Categories
Computer Science

You go to podunk, nd, and find that the local bank encrypts all its information with des.

You go to Podunk, ND, and find that the local bank encrypts all its information with DES. Discuss what you would do.

Categories
Computer Science

We are in chapter 4

I have attached everything you might need for the discussion.
========================================
Also, I have attached the book if you want to use it. We are in chapter 4
========================================
if you have any questions please let me know.

Categories
Computer Science

If you cannot do voiceover, provide detailed talking points within notes section for each slide.

Imagine you are supporting a major security company and the company Chief Information Security Officer (CISO) asks you to create training covering cybersecurity foundational topics. Since you have experience and knowledge gained from this course, you tell the CISO you will create a PowerPoint presentation covering foundational cyber topics. To create the presentation per the CISO request, use course content (ex: textbook, PowerPoint slides, labs, etc.), covering minimum 3 topics from each module. Submit completed presentation before due date (by 930pm Monday September 19). The presentation should only include content from modules 1-6. Minimum requirements below.
1. Presentation topics should directly align with and minimum 3 topics should be covered from each module.
2. Presentation should include text and pictures where appropriate. This is not an essay, balance text with graphics.
3. Your presentation brief should have a title slide including course information, your name, presentation title and professors name and date
4. The presentation should include a references slide at the end with citations for the content used within the brief.
5. The presentation should include an agenda slide highlighting main topics.
6. Format, text, font, visualization should be easy to see/read.
7. Topics from each module should be clearly defined and explained. Describe topics in your own words, avoid copy and paste.
8. Include voiceover PowerPoint verbally explaining topics within each PowerPoint slide. If you cannot do voiceover, provide detailed talking points within notes section for each slide.

Categories
Computer Science

You’ll need to implement both the merge sort and quicksort sorting algorithms.

Using C++, Java, or Python, design a program that creates an array of Card objects, shuffles them, then
sorts them in the following ways:
1. By value
2. By suit and value
You’ll need to implement both the merge sort and quicksort sorting algorithms. For example, you could
use merge sort to sort by value and a quicksort to sort by suit and value.
Your Card class must contain the following two fields:
• value (a String)
• suit (a String)
You may include any additional fields, constructors, or methods in your Card class as you see fit for
your design.
Your array will need to contain 52 Card objects, one for each value of each suit. The values to use are 2
through 10, J, Q, K, and A, with A being the card with the highest value. The suit values to use are H (for
Hearts), D (for Diamonds), C (for Clubs), and S (for Spades).
After building the array, shuffle the array using the Fisher-Yates Algorithm. You must implement this
algorithm yourself.
After shuffling, print each object’s value and suit to show the array was shuffled. The output for each
object printed should be VALUE – SUIT. For example: 2 – H or Q – C
Then, you’ll need to sort the array based on the values. All 2 cards should be at the beginning and all A
cards should be at the end; The suit is irrelevant here. After sorting, print each object’s value and suit
again to show the array was sorted based on the cards’ values.
Finally, you’ll sort the same array based on the suit and value. Clubs should be first, then Diamonds,
then Hearts, then Spades. Each suit should be sorted from 2 through A. After sorting, print each object’s
value and suit again to show the array was sorted based on the cards’ values and suits.

Categories
Computer Science

Set the account name and your name as desired, then tap next.

For this discussion, use your own Android device or an emulated Android device. If you’ve not already set up Android Studio’s phone emulator, complete Real Problem 9-1 before completing this project. This project requires you to use a legitimate email account. If you don’t already have one you can use, you can create a free email account of your choice using email providers such as Gmail, Outlook, or Yahoo.
Follow these steps to manually configure the email client on a mobile device:
Open the Gmail app and then tap Add another email address. Gmail can automatically configure email from many providers. Because it’s essential that you know how to manually configure email on a mobile device, tap Other.
Add your email address and tap MANUAL SETUP. Check with your email provider to determine whether to use POP3 or IMAP. What’s the main difference between these two protocols? What are the ports for these two protocols? What are the secure ports for these protocols?
Enter the password, check Keep me signed in, and tap Sign in. On the next screen, tap Yes to agree to the needed permissions.
Add the incoming server settings for your email provider, or check the server suggested by the Gmail app. Which incoming email server are you required to use? When you’re ready, tap NEXT.
Add the outgoing server settings for your email provider, or check the server suggested by the Gmail app. Which outgoing email server are you required to use? When you’re ready, tap NEXT.
Set your account options as desired, then tap NEXT.
If you were successful, you’ll get a notice confirming that your account is set up. Set the account name and your name as desired, then tap NEXT. If you weren’t successful, backtrack and troubleshoot to solve the problem.
When you’re finished, send an email to a classmate, and check an email sent from someone else to confirm that your email account is working on your smartphone.
It is important to know how to change the settings on an account. What steps are required to change the server settings for the account you just added?
You should also know how to remove an email account from a mobile device. What steps are required to remove the email account you just added?
Write a response in a minimum of 175 words summarizing your experience and answering the questions above. Why do you think it is important to practice these steps? How will this experience and other practice experiences help you in your career?

Categories
Computer Science

Writing assignment with the required reading attached. The board of directors of

Writing assignment with the required reading attached. The board of directors of your company is currently reviewing its cybersecurity policies and procedures. It has asked you to read the article The Inadequacies of the Cybersecurity Information Sharing Act of 2015 in the Age of Artificial Intelligence and to write a brief report describing the following concepts that were included in a report written by the company’s IT department: Cyber threat indicators Defensive measures Indicators of Compromise (IOCs) Raw Observational Data (ROD) Keep in mind, that the board of directors is making business decisions about how to protect the corporation’s business and reputation. So in describing these concepts make sure that you explain why understanding them is important for making business decisions about the company’s cybersecurity posture.

Categories
Computer Science

1500 words/IEEE references. Topic is: – Design a new routing algorithm. Must inc

1500 words/IEEE references. Topic is: – Design a new routing algorithm. Must include the formula used to calculate cost or any other mechanism of determining the next hop, the structure of the L3 packet and what the next hop looks like. Use case of algorithm must be explained

Categories
Computer Science

Write a short essay (roughly 300 words) about some topic related to computing an

Write a short essay (roughly 300 words) about some topic related to computing and/or communication technology that interests you and has social or ethical implications. Describe the background; then identify the social or ethical issues, problems, or questions that you think are important. (Don’t make your essay be just an argument for one point of view. You may express your views if you want to, but first explain what the issues are, why there is a problem or a controversy.) Remember to define the problem and cite at least 2-3 references including the definition source. Your report should have an introductory paragraph (identify the issues and your thoughts (importance), a body (where you identify and discuss issues in-depth), and finally a conclusion where you summarize and indicate your recommended solution or solutions that resolved the issue. Consider all sides or perspectives. In addition, you must include in-text citations linked to your Works Cited page at the end of the document.

Categories
Computer Science

You have been hired to manage the IT network team of Conway Design Firm. Your te

You have been hired to manage the IT network team of Conway Design Firm. Your team is responsible for designing, setting up, and implementing Windows Server 2016 for the organization. Conway Design Firm has two sites, one in New York City and one in Maryland. You are responsible for determining how Windows Server 2016 will be deployed and set up at both sites. You will be expected to design a deployment solution as well as implement the solution for the organization. The company would like to implement the use of virtual machines in the areas where it would be prove most efficient. Conway currently has 60 employees. The employees and departments are listed below: Management Team—5 managers Sales Department—12 employees Design Team—15 employees Human Resources—3 employees IT Staff—4 employees (who manage day-to-day IT duties) Other general project information: Sites: There are two sites—Maryland and New York Equipment: Networking equipment/computers already exist at both locations Please make appropriate assumptions regarding any information gaps in this case scenario. In addition, feel free to add relevant information needed for deploying Windows Server 2016. PROJECT GUIDELINES Adhere to the following guidelines for your project: Your paper should be between 2500 and 3300 words long (approximately 10 to 12 pages, double-spaced). This length excludes the title page as well as graphics, diagrams, tables, and the references page. Font size should be 12 point; use a readable font such as Times Roman or Arial. Use at least five credible resources, and format them according to APA style. For up to two of your references you may use TestOut material or other study materials from this course; the remainder must be external references. Use diagrams and visuals, as appropriate, to demonstrate your solution. Your report must include the following sections and fully address the related topics. Use the following outline format for your report. Introduction: Briefly summarize the highlights of your solution, and list some of the primary reasons behind your plan. (You will discuss this in greater depth in the conclusion.) Features of Windows Server 2016: Explain in detail the features that your team plans to utilize. Server Editions and Deployment: Your solution should answer the following questions: Which edition of WIndows Server will be implemented for all sites, divisions, offices, and so on? Where will the servers be located? Why was this location chosen? How will the servers be deployed? Explain the deployment process. What services and roles will be utilized to deploy the servers? Storage Solution What type of storage will be used? Discuss storage spaces. Active Directory Deployment How many Active Directory domains will be created? How will the sites be created? How will data be duplicated between the sites? How will the organizational units be organized? DNS and DHCP: Explain the following How will DHCP be setup? Explain scopes and number of DHCP server needed. Fault tolerance for DHCP. Exclusions and reservations DNS namespace and zones Virtualization Implementation Where will virtual machines be used and for what purpose? Provide a rationale. Monitoring File and Printer Sharing Number of printers and locations Printer permissions File and folder permissions needed NTFS/share permissions Group Policies What types of group policies are needed? Password policies Audit policies User rights Conclusion and Security Recommendations: In a concluding section, justify your solutions with reference to best practices as well as each solution’s appropriateness for the given scenario, providing rationales. In addition, please provide three to four key recommendations for baseline security hardening of Windows Server 2016 as it relates to your solution.

Categories
Computer Science

The Software Engineering Institute, SEI is located at Carnegie Mellon University

The Software Engineering Institute, SEI is located at Carnegie Mellon University and is the brain trust for CMMI, “Capability Maturity Model Integration”. It is a process improvement methodology which has grown in popularity and usage. So far CMMI has been most widely applied in software and systems engineering organizations.
Below are a couple of URL’s which point to relevant web sites which describe and discuss CMMI.
CMMI Institute Overview.: http://cmmiinstitute.com/.
http://www.cmmifaq.info/ (Very extensive web site exclusively dedicated to CMMI FAQs)
Choose a development model, preferably one you have used or using. What are the Process Areas (discuss at least two PAs) that you are missing in your development model? Why do you think they are needed?