New England College WK1 Key Security Requirements of Confidentiality Paper Computer Science Assignment Help. New England College WK1 Key Security Requirements of Confidentiality Paper Computer Science Assignment Help.
(/0x4*br />
Week 1 :
Describe the key security requirements of confidentiality, integrity, and availability.
Describe the X.800 security architecture for OSI.
Discuss the types of security threats and attacks that must be dealt with and give examples of the types of threats and attacks that apply to different categories of computer and network assets.
Explain the fundamental security design principles.
Discuss the use of attack surfaces and attack trees. List and briefly describe key organizations involved in cryptography standards.
Week 2:
.1 What are the essential ingredients of a symmetric cipher?
2.2 What are the two basic functions used in encryption algorithms?
2.3 How many keys are required for two people to communicate via a symmetric cipher?
2.4 What is the difference between a block cipher and a stream cipher?
2.5 What are the two general approaches to attacking a cipher?
2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
2.7 What is triple encryption?
2.8 Why is the middle portion of 3DES a decryption rather than an encryption?
Week 3:
Define the term message authentication code. List and explain the requirements for a message authentication code.
Explain why a hash function used for message authentication needs to be secured. Understand the differences among preimage resistant, second preimage resistant, and collision resistant properties. Understand the operation of SHA-512.
Present an overview of HMAC. Present an overview of the basic principles of public-key cryptosystems.
Explain the two distinct uses of public-key cryptosystems. Present an overview of the RSA algorithm. Define Diffie–Hellman key exchange. Understand the man-in-the-middle attack.
Week 4 :
4.1 List ways in which secret keys can be distributed to two communicating parties.
4.2 What is the difference between a session key and a master key?
4.3 What is a key distribution center?
4.4 What entities constitute a full-service Kerberos environment?
4.5 In the context of Kerberos, what is a realm?
4.6 What are the principal differences between version 4 and version 5 of Kerberos?
4.7 What is a nonce?
4.8 What are two different uses of public-key cryptography related to key distribution?
4.9 What are the essential ingredients of a public-key directory?
4.10 What is a public-key certificate?
4.11 What are the requirements for the use of a public-key certificate scheme?
4.12 What is the purpose of the X.509 standard?
4.13 What is a chain of certificates?
4.14 How is an X.509 certificate revoked?
Week 5:
5.1 Provide a brief definition of network access control.
5.2 What is an EAP?
5.3 List and briefly define four EAP authentication methods.
5.4 What is EAPOL?
5.5 What is the function of IEEE 802.1X?
5.6 Define cloud computing.
5.7 List and briefly define three cloud service models.
5.8 What is the cloud computing reference architecture?
5.9 Describe some of the main cloud-specific security threats.
New England College WK1 Key Security Requirements of Confidentiality Paper Computer Science Assignment Help[supanova_question]
CON4000 Florida Institute of Technology CPM Schedule Analysis Paper 5 Business Finance Assignment Help
You have taken over as project manager for a light duty warehouse. A draft CPM schedule is attached. All of the problems below refer to the draft CPM.Your company policy is to work a normal 5 day, 40 hour per week schedule unless overtime or weekends work is required to meet the scheduled completion date.
1. Analyze the CPM.
a. Identify and correct any errors in the network logic
b. Calculate all ES, EF, LS, LF, Total Float, Path Float, Free Float and Independent Float values. Show all values on the diagram. Show the critical path.
2.The project will start on Monday October 2nd. Prepare a Project Date – Calendar Date conversion chart for the entire project. The template file is in <CON 4000 HW 05 Project – Calendar date correlation template.xls>. You are working a normal 5 day, 40 hour per week schedule. Holidays are November 10th (Veteran’s Day Observation), and November 23rd and 24th (Thanksgiving). For parts a., b. and c. below sketch a bar chart style schedule for the task on your Project – Calendar date template. The “Mobilize” task is shown on the template as an example. Include Float for non-critical tasks on your bar chart schedule.
a. What is the calendar completion date of the project?
b. What is the earliest date that you can schedule a pressure test of the building fire hydrants with the fire department?
c. What is the earliest date that you can schedule a test of the building fire sprinkler system with the fire department?
3. It is now Friday afternoon on October 13th.The owner just gave you a change order to use a different style of windows and doors for the front entrance. Your window supplier informed you that if you order today, the windows will arrive on the job November 6th by regular freight. Installation can begin the day after the windows and doors arrive.
a. What tasks does this change order affect in your schedule?
b. Is it possible to keep the project on schedule to finish on the original completion date? If your answer is “yes,” explain how you would accomplish this. If you answer is “no,” explain why you cannot accomplish this.
c. The windows can be shipped by air freight and arrive November 2nd. This will cost an additional $900.00.Should you choose the air freight? Explain your answer.
d. What additional expenses, if any, will be caused by this change? If there are additional expenses, who should pay for them? Explain your answer.
[supanova_question]
CIS527 Strayer University Managing Organizational Risk Discussion Computer Science Assignment Help
Managing Organizational Risk
Week 9 and worth 100 points
No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans. Nowadays, due to the plethora of cautionary tales that organizations history provide, business leaders are informed on the need to manage risk and understand the crucial role of an organization’s IT infrastructure on its ability to perform business.
A computer incident response team (CIRT) plan can help prepare organizations for incidents that might occur.
Write an eight to ten (8-10) page paper in which you:
- Describe the objectives and main elements of a CIRT plan.
- Analyze the manner in which a CIRT plan fits into the overall risk management approach of an organization and how it supports other risk management plans.
- Provide at least two (2) examples of how CIRT plans define the who, what, when, where, and why of the response effort.
- Analyze the manner in which the development of a CIRT plan enables management to adopt a more proactive approach to risk management. Include recommendations for remaining proactive in the continual improvement and update of CIRT plans.
- Infer on the evolution of threats over the last decade that organizations must now consider.
- Predict the evolution of regulatory requirements mandating risk management processes and plans.
- Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Create a Computer Incident Response Team (CIRT) plan for an organization in a given scenario.
- Use technology and information resources to research issues in IT risk management.
- Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions
[supanova_question]
Client Diet Analysis Food Recommendations Journal Portfolio Assignment Health Medical Assignment Help
Using your own diet analysis, set up a dietary consultation as if you were with a client. The client may be fictional or yourself
- Create a goal for your “client”. It can be a made up goal or one that you have for yourself.
- Analyze your diet by looking at the diet and exercise as a whole over the duration of your journal
Some things to include:
- Determine any dietary suggestions that may be necessary to meet the client’s goal
- Does the client (or you) eat more over the weekend?
- Does the client (or you) eat more during the week?
- Do your exercise patterns change during the week compared to the weekend?
- Does your macronutrient (Fat, Protein, and Carbohydrates) break out work towards the overall goal for yourself or your “client? If yes, Explain why. If no, How can you improve to meet the nutritional goal?
- Based on your Food log, clients body composition, and overall health goal- determine if the goal was realistic to achieve. If yes, explain why. If not, how would you help them to create a realistic goal
Your food recommendations paper should be a minimum of 2-3 pages in length, APA formatted, properly cited reference page, 12 point font
Step 2: Create a Food Journal Portfolio
Include in this order:
- Title page
- Personal Food Journal
- Food Journal Analysis
- Food Recommendations for a fictional client or yourself
- Reference Page
All components to your portfolio must be presented in essay style APA format, include properly cited reference page, title page, and 12 point font
[supanova_question]
Lynn University Mexico’s Trends and Global Challenge Writing Assignment Help
Recommended Length: 6-8 pages, double-spaced in 12pt font. APA Format.
This paper will incorporate findings on your country’s background in which you include key demographics and trends on education, family, religion, deviance and social control norms (statistics related to justice), as well as development (human development, poverty and inequality). Then, you will provide your country’s perspective on the global challenge you selected that is based on the following theme: Overcoming the Global Food, Fuel and Water Crisis. The policy paper should involve the background of the issue, an analysis, and specific recommendations for action. In addition to providing your country’s recommendations for actions, you should highlight at least one way in which your country’s government, a governmental or non-governmental organization, or group of citizens has taken steps to overcome the issue. Incorporate the structural functionalist theory into your paper
ources for this analysis (10 total) should include the UN readings and website (UNDP and MDG sites), current articles gathered from newspaper and at least three (3) scholarly journal sources. In your research, pay particular attention to ways the country (government, organization or citizen group) has overcome the issue. Please refer to APA style for proper citation, footnotes and bibliography format
[supanova_question]
[supanova_question]
CIS534 Strayer University Week Secure Network Project Computer Science Assignment Help
Designing a Secure Network
Due Week 9 and worth 110 points
This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work.
Write a paper in which you complete the following three (3) parts. Note: Please use the following breakdown to complete your assignment:
- Overall network diagram
- Datapath diagrams (one for each of the steps in the scenarios below)
- Write-up
Part 1
1a. Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed, from the user or endpoint device to the Internet cloud, and everything in between, in which you:
- Follow the access, core, distribution layer model.
- Include at a minimum:
-
- The authentication server (i.e. Microsoft Active Directory)
- Routers
- Switches (and/or hubs)
- Local users
- Remote users
- Workstations
- Files share (i.e. CIFS)
- Mail server
- Web servers (both internal and external)
- Firewalls
- Internet cloud
- Web proxy
- Email proxy
- FTP server (for internal-to-external transport)
1b. Explain each network device’s function and your specific configuration of each networking device.
1c. Design and label the bandwidth availability or capacity for each wired connection.
Part 2
2a. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@Corp534.com sends an email to user534@yahoo.com.
- Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
- Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
- Show user authentication when necessary.
2b. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
- Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
- Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
- Show user authentication when necessary.
2c. Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to https://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
- Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
- Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow.
- Show user authentication when necessary.
2d. Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
2e. Explain how your layered design compensates for possible device failures or breaches in network security.
2f. Determine whether any possible bottlenecks exist in your design.
2g. Explain how to make the file transfer process more secure.
Part 3
1. Use at least five (5) quality resources in this assignment. (Note: Wikipedia and similar websites do not qualify as quality resources.)
2. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
3. Your assignment must follow these formatting requirements:
- Use proper APA format.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page (if applicable) are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
- Identify network security tools and discuss techniques for network protection
- Describe the foundational concepts of VPNs.
- Design a secure network to address a business problem.
- Use technology and information resources to research issues in network security design.
- Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.
CIS534 Strayer University Week Secure Network Project Computer Science Assignment Help[supanova_question]
CSU Global Campus Cost Identification Within the Manufacturing Process Paper Business Finance Assignment Help
Option #2: Cost Identification within the Manufacturing Process
Find the website for a beverage manufacturer/packager that describes the manufacturing process. Then use Microsoft Word to complete the following requirements:
- Identify the company, its website and what it produces/packages.
- BRIEFLY outline or flowchart the production process.
- Define cost object and identify the cost object in the selected company’s process. (There may be more than one but stick to one for this assignment.)
- From the process outlined in step 2, identify and list 15-20 costs incurred in the process (e.g., maintenance on machinery).
- Using the cost object identified in step 3, group the identified costs into the following categories: direct variable, direct fixed, indirect variable, or indirect fixed cost.
- Conclude your assignment by explaining what each category of costs is used for in calculating the costs of goods manufactured.
In your analysis, include the following:
- An introduction (#1),
- Requirements # 2 – 5, and
- Conclusion (#6).
Your paper must meet the following requirements:
- Your written paper should be three to four pages in length, not counting the title and reference pages, which you must include.
- Use terms, evidence, and concepts from class readings.
- Your paper must be formatted according to the CSU-Global Guide to Writing and APA Requirements (Links to an external site.).
- In addition to the textbook, cite at least three scholarly sources from the CSU-Global Campus Library (Links to an external site.)published in 2015 or newer.
- If you need assistance with your writing style, start with
[supanova_question]
NAF101 University of Nairobi Mesopotamia and Egypt Essay Writing Assignment Help
Must use one citation from here: https://drive.google.com/file/d/1iaPAW3ng2t-5YAtry…
Answer one short answer and one essay question. For full credit, you must use information from the class text reading and the outside sources to provide detail in your essays. You will need to show an understanding of world prehistory as well as critical thinking; your essays should reflect that you know the materials we have covered this term. Be sure to use specific examples from your readings, films, lectures, and web links from this course, and you must use parenthetical in-text citations and provide a bibliography. BUT, do not use extensive direct quotes – answers should be written in your own words with use of brief (less than one sentence) direct quotes only when absolutely necessary. Your short answer should be about 0.5 page in length, and the long essay is to be at least 1.5 pages. Your answers should be single-spaced, 12 pt font, 1 inch margins. This part of your final exam is worth 60 points in total (essay and short answer); the separate objective part is 30 points.
SHORT ANSWER CHOICES (choose one of three; 15 pts; approximately 1/2 page):
- You have been asked to conduct an excavation in a tell site located in Iraq. You have learned that the tell mound is roughly 30 m high and 400 meters across. Preliminary testing suggests that it has occupations going back to approximately 2000 BC. In preparation for this project you must set up a research plan and pose some questions that you hope to answer based on excavations in this large site. Briefly, describe what the site would be like and what archaeological questions you would most likely be able to address given the information about the site’s size and location. Provide at least two examples of other sites similar to this one and discuss what kinds of evidence they have provided.
- Briefly discuss how the site of Çatalhöyük differs from, and is similar to, the site of an early city in China or in India/South Asia approximately 4000-5000 years ago. How do the time frames compare? Are the two sites equally representative of early settlements of the Old World? What similarities or differences are apparent in terms of social, economic, and political factors?
- Briefly summarize the use of writing in early civilizations, and in particular for the emerging Mayan system. What kind of writing was developed there, where do we find examples of it, what was it used for, and in what ways is it archaeologically recognizable? How are we able to translate the texts today?
LONG ESSAY CHOICES (choose one of two; 45 pts; at least 1.5 pages):
- Choose one of the following regions that was discussed in Chapter 9 – Mesoamerica, West Asia/Mesopotamia, or South America (the discussion of these is expanded in Chpts 10, 12, and 13) – and describe the (1) social, (2) economic, and (3) religious changes that were associated with the growth of complexity there. Your discussion should explicitly focus on the period from the onset of domestication/agriculture to the eventual ‘collapse’ of the civilization that you choose. Be sure to describe different time periods and how “social complexity” from each period is understood based on the archaeological record (society at the time of domestication, the chiefdom level society, and a state level society all from the same region that you choose). You must back up your claims with specific archaeological evidence and academic citations.
- Compare and contrast the archaeological records of two state-level societies we have discussed this term. For each, discuss how they were organized with reference to (1) subsistence (e.g., agriculture, water management), (2) economic (e.g., trading, money, writing), (3) social (e.g., social inequality/hierarchy, settlement patterns), and (4) religious (e.g., burials, monumental architecture) systems. Each of the two societies you choose must come from different regions, such as Mesopotamia, Mesoamerica, Europe, India, etc. You must back up your claims with specific archaeological evidence and academic citations.
[supanova_question]
SEC007 Northern Oklahoma College Revenge in Hamlet Paper Humanities Assignment Help
Write a 3- 4 page paper on ANY Theme from Hamlet. There are several from which to choose.
Your paper should be academically sound and include FIVE sources. The text can count as one of the five. You can use MLA or APA, footnotes or brackets, whatever style you prefer so long as the work is properly and credibly cited. Single spaced is fine for 3 pages but double spaced should be closer to five. You are welcome to go over the limit Your works cited page is not part of the page count.
[supanova_question]
Rider University Sticky Social Media Discussion Writing Assignment Help
1) Provide two paragraphs and describe the campaign of Always: #LikeAGirl. Specifically focus on what makes the campaign “sticky” (Sticky: This is content that is developed in order to gain the users’ attention and increase the possibility that he or she will share the content with others) by discussing the following four features: Storytelling, Social Currency, Influencers, Shareability.
Always and #LikeAGirl
Always has a way of sending its message across loud and clear. And with #LikeAGirl they decided to do just that, while also empowering young girls around the world.
Done in 2014, Always started a hashtag campaign #LikeAGirl promoting the fact that women and girls should not be influenced by society’s expectations. Started with a video on YouTube, the campaign told the story of young girls who were breaking the mold of what is “girl”-ish and what is not. The video initially starts with people who are expressing the common expectations of what is to “throw like a girl,” “run like a girl,” and so on. Then the video goes in to show what real young girls think of these phrases and that “like a girl” shouldn’t be a phrase used to symbolise weakness, but instead strength.
The campaign was highly successful and while it is difficult to see this ad for the empowering message it is through the lense of our 2018 politically segregated and divided society, it definitely shows that our core we should all be #LikeAGirl – treating everyone equally and doing our best to succeed.
Check it out here: https://www.youtube.com/watch?v=XjJQBjWYDTs
[supanova_question]
https://anyessayhelp.com/