Questions
Assume a file containing a series of words is named words.txt and exists on the computer’s...

Assume a file containing a series of words is named words.txt and exists on the computer’s disk. The program should generate the set of unique words in the document and display the number of times each word in the list appears in the document.

In: Computer Science

Please explain as much as possible. 1. Demonstrate an understanding of how Intrusion Detection Systems and...

Please explain as much as possible.

1. Demonstrate an understanding of how Intrusion Detection Systems and protocol analyzers work.

2. Demonstrate an understanding of how to use event logs, session data, and network communication to find and remediate network intrusions

3. Demonstrate understanding of network security monitoring and incident response

In: Computer Science

The devices designed for the purpose of addressing security in the network generate a number of...

The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.

In: Computer Science

Review and summarize your ideas about what it means according to the textbook to be a...

Review and summarize your ideas about what it means according to the textbook to be a good IT manager and then also what it means to be a good IT professional reporting to a good IT manager.

In: Computer Science

The devices designed for the purpose of addressing security in the network generate a number of...

The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.

In: Computer Science

Write a java program using the following instructions: Write a program that determines election results. Create...

Write a java program using the following instructions:

Write a program that determines election results. Create two parallel arrays to store the last names of five candidates in a local election and the votes received by each candidate. Prompt the user to input these values. The program should output each candidates name, the votes received by that candidate, the percentage of the total votes received by the candidate, and the total votes cast. Your program should also output the winner of the election. To do this, write the following method: findHighest which receives an array of int. It determine the highest value in the array and returns the location of that value. Call this method to determine the location of the highest value in your votes array, and use this to display the winner from the names array.

SAMPLE OUTPUT:

Enter candidate name: Johnson

Enter votes received: 5000

Enter candidate name: Miller

Enter votes received: 4000

Enter candidate name: Duffy

Enter votes received: 6000

Enter candidate name: Robinson

Enter votes received: 2500

Enter candidate name: Ashton

Enter votes received: 1800

Candidate           Votes Received % of Total

Johnson 5000 25.91

Miller 4000 20.72

Duffy 6000 31.09

Robinson 2500 12.95

Ashton 1800 9.33

Total votes: 19300

The winner of the election is Duffy.

In: Computer Science

A number of security devices can be placed at appropriate places in the network architecture to...

A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.

In: Computer Science

Imagine a tollbooth at a bridge. Cars passing by the booth are expected to pay a...

Imagine a tollbooth at a bridge. Cars passing by the booth are expected to pay a 50 cent
toll. Mostly they do, but sometimes a car goes by without paying. The tollbooth keeps
track of the number of cars that have gone by, and of the total amount of money collected.

Model this tollbooth with a class called tollBooth. The two data items are a type
unsigned int to hold the total number of cars, and a type double to hold the total amount
of money collected. A constructor initializes both of these to 0. A member function called
payingCar() increments the car total and adds 0.50 to the cash total. Another function,
called nopayCar(), increments the car total but adds nothing to the cash total. Finally, a
member function called display() displays the two totals.

In: Computer Science

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.

1. Explain in your own words what happened in the above discussed data breach. [5 Marks]

2. Identify and experience the type of attack experienced in the above scenario [2 Marks]

3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]

4. What would have hackers done for privilege escalation? [2 Marks]

5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]

6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]

In: Computer Science

(Operating System CSE) Consider a file system in which a file can be deleted and its...

(Operating System CSE)

Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of blocks. A key issue in such systems is the degree of variability in the size of the extents. What are the advantages and disadvantages of the following schemes? a. All extents are of the same size, and the size is predetermined. b. Extents can be of any size and are allocated dynamically. c. Extents can be of a few fixed sizes, and these sizes are predetermined.3)If all the access rights to an object are deleted, the object can no longer be accessed. At this point the object should also be deleted, and the space it occupies should be returned to the system. Suggest an efficient implementation of this scheme.

In: Computer Science

(Operating System , CSE) What commonly used computer programs are prone to man-in-the-middle attacks? Discuss solutions...

(Operating System , CSE)

What commonly used computer programs are prone to man-in-the-middle attacks? Discuss solutions for preventing this form of attack.

In: Computer Science

Develop an ERD. If you make additional assumptions, document them as business rules. all entities, relationships,...

Develop an ERD. If you make additional assumptions, document them as business rules. all entities, relationships, primary keys, foreign keys and weak entities must be labeled. You have been asked to develop a database to help the Wisconsin Snowmobile Association track their club members. The following are the predefined business rules:

1)Snowmobile Clubs are tracked by Wisconsin county.

2)A club can be assigned to multiple counties.

3)Members can belong to one or more clubs.

4)Some clubs could have the same name.

5)New clubs can be started at any time.

6)The Wisconsin Snowmobile Association has an elected Executive Board consisting of a President, Vice President, Secretary, Treasurer and Executive Director, all of whom must be current members.

7)Each county must have a Director and a Representative.

8)Each club has a President, Vice-President, Secretary and Treasurer.

In: Computer Science

[x, y, and z are integer variables, which expressions are equivalent to each other?] a. (x==y...

[x, y, and z are integer variables, which expressions are equivalent to each other?]

a. (x==y && x !=z) || (x!=y && x==z)

b. (x==y || x==z) && (x!=y || x!=z)

c. (x==y) != (x==z)

In: Computer Science

Cancer is so prevalent in our society that we can often gloss over commercials that focus...

  1. Cancer is so prevalent in our society that we can often gloss over commercials that focus on their treatment. Your task this week is to find a commercial for a commercially available drug meant to treat any type of cancer (meaning whatever type of cancer you want).


    . use a video that has HTML available for embedding. (or cannot figure out how to embed the video) a link is acceptable

In: Computer Science

Discuss the following with neat diagram a.Virtualization and its types b.Hypervisor (Operating System , Computer Science...

Discuss the following with neat diagram

a.Virtualization and its types

b.Hypervisor

(Operating System , Computer Science and Engineering )

In: Computer Science