+1(316)4441378

+44-141-628-6690

Archive for the ‘Computer science’ Category

Any topic (writer’s choice)

Submit a paper which is no more than 4-pages, exclusive of the reference page. Paper should be double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. The paper should cite at least six sources in APA format. 

Develop a case report for the Zara case using case report rubric and guidelines
Case report must integrate your concepts along with the input of your peers from the discussion assignment conducted in the previous unit.
Be sure to read the Guidelines for Case Studies and the review the rubric before beginning this assignment. See enclosed.

SoCeRJ: Java Source Code Recommendation Technique for Code Reuse

FOLLOW THE RESEARCH SAMPLE I PROVIDED AS WELL AS THE INSTRUCTIONS BELOW:


Use the IEEE Conference Paper Template (https://www.ieee.org/conferences_events/conferences/publishing/templates.html) for submission. Total length must be at least 5 FULL pages for a team of 5. There is no maximum limit. Important: Page limits are excluding the references.
Each of the projects had some research components and the goal of this paper is to present the current state of the art of the domain (i.e. Literature Review), how any/some of those research challenges have been addressed by the team as well as to detail the proposed techniques/solutions/algorithms applied by the teams accompanied with the supporting performance/evaluation/comparison results, followed by a brief discussion on the future directions.
Outline:
Abstract (5 Points)
Introduction of any research problem and the system (10 Points)
A detailed literature review covering at least 5 latest (i.e. no more than 5 ye

Investigation

Investigation Scenario 2: Part 2 and Submission

In completing this second part of the investigation we began last week, you will have the experience of searching for evidence in multiple log files.  Very often in an investigation like this, there is no smoking gun, only bits of circumstantial evidence that you will have to piece together to create a time line that helps you to recreate the crime.

Hint: One big question in this investigation is how did the perpetrator exfiltrate the data when it appears that the defense contractors network was locked down tight.  You should take a look at port numbers in the firewall log to see what services are run on those numbers, especially if it is a port that we havent talked about before.

All of the log files, with the exception of the key card file, are based on real log files.  Part of your challenge in this assignment is to dig through all of the data you dont need to find the data you do.  In the e-ma

McNorton Dunham Investigation

Investigation Scenario 2: Part 2 and Submission

In completing this second part of the investigation we began last week, you will have the experience of searching for evidence in multiple log files.  Very often in an investigation like this, there is no smoking gun, only bits of circumstantial evidence that you will have to piece together to create a time line that helps you to recreate the crime.

Hint: One big question in this investigation is how did the perpetrator exfiltrate the data when it appears that the defense contractors network was locked down tight.  You should take a look at port numbers in the firewall log to see what services are run on those numbers, especially if it is a port that we havent talked about before.

All of the log files, with the exception of the key card file, are based on real log files.  Part of your challenge in this assignment is to dig through all of the data you dont need to find the data you do.  In the e-ma

Cyber Security

Read through each report below:

Vilcinskas, M. (n.d.). Security entities building block architecture (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723497.aspx
Dodds, T., & Pfeil, K. (n.d.). Security considerations for end systems (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723491.aspx
Microsoft Developer Network. (n.d.). Security considerations for administrative authority (Links to an external site.). Retrieved from https://msdn.microsoft.com/en-us/library/cc723501.aspx
Based on the whitepapers as well as outside sources and class readings, respond to the following:

What are the goals and objectives of enterprise security architecture?
How does enterprise security architecture within the articles support business goals and strategy?
What are some of the important complexities to consider when developing the enterprise security architecture? Why?
Discuss the importa

Cyber Warfare: Comm on the Internet and hazzards

Essay Question: We are a highly technical society. Our everyday lives revolve around the Internet: we benefit from the Internet, but we can also be victims of cyber criminals. To understand how criminals use the Internet to their advantage, one must understand how we communicate on the Internet. In this paper, you are required to describe in detail how we communicate on the Internet, based upon your readings. Discuss the major networking building blocks and their functions. Secondly, discuss software applications' vulnerabilities, such as those found in web browsers.

General Requirements

1. Document Format.

a. MS Word document

b. One-inch (1") margins

c. Times New Roman font

d. Twelve (12) pitch

e. Not including your title page, this assignment should be 4-6 pages.

f. Double space, except for your bibliography's citations.

g. You must use 5 scholarly sources in supporting this assignment.

2. Citation Format: The Chic

Ethical Hacking – Password Hashes

Password Hashes

After your lab experience with password hashes, lets look at the Cisco, Windows, and Linux password hashes in the list below.

What is a password hash?
RedHat and Cisco passwords are salted while Windows passwords are not. What does that mean?
What are some software tools that can be used to crack password hashes?
Are there any websites that can be used to crack passwords?
If you can crack any of the passwords, post your findings.

Again, this is not intended to be an extensive assignment. You shouldnt have to spend a lot of time to answer the questions.

Finally, what do you feel are some best practices to avoid having your own personal passwords cracked? Note: If a word is listed before the hash, that is the username being provided.

Cisco Type 7

08224D42001F0A051C020D

0832595C0F1C17

Cisco Type 5

$1$mERr$hx5rVt7rPNoS4wqbXKX7m0

Windows

eagles:"":"":B100E9353E9FA8E8E72C57EF50F76A05:4767

Collaboration in Workplace Communication / Feasibility Report

A. Collaboration in Workplace Communication
Being able to collaborate effectively in the workplace is vital.  Share an experience you have had with collaboration (either in the workplace or in a class).  Share what worked and what didnt.  If you could do it over again, what would you change to make it more effective?
At least 75-100 words

B. : Reflect on the process of creating the feasibility report.  Did you experience any challenges?  Did anything take you by surprise?  What was the most interesting thing you learned about the idea you will be proposing?
Memo format.
        Clear, focused writing with minimal errors.
        A minimum of two paragraphs.
        A demonstration of reflection and critical thinking.

C. Feasibility Report
The purpose of this report is to analyze the feasibility of your formal proposal.  Your final project will be a formal

Computer Science – Technical writing

A. Memos, emails, and Business Letters
The professional world communicates on a daily basis using correspondence such as memos, emails, and business letters. explain each of these documents and the qualities that make them effective.  ( use a source for your description.)  Then share which you use most often in your professional life and the steps you take to ensure you are clear and effective.
At least 100-150

B.  Reflect on the language used in your professional field.  What jargon is used by your field?  What are the standards channels of communication for your field?  Also, what was the most important thing you learned this week about communication in your field?
        Memo format.
        Clear, focused writing with minimal errors.
        A minimum of two paragraphs.
        A demonstration of reflection and critical thinking.

C. Res

FVEY Indicator Sharing Report

Now that you have analyzed the .pcap contents, you and your team of analysts will prepare mitigation (risk analysis and mitigation) for this current attack as well as any future attacks. You will also provide risk countermeasure implementation to a data exfiltration attack. Compile these strategies in a FVEY Indicator Sharing Report to be shared with your FVEY allies. Include Snort rules signatures and prepare rules for firewalls that would have prevented the data exfiltration attack. Review these resources on intrusion detection and prevention (IDS/IPS) systems and IDS/IPS classification to refresh your understanding of communications and network security, intrusion detection, and intrusion prevention.

Your report should include the following:

other possible sources of vulnerabilities and best practices to protect endpoints.

indicators for data exfiltration.

methods for protection in bring your own device (BYOD) mobile security.

an explanation of th