Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality, integrity, or availability, or some combination of the three. In addition, for each item, write a two- or three-sentence paragraph explaining why your answer is correct.
Alex disables Barbara's router by logging in remotely with the manufacturer's default password.
Mallory builds a WiFi jammer using plans she found on the Internet and jams wireless signals over a large part of her apartment building.
Charlene uses a key logger to capture Darla's banking password.
Eve rewrites the magetic stripe on a gift card to change the amount from $10 to $100.
(Adapted from an exercise in Bishop, Matt, Introduction to Computer Security.)
Part 2: Distinguish among vulnerability, exploit, threat, risk, and control mechanism (called "countermeasure" in chapter one of the text) in five brief paragraphs. If you do any research outside the textbook, which you are encouraged to do, be sure to cite your sources. You can see how to do that in An Example of Proper Writing in the "Required Reading" section.
Part 3: Using the tool at http://www.fileformat.info/tool/hash.htm, compute the SHA-256 checksum of the MS-Word file that is your work on this assignment so far, or some similar file if you don't have that one available. Copy the calculated cryptographic hash into Windows Notepad or word processing document to save it temporarily. Now change one character from a capital to a lowercase letter or vice-versa in the original document, re-save, and recompute the the cryptographic hash. Paste the old and new cryptographic hashes into your homework document. Be sure to identify which one is before and which is after.
Using the information from the textbook, explain at least two uses for a cryptographic hash, and explain how the experiment you just performed confirms those uses.
Do some research and explain in a paragraph or so what a "hash collision" is. Be sure to cite your research.
Part 4: Explain in a couple of paragraphs how public key encryption can be used to implement a digital signature. Be sure you are very clear on when a private key is used and when a public key is used.
Part 5: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. Explain why we do we not encrypt the message itself. You can answer this question in one sentence.
Part 6: For each of the following scenarios below, tell what type of encryption is most appropriate and in a sentence or two explain the reasoning for your choice.
Alice wants to send a confidential message to Bill, whom she has never met and who lives in a distant country.
Charlie wants to be sure that no one but he can see the financial and medical records he has stored on his computer.
David needs a way to check that large computer files stored on corporate servers have not been modified.
Eddard uses a "cloud" backup service; he wants to be sure the operators of the service cannot read his files.
Frank needs to send a message to George. The message need not be confidential, but George must be assured that it actually came from Frank.
In: Computer Science
###### THIS SHOULD BE IN PYTHON
Calculate the sum of cubes. If the input is x, the sum of cubes is equal to: 13 + 23 + ... + x3
Take input for the number of cubes to sum.
No error checking is needed.
Specifically, you may assume that the input is always a positive
integer
Here are some sample runs:
Enter how many cubes to sum: 1
1
Enter how many cubes to sum: 3
36
Enter how many cubes to sum: 4
100
Enter how many cubes to sum: 2
9
In: Computer Science
What is the benefit of a harvard architecture for a cache?
In: Computer Science
An example of a health form with the following requirements:
1. Create a meaningful form for your application, for example, a health monitoring app
2. Edit CSS for your application. The page must be styled with at least 10 CSS styles
This is using Visual Studio to use reactive form application
In: Computer Science
C# in Visual Studio
Practice Concepts
● Practice using conditional logic and expressions
● Practice protecting numeric input prompts (Int.TryParse(Console.ReadLine(), out);
Problem Description
create a Console Application using the .NET Framework. C#
This project will implement a short 3-question quiz.
Create a quiz application that has 3 questions. At least one of the questions must offer multiple choices,
and at least one question must prompt the user to enter a numeric input. The third question can be
either multiple choice or numeric input.
Scoring a multiple choice question will work as follows:
● If the user enters the correct choice value, award 3 points.
● If the user enters a valid offered choice, but the incorrect answer, award 1 point.
● If the user enters an invalid option, award 0 points.
Scoring a numeric input question will work as follows:
● If the user enters the correct numeric value, award 3 points.
● If the user enters a valid number, but the incorrect answer, award 1 point.
● If the user enters a non-numeric value, award 0 points.
Final scoring:
● If the user answered all three questions correctly, award 1 bonus point, for a maximum of 10
points earned. (3 points for each correct answer, plus the bonus point).
Test Conditions
● Your program should be free of syntax errors and build and compile properly.
● Due to the numerous ways you can answer these questions, make sure to test your program
over multiple conditions. Test the case where all answers are correct, all answers are incorrect,
etc.
● Note: On this quiz, it should be possible to score: 0 points, 1 point, 2 points, 3 points, 4 points,
5 points, 6 points, 7 points, and 10 points. Can you test each case?
In: Computer Science
. Implement your own custom linked list array implementation
with the following changes:
(a) Fill in the public E get(int index) method
(b) Also add code to the get method to print out a message for each
time an element in the list is
checked while searching for the element
You may want to study how the toString method goes from element to
element in the list
Java
In: Computer Science
Please, i need Unique answer, Use your own words (don't copy and paste).
*Please, don't use handwriting.
Complete the following table related to the CIA triad.
Confidentiality | Integrity | Availability | |
Definition |
|||
Example of business situation leading to a loss of | |||
Example of threat to | |||
In: Computer Science
Python
We say that a pair of positive integers ?,? is special if ? − ? = 10 and both ? and ? can be represented as a sum of two squares. For example, the pair (18,8) is special since 18 − 8 = 10, 18 = 3^2 + 3^2, and 8 = 2^2 + 2^2. Write a program that prints all special pairs (?,?) with 1 ≤ ?,? ≤ 100.
In: Computer Science
JAVA code - please answer all prompts as apart of the same java program with Polymorphism
Classwork
Part A ☑ Create a class Employee. Employees have a name. Also give Employee a method paycheck() which returns a double. For basic employees, paycheck is always 0 (they just get health insurance). Give the class a parameterized constructor that takes the name;
Add a method reportDeposit. This method prints a report for the employee with the original amount of the paycheck, the amount taken out for taxes (we will do a flat 17%), and the final amount (for basic employees this will just be a lot of 0's but make sure to do the math based on what paycheck returns).
Salaried employees are employed either for 10 or 12 months of the year for some salary. Their paycheck is their salary, divided up into two pays a month for however many months they are employed.
Using inheritance, create a class for this type of employee (more will be added in part B). Don't override reportDeposit. Give a parameterized constructor for name and salary that chains back to the parameterized superclass constructor.
In a main, create an array of employees, and set it up with some of each kind, some with different values. (hint: you've got parameterized constructors...) Loop through the list and call reportDeposit for each employee, also find the employee with the highest paycheck.
Part B
Hourly employees have an hourly wage, and a number of hours they are scheduled to work per week,. One paycheck is based on two weeks of work (they are guaranteed to have the same hours for both weeks). They are paid an extra 5% of their hourly rate for each hour over 40 hours per week they are scheduled.
Adjunct employees may teach up to 18 credits, and are paid $827 per credit, with the total spread across 2 paychecks a month for 4 months.
Add classes for these types of employee.
Add two hourly and two adjunct employees to your array in main. You shouldn't have to change anything else in main.
In: Computer Science
1a .Write a program that perform insertion sort (ascending order) on an input array and print the total number of comparisons that have been made. You can implement by using any programming languages such as C/C++. For example, in the case of array B = [ 30 , 10 , 20 , 40 ], there are 4 needed comparisons to perform insertion sort (30 vs 10, 20 vs 30, 20 vs 10, and 40 vs 30).
1b. Write a program that perform insertion sort while printing the value of input array after each step of insertion sort from the leftmost element to the rightmost element. You can implement by using any programming languages such as C/C++, Java, Python, etc. After that, perform test on the given array A.
A= [7,6, 12, 9, 3, 4, 5, 11, 9, 14, 2, 8]
In: Computer Science
Oranges are grown, picked, and then stored in warehouses in Tampa, Miami, and Fresno. These warehouses supply oranges to markets in New York, Philadelphia, Chicago, and Boston. The following table shows the shipping costs per truckload (in hundreds of dollars), supply, and demand. Because of an agreement between distributors, shipments are prohibited from Miami to Chicago:To (cost, in $100s)From New York Philadelphia Chicago Boston SupplyTampa $ 9 $ 14 $ 12 $ 17 200Miami 11 10 6 10 200Fresno 12 8 15 7 200Demand130 170 100 150Formulate this problem as a linear programming model, and solve it by using the computer
In: Computer Science
Implement the following logic function using 3-to-8 decoder (74138) and any necessary gates. (Hint: Express Q in minterms. Q = AB'C + A'C'+ BC'
In: Computer Science
Write a function lgrep that returns the “lines” within a list that contain a given sublist. Use the sublist function implemented in previous exercise to build lgrep.
> (lgrep ’(c d e) ’((a b c d e f g)
(c d c d e)
(a b c d)
(h i c d e k)
(x y z)))
((a b c d e f g) (c d c d e) (h i c d e k))
You may assume that all elements of (all lines of) all argument lists are atoms.
using scheme
In: Computer Science
JAVA PROGRAM
1. Write a program to find the factorial value of any non-negative number entered through the keyboard.(method) (Factorial of n: n! = 1*2*3*…*n, 0! = 1.)
2. Write a program that prompts the user to input a positive integer. It should then output a message indicating whether the number is a prime number. (method)
Please post a screenshot of the codes. Thanks!
In: Computer Science