Computer Science
[SOLVED] Physical Access Security
Using Google News, search for the term “physical security breach.” Locate three separate news articles on the search topic that were posted within the last five days. To complete this exercise, please complete the following: For each of the three articles, you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected, as well as any reported loss of revenue or personally identifiable information (PII). Describe what steps are or were taken to mitigate the attack or to resolve the issue. Determine whether the attack was preventable in each case. Based on your experience, explain why or why not. If you feel any of the attacks were preventable, please list what steps could have been taken. Outline physical access security best practices and how these steps could have been used to prevent the attacks listed in the three articles. Provide a screenshot that includes the article’s name and the date it was published, along with a valid URL for each of the three articles. For more information on Physical Access Security read this: https://en.wikipedia.org/wiki/Physical_security
[SOLVED] Security and Privacy
Write a 6-8 page paper (deliverable length does not include the title and reference pages) What are the principles and limitations to an individual’s right to privacy? What are the trade-offs between security and privacy? What is the issue of freedom of speech versus the protection of children online? Due: Assignment is due on the day stated in the Course Schedule Provide three articles to substantiate the above three questions. Use APA format to provide a citation for each of the articles you read. Suggestion: Use a search engine (Google) and keywords. For more information on Security and Privacy read this: https://en.wikipedia.org/wiki/Information_privacy
[SOLVED] Information Technology Security
Chief Executive Officer & Disgruntled Employee Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages. In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action. Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages. Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization. The discovered MAC address used to locate the antisocial computer workstation belongs to one of the disgruntled active employees who is a member of the software development department within the organization. Persistent investigation reveals that the disgruntled employees computer workstation is involved in this unlawful and criminal operation. Question-1 Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation? Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of the information technology security (ITS) team. Question-2 Do you agree that the digital forensic investigator must seek assistance from the organization’s ITS team to fully exonerate the CEO? Question-3 Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene? If Yes, provide a comprehensive narrative to support your assertion. For more information on Information Technology Security read this: https://en.wikipedia.org/wiki/Computer_security
[SOLVED] Python Programming
Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from the scheduling portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different levels: Semester and Department. Your program will be a menu-based application. Assume that your project file is myproject.py. Once you run, it will show the last 5 semester (fall, spring, summer-only, (not winter, may mini)) > python myproject.py Choose a semester: 1) Sprint 2021 2)Fall 2020 3)Summer II 4)Summer I 5)Spring 2020 Selection: 2 Here, your program will parse the data from website and show only last (most recent) 5 semesters. The user will make a selection, then, you will show departments for the selected semester (Fall 2020). Note that the selected semester is visible before a “>” sign. Fall 2020> Select a department: 1) Undeclared 2) Accounting and Finance 3) Art 4) Ag Science & Natural Resources … … 30) Social Work 31) Theatre Q)Go back Selection: 3 Fall 2020> Art > Select an option: 1) List courses by instruction name 2) List courses by capacity 3) List courses by enrollment size 4) List courses by course prefix 5) Save courses in a CSV file 6) Search course by instruction name 7) Search courses by course prefix Q)Go back Selection: ?? Here, your program will parse the data from the website and show all available departments than a list of tasks. Q (go back) option will take the user to the previous level. Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by the prefix ” should show PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532 as first 5 rows. You will follow the above headers and order (prefix (col. width 6), ID (5), Sec (5) , Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left-justified. A course name should not have a word more than 5 chars. For instance, Algorithms should be abbreviated as “Algor”. The length of the course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as a .csv format. The user will be able to provide a filename for CSV file. For this program, you need to develop at least one class (chapter 10) with (possible) many methods. For more information on Python Programming read this: https://en.wikipedia.org/wiki/Python_Programming
[SOLVED] Domain Name
Internet domain names are linked to trademark issues. Technology makes it easy to copy and distribute music and movies without paying royalties. Business conducted on the internet raise security and privacy issues. What legal concerns are raised by these issues? Predict which of these issues will be of major concern in the future in regard to the law and business practices. Guided Response: Review your peers posts. Respond to at least two of your classmates by Day 7 describing whether you agree with their predictions or if you see the issues differently. Explain. 1st response Brian: Internet domain names are linked to trademark issues. Technology makes it easy to copy and distribute music and movies without paying royalties. Business conducted on the internet raise security and privacy issues. What are the legal concerns raised by these issues? In a simple form, these actions are theft of intellectual property from the artists or creators of the property without their legal consent. In 1998 President Clinton amended The Digital Millennium Copyright Act, which further protects intellectual property and copyrighted material. This act implemented huge fines to the individuals that were involved in the act of stealing copyrighted material without the consent of the owner. The Digital Theft Deterrence and Copyright Damages Improvement Act of 1999 was an attempt to further deter individuals from stealing intellectual property from the internet. This act raised the amount that could be fined per offense. Each offense could be subject to pay anywhere from $750 to $30,000. When I say each offense, it means every single song or movie that was illegally downloaded could be charged anywhere from the amounts listed. If you downloaded 100 songs illegally and were sued by the copyright holder, you could be ordered to pay damages anywhere from $75,000 to 3 million dollars. A few other acts that were implemented to try and deter individuals from illegally downloading copyrighted material are the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA). These acts were an attempt to stop search engines from allowing illegal downloading sites to be found through their search engines. These statutes were a good effort, but by much public and private protest, these acts have yet to make into law. Predict which of these issues will be of major concern in the future in regard to the law and business practices. My personal belief is that business that is conducted on the internet will raise security and privacy issues. I dont think this type of cybersecurity is going anywhere. Just the other day, while using google chrome, I received a notification that my saved passwords and personal information were at risk due to a security breach to Google’s servers. If one of the most powerful tech companies in the world has a security breach that could potentially leak your information, then nothing is safe no matter how well you think your cyber information is protected. It is all too often that we see in the news that a major companies customer information has been hacked and that anyone that has bought something from that company may be at risk. For every good person that is trying to protect your cyber information, there is a bad guy trying to steal it. 2nd Response Frankie: This discussion reminds me of the 321 Studios X-Copy software that came out in the early to mid 2000’s. It was a software that allowed users to copy their dvd’s. The movie industry responded with fierce litigation against the company. I can remember hearing about the court proceedings when a 321 attorney asked a movie industry representative if a person should have to go back out and spend $20 or more to purchase another dvd to replace a damaged one. That movie representative without pause and or any hesitation responded with an emphatic YES. Has we all know the movie industry won and 321 studios was forced out of business. A few of us still own a stand alone copy of the software but computers have moved on from XP and unless you have a machine that runs that O.S. the software is pretty much useless at this point. Ironically now most movies are now on streaming services. So will the movie industry now try the same tactic with streaming services? How is Disney + or Netflix or Amazon Prime going to police members allowing others to access their plans and view preferred selections? It is the same paradigm has making a copy using the 321 studios software and letting a friend borrow the movie. Time will tell. For more information on Domain Name read this: https://en.wikipedia.org/wiki/Domain_name
[SOLVED] Security Controls
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics. Describe operating system hardening Define it Why is it done? What steps are usually done in a Windows environment? Describe system restoration methods and procedures Define it Why is it needed? What tools and approaches are recommended? Describe network security controls Define it Why is it needed? What steps, tools, and policies are used to secure networks? Describe incident response teams and the role of evidence What are incident response teams and why do they exist? How does evidence collection relate to incident response teams? Discuss evidence Describe why evidence is collected, How it should be collected What can happen if it is collected or handled in an inappropriate way For all writing assignments ensure that you do the following: Write 1000 to 1500 words in APA format. Utilize at least five scholarly references. Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer-reviewed sources. Utilize Google Scholar and/or the university library. Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source. Review the rubric to see how you will be graded. Plagiarism will result in a zero for the assignment. The second instance of plagiarism will result in your failure of this class. If you use a source, cite it. If you do not, it is plagiarism. For more information on Security Controls read this: https://en.wikipedia.org/wiki/Security_controls
[SOLVED] Data Flow Analysis
1 Consider the following grammar (describing LISP arithmetic): X -> ( E ) E -> O | O T O -> + | * | – | / T -> n | X X == executable, E == expression, T == term, n == number terminals == ( ) n + * – / Find FIRST, FOLLOW and LR(0) sets for this grammar. Is the grammar LR(0)? Is it SLR? 2.Give a rightmost derivation of the string (x+a)*x using: S=> E E=> E+T | T T=> T*F | F F=> i | (E) The lexical analyzer returns a token i==identifier for variables ‘x’ and ‘a’. Display the parse tree, the syntax tree, and the expression DAG. 3. The algorithm for DOM in the text is based on data flow analysis, but it is often desirable to find the DOM tree from the control flow graph without t need to do data flow. Describe a possible algorithm based on breadh-first search to find DOM given a control flow graph. (An overview description in Englishis sufficient, you do not need a formal specification or code of an algorithm) For more information on Data Flow Analysis read this: https://en.wikipedia.org/wiki/Data-flow_analysis
[SOLVED] Hanson Robotics
1.Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities. For more information on Hanson Robotics read this: https://en.wikipedia.org/wiki/Hanson_Robotics
[SOLVED] Computer Programing
What is useful for, how would you apply it in your class or school work, or future/ current job about User-Defined Functions, User-Defined Simple Data Types, Namespaces, and String Type, Arrays and Strings? you should have at least a paragraph ( 200 Words ) For more information on Computer Programing read this: https://en.wikipedia.org/wiki/Computer_programming
[SOLVED] Encryption
You will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. The writing assignment requires a minimum of two written pages to evaluate history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page. For more information on Encryption read this: https://en.wikipedia.org/wiki/Encryption_software
Use Promo Code: FIRST15