cities, or addresses and sort the data by Z to A.
    3. Create a custom filter to any part of the data except where you did the sort. For example, if you sorted by patient’s name, then filter another set of data.
  4. Duplicate the original sheet again and rename it as “conditional formatting”. Move it right after the “sorting & filters” sheet.
    1. Implement conditional formatting to any of the number-based data sets. For example, showing higher numbers in green, while showing lower numbers in red.
    2. Add an IF function and apply it to the entire set. For example, you could create a function that says if x number is higher than x number, then you are at risk. The purpose is to show how an IF function works so creativity it is permitted in how you use the function.
  5. Use the “conditional formatting” sheet to create a pivot table.
    1. The pivot table needs to be on its own sheet.
    2. The pivot table needs to be meaningful so make sure to select data that will make it clear for your analysis.
    3. The pivot table should have data selected on the columns, rows, and values fields. Make sure to consider the data when adding the values selection
  6. Create a minimum of two charts. Make sure to select the right chart that explains your analysis. Each chart should be on its own sheet and should have a title. Make sure the purpose of the chart is self-explanatory just by looking at it.
  7. Update the documentation sheet
    1. Update the date.
    2. Add all the new rows for the sheets created.
    3. Provide a brief written analysis for each of the new sheets. Explain what you want the research team to learn about each sheet.
  8. Review all the sheets to ensure it looks professional. Try to keep the same style, colors, and formatting, Make sure the file is named “YourName_COMP150_W6_Assignment” and submit the file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now