Computer Science ISSC452 week 3 assignment

 

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:55 pm Eastern time on Sunday.

ATTACKS, EXPLOITS AND VULNERABILITIES

An attack is the act that takes advantage of a vulnerability to compromise an asset, thus resulting in a loss. It is accompanied by a threat-agent that denies, damages or steals an organization’s information or physical asset. A vulnerability is an identified weakness in a system, where controls are not present, or not effective or have become obsolete. Below you will find a list of attacks, threat agents and vulnerabilities. For this assignment you will need to pick five (5) of the below methods. Explain the method in detail and provide suggested prevention controls. For example, if malicious code were on the list below I would first explain the topic and then as suggested controls I would state: The obvious controls are good vulnerability management (e.g., installing patches on a regular basis), up-to-date antivirus, anti-spyware, etc., but there are also policy and awareness controls that guide users’ behavior (e.g., don’t click on links in email, etc). Please make sure that your answers are detailed and well supported. You must use a minimum of three outside sources. 

  1. Hoaxes with an attached virus
  2. Back doors
  3. Password attacks
  4. Denial-of-service (DoS) and distributed denial-of-service (DDos) attacks
  5. Spoofing
  6. Man-in-the-middle (MITM)
  7. Spam
  8. Sniffer
  9. Timing attack

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ flowchart

 

Flow chart the Craps please make the flowchart

can i get pdf file or anything i can open on the computer and edit if i want to 

code

//System Libraries
#include <iostream> //Input – Output Library
#include <ctime> //Time for rand
#include <cstdlib> //Srand to set the seed
#include <fstream> //File I/O
#include <iomanip> //Format the output
#include <string> //Strings
#include <cmath> //Math functions
using namespace std; //Name-space under which system libraries exist

//User Libraries

//Global Constants
const float PERCENT=100.0f;//Conversion to Percent

//Function Prototypes
char rollDie(int); //Roll the Dice
void fileDsp(ofstream &,int [],int [],int,int,int,int); //File Display
void scrnDsp(int [],int [],int,int,int,int); //Screen Display
void crpGame(int [],int [],int,int &,int &,int &); //Play Craps

//Execution begins here
int main(int argc, char** argv) {
//Set the random number seed
srand(static_cast<unsigned int>(time(0)));
 

//Declare file and game variables
ifstream in; //Input File
ofstream out; //Output File
int nGames; //Number of games, wins/losses
int mxThrw=0,numThrw=0,lmGames=100000000;//Game limiter and Throw statistics
const int SIZE=13; //Size of our Arrays
int wins[SIZE]={}; //Initializing the win array
int losses[SIZE]={}; //Initializing the loss array
 

//Initialize variables
string inName=”GameInfo.dat”; //String Name
char outName[]=”GameStats.dat”; //Character Array Name
in.open(inName.c_str()); //Open the Input file
out.open(outName); //Open the Output file
while(in>>nGames);//Last value in file becomes the number of games
nGames=nGames>lmGames?lmGames:nGames;//Limit games if to high
 

//Play the game the prescribed number of times.
int beg=time(0);//Time the game play
crpGame(wins,losses,SIZE,nGames,numThrw,mxThrw);
int end=time(0);//End time of Game play
 

//Output the game statistics to the screen
out<<“Total time to play these Games in integer seconds = “<<end-beg<<endl;
scrnDsp(wins,losses,SIZE,nGames,numThrw,mxThrw);
 

//Output the game statistics to the screen
cout<<“Total time to play these Games in integer seconds = “<<end-beg<<endl;
fileDsp(out,wins,losses,SIZE,nGames,numThrw,mxThrw);
 

//Close files
in.close();
out.close();
 

//Exit stage right
return 0;
}

void crpGame(int wins[],int losses[],int SIZE,int &nGames,
int &numThrw,int &mxThrw){
for(int game=1;game<=nGames;game++){
//Throw dice and sum, keep track of number of throws in a game
int gmThrw=1;
char sum1=rollDie(6);
//Determine wins and losses
switch(sum1){
case 7:
case 11:wins[sum1]++;break;
case 2:
case 3:
case 12:losses[sum1]++;break;
default:{
//Loop until a 7 or previous sum is thrown
bool thrwAgn=true;
do{
//Throw the dice again
char sum2=rollDie(6);
gmThrw++;//Increment the number of throws
if(sum2==7){
losses[sum1]++;
thrwAgn=false;
}else if(sum1==sum2){
wins[sum1]++;
thrwAgn=false;
}//end of dependent if-else
}while(thrwAgn);//end of do-while
}
}//end of switch
//Keep track of total throws and max throws
numThrw+=gmThrw;
if(mxThrw<gmThrw)mxThrw=gmThrw;//Independent if
}//end of for-loop
}

void fileDsp(ofstream &out,int wins[],int losses[],int SIZE,int nGames,int numThrw,int mxThrw){
out<<fixed<<setprecision(2)<<showpoint;
out<<“Total number of Games = “<<nGames<<endl;
out<<“Roll Wins Losses”<<endl;
int sWins=0,sLosses=0;
for(int sum=2;sum<SIZE;sum++){
sWins+=wins[sum];
sLosses+=losses[sum];
out<<setw(4)<<sum<<setw(10)<<wins[sum]<<setw(10)<<losses[sum]<<endl;
}
out<<“Total wins and losses = “<<sWins+sLosses<<endl;
out<<“Percentage wins = “
<<static_cast<float>(sWins)/nGames*PERCENT<<“%”<<endl;
out<<“Percentage losses = “
<<static_cast<float>(sLosses)/nGames*PERCENT<<“%”<<endl;
out<<“Maximum number of throws in a game = “<<mxThrw<<endl;
out<<“Average throw per game=”<<static_cast<float>(numThrw)/nGames<<endl;
out<<“Ratio of Longest to shortest game = 10^”<<log10(mxThrw)<<endl;

}

void scrnDsp(int wins[],int losses[],int SIZE,int nGames,int numThrw,int mxThrw){
cout<<fixed<<setprecision(2)<<showpoint;
cout<<“Total number of Games = “<<nGames<<endl;
cout<<“Roll Wins Losses”<<endl;
int sWins=0,sLosses=0;
for(int sum=2;sum<SIZE;sum++){
sWins+=wins[sum];
sLosses+=losses[sum];
cout<<setw(4)<<sum<<setw(10)<<wins[sum]<<setw(10)<<losses[sum]<<endl;
}
cout<<“Total wins and losses = “<<sWins+sLosses<<endl;
cout<<“Percentage wins = “
<<static_cast<float>(sWins)/nGames*PERCENT<<“%”<<endl;
cout<<“Percentage losses = “
<<static_cast<float>(sLosses)/nGames*PERCENT<<“%”<<endl;
cout<<“Maximum number of throws in a game = “<<mxThrw<<endl;
cout<<“Average throw per game=”<<static_cast<float>(numThrw)/nGames<<endl;
cout<<“Ratio of Longest to shortest game = 10^”<<log10(mxThrw)<<endl;

}

char rollDie(int sides){
char die1=rand()%sides+1;//[1,number of sides]
char die2=rand()%sides+1;//[1,number of sides]
char sum1=die1+die2;
return sum1;
}

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Is it practical

It is important to ensure that adequate checks, balances, and assurances are provided by corporate entities deploying software products.

After examining guidance in the systems software engineering domain from the Department of Homeland Security (DHS), develop your own practical SwA Core Body of Knowledge (CorBoK) in a commercial arena, including management and HR requirements, evaluation methods, costs, and a value proposition for an organization.

Include the following in your three-column table:

  1. Software Assurance Competency Model (DHS)
  2. Your practical version of SwA CorBoK
  3. A rationale for your version

APA style is not required, but solid academic writing?is expected.

Refer to “Is It Practical Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

I have attached the scoring guide from my teacher 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

3-2 Information Technology Risk Analysis and Cyber Security Assignment, Part 1

 Submit a comprehensive risk analysis paper that identifies the cyberlaw foundations that affect the current information technology business model. The framework for the assessment will include how the business model ensures that their current cyber practices are both legal and ethical. 

Please see the attached rubric.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Literature Review Funnel/Organizer

 Topic:  Heart disease among older adults  

While the literature review funnel is not necessarily a part of the actual dissertation, the purpose here is to think about the most logical way to organize your future lengthy chapter 2.

Directions:

  1. View the rubric and examples to make sure you understand the expectations of this assignment.
    1. Literature Review Examples.pdf
    2. Rubric for Literature Review Funnel.docx
  2. View this 3 Ways to Structure Your Literature Video to review organizational methods.
  3. Research your topic to find the logical starting point to your topic. Then, write your literature review funnel.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 5

 Please provide substantive responses to the following items:

(a) What are three advantages to using SQL?

(b) What are challenges to using SQL?

(c) By using an example, explain how SQL provides the ability to use set operations.

(d) By using an example, describe an advanced function of SQL.

Your assignment should include at least five (5) reputable sources, written in APA Style, and 500-to-650-words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethics in Electronic Mediated Communication

There is greater potential for deception with electronically mediated communication (EMC) than with face-to-face communication. What other ethical issues arise with EMC? What steps can you take to be sure that you are communicating ethically via electronic media? How do you evaluate the credibility and reliability of EMC that you receive (especially on social media)?  

300-350 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Study question

Each question needs to be 200 words with 2 references 

1) One factor that IT professionals must consider when building a server is whether that server should be simply server software installed on regular hardware, server software installed on server hardware, or regular software installed on server hardware.

  1. What are the differences between workstation software and server software?
  2. Windows workstations all have elements of server software built-in. What are these elements, and why is the Windows Professional OS not considered a server?
  3. Similarly, the Windows server OS can run regular workstation applications such as MS Office or Adobe Photoshop. Why is this a bad idea? Can you find a situation where it might be appropriate? 
  4. What exactly makes server hardware so valuable/expensive? What feature requirements drive the server market? 
  5. What (if any) are the same feature requirements that might be found in server software/OS environments? 

2) One of the most frequent IT-related issues we encounter deals with connectivity. “I can’t get to the Web,” “The Internet is down,” and “It doesn’t work” are far more complicated than you think. 

In general, networking issues fall into one of four categories: 

  1. Problem with the computer network interface
  2. Problem with the local network
  3. Problem between the local network and the rest of the web
  4. Problem with the target resource (website, server, application)

Research network troubleshooting as it relates to each of these categories of problems and how they may be resolved. 

Create a flowchart that illustrates how to navigate the troubleshooting process to most effectively solve the problems.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

how a blockchain implementation would improve data security in a military, education, or other context.

 Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

select an organization that has leveraged Cloud Computing technologies

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?

• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

Evidence of copying from other papers or not properly citing sources could result in a score of zero.

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now