Assume a file containing a series of words is named words.txt and exists on the computer’s disk. The program should generate the set of unique words in the document and display the number of times each word in the list appears in the document.
In: Computer Science
Please explain as much as possible.
1. Demonstrate an understanding of how Intrusion Detection Systems and protocol analyzers work.
2. Demonstrate an understanding of how to use event logs, session data, and network communication to find and remediate network intrusions
3. Demonstrate understanding of network security monitoring and incident response
In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
In: Computer Science
Review and summarize your ideas about what it means according to the textbook to be a good IT manager and then also what it means to be a good IT professional reporting to a good IT manager.
In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
In: Computer Science
Write a java program using the following instructions:
Write a program that determines election results. Create two parallel arrays to store the last names of five candidates in a local election and the votes received by each candidate. Prompt the user to input these values. The program should output each candidates name, the votes received by that candidate, the percentage of the total votes received by the candidate, and the total votes cast. Your program should also output the winner of the election. To do this, write the following method: findHighest which receives an array of int. It determine the highest value in the array and returns the location of that value. Call this method to determine the location of the highest value in your votes array, and use this to display the winner from the names array.
SAMPLE OUTPUT:
Enter candidate name: Johnson
Enter votes received: 5000
Enter candidate name: Miller
Enter votes received: 4000
Enter candidate name: Duffy
Enter votes received: 6000
Enter candidate name: Robinson
Enter votes received: 2500
Enter candidate name: Ashton
Enter votes received: 1800
Candidate Votes Received % of Total
Johnson 5000 25.91
Miller 4000 20.72
Duffy 6000 31.09
Robinson 2500 12.95
Ashton 1800 9.33
Total votes: 19300
The winner of the election is Duffy.
In: Computer Science
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
In: Computer Science
In: Computer Science
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.
1. Explain in your own words what happened in the above discussed data breach. [5 Marks]
2. Identify and experience the type of attack experienced in the above scenario [2 Marks]
3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]
4. What would have hackers done for privilege escalation? [2 Marks]
5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]
6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]
In: Computer Science
(Operating System CSE)
Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of blocks. A key issue in such systems is the degree of variability in the size of the extents. What are the advantages and disadvantages of the following schemes? a. All extents are of the same size, and the size is predetermined. b. Extents can be of any size and are allocated dynamically. c. Extents can be of a few fixed sizes, and these sizes are predetermined.3)If all the access rights to an object are deleted, the object can no longer be accessed. At this point the object should also be deleted, and the space it occupies should be returned to the system. Suggest an efficient implementation of this scheme.
In: Computer Science
(Operating System , CSE)
What commonly used computer programs are prone to man-in-the-middle attacks? Discuss solutions for preventing this form of attack.
In: Computer Science
Develop an ERD. If you make additional assumptions, document them as business rules. all entities, relationships, primary keys, foreign keys and weak entities must be labeled. You have been asked to develop a database to help the Wisconsin Snowmobile Association track their club members. The following are the predefined business rules:
1)Snowmobile Clubs are tracked by Wisconsin county.
2)A club can be assigned to multiple counties.
3)Members can belong to one or more clubs.
4)Some clubs could have the same name.
5)New clubs can be started at any time.
6)The Wisconsin Snowmobile Association has an elected Executive Board consisting of a President, Vice President, Secretary, Treasurer and Executive Director, all of whom must be current members.
7)Each county must have a Director and a Representative.
8)Each club has a President, Vice-President, Secretary and Treasurer.
In: Computer Science
[x, y, and z are integer variables, which expressions are equivalent to each other?]
a. (x==y && x !=z) || (x!=y && x==z)
b. (x==y || x==z) && (x!=y || x!=z)
c. (x==y) != (x==z)
In: Computer Science
Cancer is so prevalent in our society that we can often gloss over commercials that focus on their treatment. Your task this week is to find a commercial for a commercially available drug meant to treat any type of cancer (meaning whatever type of cancer you want).
In: Computer Science
Discuss the following with neat diagram
a.Virtualization and its types
b.Hypervisor
(Operating System , Computer Science and Engineering )
In: Computer Science