They use the team "It's in the cloud!" has to be one of the most overused IT phrases in the last few years. But what does it actually mean?
Please define what exactly the cloud is and what can be done "in the cloud". Also research and define the following two related topics:
-Software as a Service (SAAS)
-Application Service Provider (ASP)the main post must be at least 200 words.
In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network.
In: Computer Science
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
In: Computer Science
Assume a scenario where the hackers gained access to information through malware on Point-of-Sale (POS) systems of more than million credit and debit card. The firewall had captured the first malware code and an alert was issued which was ignored. The hackers started downloading the collected data. The cyber criminals have hacked the system to gain credit and debit card information.
1. Explain in your own words what happened in the above discussed data breach. [5 Marks]
2. Identify and experience the type of attack experienced in the above scenario [2 Marks]
3. The stolen credentials alone are not enough to access the company’s POS devices. What other means can the hackers acquire to allow them to navigate the company’s network and deploy the malware. [3 Marks]
4. What would have hackers done for privilege escalation? [2 Marks]
5. The organization admitted that they ignored many alerts from their network security devices because of alert overload. If you are the organization’s Chief Technical Officer (CTO), what would you do to reduce the problem of alert overload? [3 Marks]
6. The security experts criticize the organization for failing to isolate sensitive sections of their networks from those more easily accessible to outsiders. As a CTO, please propose a feasible solution to segment and categorize your networks and resources. [5 Marks]
In: Computer Science
******IN JAVA********
I need the following interface implemented accordingly. It is a linked list. The interface can be found below:
List.java
public interface List<T> extends Iterable<T> { /** * Insert an element at a specified location. * @param index * @param obj * @throws IndexOutOfBoundsException */ public void add(int index, T obj); /** * Append an object to the end of the list. * @param obj */ public boolean add(T obj); public void clear(); public boolean contains(T obj); /** * If obj is in the list, return the * index of the first occurrence. * Otherwise, return -1. * @param obj * @return */ public int indexOf(T obj); public boolean isEmpty(); public int lastIndexOf(T obj); /** * Get and return the value stored at the index. * * @param index * @return * @throws IndexOutOfBoundsException */ public T get(int index); public T remove(int index); public boolean remove(T obj); /** * Update the value in the list at the specified index. * Return the old value * @throws IndexOutOfBoundsException * @param index * @param obj * @return */ public T set(int index, T obj); public int size(); public Object[] toArray(); }
I also need the following driver modified so that it works with the implementation:
ListDriver.java
import java.util.Iterator; public class ListDriver { /** * @param args the command line arguments */ public static void main(String[] args) { int i = 0; List<String> names = new AList<>(5); names.add("Alice"); names.add("Bob"); names.add("Carol"); names.add(1, "Eve"); names.add("Eve"); for (String name : names) System.out.println((i++) + ":" + name); i=0; System.out.println("Size (should be 5): " + names.size()); System.out.println("IndexOf(Eve) (should be 1): " + names.indexOf("Eve")); System.out.println("LastIndexOf(Eve) (should be 4): " + names.lastIndexOf("Eve")); System.out.println("Remove Eve (should be true):" + names.remove("Eve")); System.out.println("Size (should be 4): " + names.size()); System.out.println("IndexOf(Eve) (should be 3): " + names.indexOf("Eve")); System.out.println("LastIndexOf(Eve) (should be 3): " + names.lastIndexOf("Eve")); for (String name : names) System.out.println((i++) + ":" + name); i=0; System.out.println("Remove Eve (should be true):" + names.remove("Eve")); System.out.println("Size (should be 3): " + names.size()); System.out.println("IndexOf(Eve) (should be -1): " + names.indexOf("Eve")); System.out.println("LastIndexOf(Eve) (should be -1): " + names.lastIndexOf("Eve")); System.out.println("Size (should be 3): " + names.size()); System.out.println("Remove 0 (should be Alice): " + names.remove(0)); System.out.println("Size (should be 2): " + names.size()); names.add(0, "Alice"); names.add(1, "Eve"); names.add("Eve"); names.add(1, "Eve"); names.add("Eve"); names.add(1, "Eve"); names.add(names.indexOf("Carol"), "Eve"); names.add(0, "Eve"); names.add("Eve"); System.out.println("Size: " + names.size()); for (String name : names) System.out.println((i++) + ":" + name); i=0; System.out.println("Remove all instances of Eve using iterator... "); Iterator<String> it = names.iterator(); while(it.hasNext()) { if (it.next().equals("Eve")) it.remove(); } for (String name : names) System.out.println((i++) + ":" + name); i=0; System.out.println("Testing clear"); names.clear(); System.out.println("Size (should be 0): " + names.size()); } }
Thanks in advance. Will upvote!
In: Computer Science
The Hole Class Description:
For the Hole class, there are three instance variables: the par for the hole, the length of the hole in yards, and a Boolean valued indicator of whether the hole is one in which the players’ full drives will be measured for distance. John clarifies: The length of the hole in yards determines par for the hole. The current standard is:
No more than 250 yards |
Par 3 |
251 to 470 yards |
Par 4 |
471 to 690 yards |
Par 5 |
Greater than 690 yards |
Par 6 |
The distance of drives will only be counted as “full” on holes at least 400 yards long. Both the Hole constructor and a setLength method use the length of the hole to calculate the par for the hole and determine whether full drives on the hole will be measured. There are “getters” for the length and the par of the hole and an isFullDriveHole method that returns true if and only if the hole is one where drives are measured.
The Hole Class:
public class Hole
{
// instance variables
private int par;
private int lengthInYds;
private boolean fullDriveHole;
/**
* Constructor for objects of class Hole.
*
* @param length of hole in yards
*
**/
public Hole(int length)
{
this.setLength(length);
}
/**
* Set the length of the hole and compute its par.
*
* @param length the length in of the hole in yards.
*/
public void setLength(int length)
{
// constants for determining par
final int par3Limit = 250;
// GUIDE: add constants for limits
for par 4 and par 5
// GUIDE: set the length of the hole, initialize
the instance variable
// GUIDE: Write an IF-ELSE for a
sequence of comparisons to
// GUIDE: assign par
based on the length of the hole
// GUIDE: Be sure to use the
constants you defined above
// determine if this a driving hole
// GUIDE: Write code to properly
assign a value to this.fullDriveHole
}
/**
* get the length of the hole.
*
* @return int the length of the hole in yards.
*/
public int getLength()
{
return this.lengthInYds;
}
/**
* get the par of the hole.
*
* @return int par for the hole.
*/
public int getPar()
{
return this.par;
}
/**
* determine if drives are measured on this hole.
*
* @return boolean true iff drives in the fairway are
measured.
*/
public boolean isFullDriveHole()
{
return this.fullDriveHole;
}
}
The Hole Class TestCase:
import static org.junit.Assert.*;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
public class HoleTest
{
/**
* Default constructor for test class HoleTest.
*/
public HoleTest()
{
// not used in this Lab
}
/**
* Test the constructor.
*/
@Test
public void testConstructor()
{
// Create a Hole instance
// GUIDE: Replace this and next line with your code
assertTrue(false);
// Test to see if the instance was created
// GUIDE: Replace this and next line with your code
assertTrue(false);
// Test the instance variables have been initialized
correctly.
// Note - these tests assumes the get methods are correct.
// GUIDE: Replace this and next line with your code
assertTrue(false);
}
/**
* Test the setLength method.
*/
@Test
public void testSetLength()
{
// Create a Hole instance
Hole hole1 = new Hole(250);
// Change the length of the hole
//hole1.setLength(249);
// Test the impact of changing the length to one of a par 3
hole
assertEquals(249, hole1.getLength());
assertEquals(3, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
// Add a test for a par 4 that will be measured
// GUIDE: Replace this and next line with your code
hole1.setLength(460);
assertEquals(460, hole1.getLength());
assertEquals(3, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
// Add a test for par 5
// GUIDE: Replace this and next line with your code
hole1.setLength(475);
assertEquals(475, hole1.getLength());
assertEquals(5, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
// Add a test for par 6
// GUIDE: Replace this and next line with your code
hole1.setLength(695);
assertEquals(695, hole1.getLength());
assertEquals(6, hole1.getPar());
assertFalse(hole1.isFullDriveHole());
}
}
In: Computer Science
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.
1. Identify the malware attack experienced in the above scenario
2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations
In: Computer Science
The devices designed for the purpose of addressing security in the network generate a number of logs during the continuous monitoring of the network. Discuss in detail the different types of logs created and how the security professional can use this information for analysing security in the network
In: Computer Science
In: Computer Science
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.
1. Identify the malware attack experienced in the above scenario
2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations
In: Computer Science
Using classes and array data structure write methods with algorithms for a software that an airline can use to view available/booked seats, management booking, canceling booking and reorder seats. The solution should consist of a minimum of two classes with one class containing the main method and second class for managing a manipulating data. The choice of data structure for this assignment will be static one dimension arrays. in C++
In: Computer Science
A number of security devices can be placed at appropriate places in the network architecture to address certain level of security. In reference to this context, explain how a switch can be configured to monitor traffic flowing along its ports.
Above lines are question for 5 marks, they haven't given any other info. Thats the whole info please if you guys can solve help me.
In: Computer Science
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.
1. Identify the malware attack experienced in the above scenario
2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations?
In: Computer Science
In: Computer Science