Questions
They use the team "It's in the cloud!" has to be one of the most overused...

They use the team "It's in the cloud!" has to be one of the most overused IT phrases in the last few years. But what does it actually mean?

Please define what exactly the cloud is and what can be done "in the cloud". Also research and define the following two related topics:

-Software as a Service (SAAS)

-Application Service Provider (ASP)the main post must be at least 200 words.

In: Computer Science

The devices designed for the purpose of addressing security in the network generate a number of...

The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.

In: Computer Science

The devices designed for the purpose of addressing security in the network generate a number of...

The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.

In: Computer Science

A number of security devices can be placed at appropriate places in the network architecture to...

A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.

In: Computer Science

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems...

Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.

1. Explain in your own words what happened in the above discussed data breach. [5 Marks]

2. Identify and experience the type of attack experienced in the above scenario [2 Marks]

3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]

4. What would have hackers done for privilege escalation? [2 Marks]

5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]

6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]

In: Computer Science

******IN JAVA******** I need the following interface implemented accordingly. It is a linked list. The interface...

******IN JAVA********

I need the following interface implemented accordingly. It is a linked list. The interface can be found below:

List.java

public interface List<T> extends Iterable<T> {
    /**
     * Insert an element at a specified location.
     * @param index
     * @param obj
     * @throws IndexOutOfBoundsException
     */
    public void add(int index, T obj);
    
    /**
     * Append an object to the end of the list.
     * @param obj
     */
    public boolean add(T obj);
    
    public void clear();
    public boolean contains(T obj);
    
    /**
     * If obj is in the list, return the 
     * index of the first occurrence.
     * Otherwise, return -1.
     * @param obj
     * @return 
     */
    public int indexOf(T obj);
    
    public boolean isEmpty();
    
    public int lastIndexOf(T obj);
    
    /**
     * Get and return the value stored at the index.
     * 
     * @param index
     * @return
     * @throws IndexOutOfBoundsException
     */
    public T get(int index);
        
    public T remove(int index);
    public boolean remove(T obj);
    
    /**
     * Update the value in the list at the specified index.
     * Return the old value
     * @throws IndexOutOfBoundsException
     * @param index
     * @param obj
     * @return 
     */
    public T set(int index, T obj);
    
    public int size();
    
    public Object[] toArray();
}

I also need the following driver modified so that it works with the implementation:

ListDriver.java

import java.util.Iterator;


public class ListDriver {

    /**
     * @param args the command line arguments
     */
    public static void main(String[] args) {
        int i = 0;
        List<String> names = new AList<>(5);
        names.add("Alice");
        names.add("Bob");
        names.add("Carol");
        names.add(1, "Eve");
        names.add("Eve");
        for (String name : names)
            System.out.println((i++) + ":" + name);
        i=0;
        System.out.println("Size (should be 5): " + names.size());
        System.out.println("IndexOf(Eve) (should be 1): " + names.indexOf("Eve"));
        System.out.println("LastIndexOf(Eve) (should be 4): " + names.lastIndexOf("Eve"));
        System.out.println("Remove Eve (should be true):" + names.remove("Eve"));
        System.out.println("Size (should be 4): " + names.size());
        System.out.println("IndexOf(Eve) (should be 3): " + names.indexOf("Eve"));
        System.out.println("LastIndexOf(Eve) (should be 3): " + names.lastIndexOf("Eve"));
        for (String name : names)
            System.out.println((i++) + ":" + name);
        i=0;
        System.out.println("Remove Eve (should be true):" + names.remove("Eve"));
        System.out.println("Size (should be 3): " + names.size());
        System.out.println("IndexOf(Eve) (should be -1): " + names.indexOf("Eve"));
        System.out.println("LastIndexOf(Eve) (should be -1): " + names.lastIndexOf("Eve"));
        System.out.println("Size (should be 3): " + names.size());
        System.out.println("Remove 0 (should be Alice): " + names.remove(0));
        System.out.println("Size (should be 2): " + names.size());
        names.add(0, "Alice");
        names.add(1, "Eve");
        names.add("Eve");
        names.add(1, "Eve");
        names.add("Eve");
        names.add(1, "Eve");
        names.add(names.indexOf("Carol"), "Eve");
        names.add(0, "Eve");
        names.add("Eve");
        System.out.println("Size: " + names.size());
        for (String name : names)
            System.out.println((i++) + ":" + name);
        i=0;
        System.out.println("Remove all instances of Eve using iterator... ");
        Iterator<String> it = names.iterator();
        while(it.hasNext()) {
            if (it.next().equals("Eve"))
                it.remove();
        }
        for (String name : names)
            System.out.println((i++) + ":" + name);
        i=0;
        System.out.println("Testing clear");
        names.clear();
        System.out.println("Size (should be 0): " + names.size());
        
    }
    
}

Thanks in advance. Will upvote!

In: Computer Science

The Hole Class Description: For the Hole class, there are three instance variables: the par for...

The Hole Class Description:

For the Hole class, there are three instance variables: the par for the hole, the length of the hole in yards, and a Boolean valued indicator of whether the hole is one in which the players’ full drives will be measured for distance. John clarifies: The length of the hole in yards determines par for the hole. The current standard is:

No more than 250 yards

Par 3

251 to 470 yards

Par 4

471 to 690 yards

Par 5

Greater than 690 yards

Par 6

The distance of drives will only be counted as “full” on holes at least 400 yards long. Both the Hole constructor and a setLength method use the length of the hole to calculate the par for the hole and determine whether full drives on the hole will be measured. There are “getters” for the length and the par of the hole and an isFullDriveHole method that returns true if and only if the hole is one where drives are measured.

The Hole Class:

public class Hole
{
// instance variables
private int par;
private int lengthInYds;
private boolean fullDriveHole;
  
/**
* Constructor for objects of class Hole.
*
* @param length of hole in yards
*
**/
public Hole(int length)
{
this.setLength(length);
}
  
/**
* Set the length of the hole and compute its par.
*
* @param length the length in of the hole in yards.
*/
public void setLength(int length)
{
// constants for determining par
final int par3Limit = 250;
  
       // GUIDE: add constants for limits for par 4 and par 5
    // GUIDE: set the length of the hole, initialize the instance variable
       // GUIDE: Write an IF-ELSE for a sequence of comparisons to
       // GUIDE:   assign par based on the length of the hole
       // GUIDE: Be sure to use the constants you defined above
  
// determine if this a driving hole
       // GUIDE: Write code to properly assign a value to this.fullDriveHole
}
  
/**
* get the length of the hole.
*
* @return int the length of the hole in yards.
*/
public int getLength()
{
return this.lengthInYds;
}
  
/**
* get the par of the hole.
*
* @return int par for the hole.
*/
public int getPar()
{
return this.par;
}
  
/**
* determine if drives are measured on this hole.
*
* @return boolean true iff drives in the fairway are measured.
*/
public boolean isFullDriveHole()
{
return this.fullDriveHole;
}
}

The Hole Class TestCase:

import static org.junit.Assert.*;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;


public class HoleTest
{
/**
* Default constructor for test class HoleTest.
*/
public HoleTest()
{
// not used in this Lab
}
/**
* Test the constructor.
*/
@Test
public void testConstructor()
{
// Create a Hole instance
// GUIDE: Replace this and next line with your code
assertTrue(false);
  
// Test to see if the instance was created
// GUIDE: Replace this and next line with your code
assertTrue(false);
  
// Test the instance variables have been initialized correctly.
// Note - these tests assumes the get methods are correct.
// GUIDE: Replace this and next line with your code
assertTrue(false);
}
  
/**
* Test the setLength method.
*/
@Test
public void testSetLength()
{
// Create a Hole instance
Hole hole1 = new Hole(250);
  
// Change the length of the hole
//hole1.setLength(249);


  
// Test the impact of changing the length to one of a par 3 hole
assertEquals(249, hole1.getLength());
assertEquals(3, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
  
// Add a test for a par 4 that will be measured
  
// GUIDE: Replace this and next line with your code
hole1.setLength(460);
  
assertEquals(460, hole1.getLength());
assertEquals(3, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
  
// Add a test for par 5
// GUIDE: Replace this and next line with your code
hole1.setLength(475);
  
assertEquals(475, hole1.getLength());
assertEquals(5, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
  
// Add a test for par 6
// GUIDE: Replace this and next line with your code
hole1.setLength(695);
  
assertEquals(695, hole1.getLength());
assertEquals(6, hole1.getPar());
assertFalse(hole1.isFullDriveHole());   
}
}

In: Computer Science

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.

1. Identify the malware attack experienced in the above scenario

2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations

In: Computer Science

The devices designed for the purpose of addressing security in the network generate a number of...

The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network

In: Computer Science

writing a memo for the teacher about the problem of an online exam?!.

writing a memo for the teacher about the problem of an online exam?!.

In: Computer Science

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.

1. Identify the malware attack experienced in the above scenario

2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations

In: Computer Science

Using classes and array data structure write methods with algorithms for a software that an airline...

Using classes and array data structure write methods with algorithms for a software that an airline can use to view available/booked seats, management booking, canceling booking and reorder seats. The solution should consist of a minimum of two classes with one class containing the main method and second class for managing a manipulating data. The choice of data structure for this assignment will be static one dimension arrays. in C++

In: Computer Science

A number of security devices can be placed at appropriate places in the network architecture to...

A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.

Above lines are question for 5 marks, they haven't given any other info. Thats the whole info please if you guys can solve help me.

In: Computer Science

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to...

An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.

1. Identify the malware attack experienced in the above scenario

2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations?

In: Computer Science

Problem A. The pseudocode as below illustrates the basic push() and pop() operations of an array-based...

Problem A. The pseudocode as below illustrates the basic push() and pop() operations of an array-based stack, where top is initialized as 0 when the stack is empty. Assuming that at a given moment, SIZE is equal to 20, top is equal to 8, this code is used in a concurrent environment (top and stack[] are in shared memory section), process P0 is about to call push() and process P1 is about to call pop() concurrently

a. Which variable has a race condition? What are the items on stack when top is equal to 8 (hint: stack[0], stack[1] …, stack[???])


b. In which order LINES A, B, X, and Y are executed such that an item is correctly pushed onto the stack as stack[i] by P0 first and then popped out by P1? What is the value of i? What is the value of top when P0 is done with pushing? What is the value of top when P1 is done with popping?

c. In which order LINES A, B, X, and Y are executed such that an item stack[j]is correctly popped out of the stack by P1 first and then P0 pushes an item onto the stack as stack[k]? What are the values of j and k? What is the value of top when P1 is done with popping? What is the value of top when P0 is done with pushing?

d. In which order LINES A, B, X, and Y are executed such that P0 adds an item onto the stack as stack[8] first, then P1 reads stack[7], finally top still remains as 8 after both P0 and P1 are done? This is a case where P0’s push operation is voided. e. In which order LINES A, B, X, and Y are executed such that P0 first incorrectly replaced the original item stack[7] on stack with its new item, then P1 reads stack[8] with a random value, finally top still remains as 8 after both P0 and P1 are done? This is a case where P1’s pop operation is voided.

void push(int item) {
if (top < SIZE) {
stack[top] = item; // LINE A
top++; // LINE B
} else
ERROR
}

int pop() {
if (top > 0) {
top--; // LINE X
return stack[top]; // LINE Y
} else
ERROR
}

In: Computer Science