WCU Computer Science Python Project

Description

Python Assignment 3

Write a function (guessing_game) that takes no arguments

When run, the function chooses a random integer between 0 and 100 (inclusive)

Then ask the user to guess what number has been chosen.

Each time the user enters a guess, the program indicates one of the following:

Too high

Too low

Just right

If the user guesses correctly, the program exists. Otherwise, the user is asked to try again.

The program only exits after the user guesses correctly.

Use the randit function (https://docs.python.org/3/library/random.html#random.randint) in the random module to generate a random number.

Ashford University Computer Science C++ Program Task

Description

Scenario:

A computer with a dual-core CPU needs to invert the colors of a 150 KB bitmap image file located in the RAM as a character array. In order to do this, each bit of the array needs to be complemented (0s are converted to 1s and vice-versa).

Instructions:

 write a C++ program using OpenMP for a dual-core processor to maximize processing speed up. Use the ~ operator to complement each byte in the array. Make sure your program is free of synchronization bugs and race conditions.

SEU Phishing Has Existed for At Least as Much as The Internet Has Existed Discussion

Description

As a security architect, submit an assignment that addresses the questions below. Be sure to explain the process and steps you would use, as appropriate.

  • How would you minimize users clicking on links without considering the risks of their actions?
  • How would you address Web page addresses that are disguised or take you to an unexpected site?
  • How would you ensure that third-party software has a mechanism for receiving security updates?
  • How would you ensure users know how to configure their web browsers securely?
  •  

Saudi Electronic University Threats Vulnerabilities & Exploits Paper

Description

Topic: “Approaches for identifying threats, vulnerabilities, and exploits”

In your survey, you need to review the current research on the selected topic, understand the problem, and critique the proposed solution. You must reference at least five recently published papers. A valuable survey paper should include a comprehensive discussion and comparisons between the presented research papers. Your survey should include a discussion of possible future work. It is recommended to reference papers that are highly cited and published in key journals or conferences.

Colorado State University Week 5 Forensic Tools Discussion

Description

Evidence collection is one of the most important parts of an investigation. Research the various tools used to make a forensic image of a drive. Find at least one free and one paid tool. Write a formal report comparing the paid and free tools.

  • How are they the same?
  • How are they different?
  • How do they validate the data collected?
  • How would you verify if the tool is reliable enough that its output could be introduced as evidence in court or an administrative proceeding?

University of Phoenix DoS and DDoS Attacks Cyber Security Essay

Description

After completing this week’s labs, reflect on what you learned and respond to the following questions in 1 to 2 pages:

  • Reflect on your experience of performing the simulated attacks. What insights did you gain about the attacks and about security from working on these exercises?
  • What are the different types of denial-of-service attacks? How do you detect and respond to these types of events?

Cite sources to support your assignment.

Format your citations according to APA guidelines.

Submit?the reflection.

Grand Canyon University Cybersecurity Worksheet

Description

Your latest cybersecurity education video on defining threat actors and possible attacks gave the CIO a brilliant idea. She wants you to create a training guide on the various forms of malware to help train junior technicians in the IT department pass their upcoming certification exam.

Create a table that can be utilized as a training guide that identifies, summarizes, and provides characteristics of at least ten different types of attacks and/or malware (to include DOS and DDOS attack).

Data Security and Privacy Worksheet

Description

Based on the data given in privacy-data.xlsx (data obtained from: http://mercury.webster.edu/aleshunas/), answer the following:

1. Identify EI/QI/SD

2. Tell if the data is k-anonymity where k = 2

3. Apply suppression over all EI and generalization over some QI, make the data be k-anonymity where k is 3. Write down the DGHs.

4. Comment on the l-diversity and t-closeness property on the data you have processed in Step 3. Suggest some ways that you can further improve its l-diversity and t-closeness.

Data Security Worksheet

Description

Based on the data given in privacy-data.xlsx (data obtained from: http://mercury.webster.edu/aleshunas/), answer the following:

1. Identify EI/QI/SD

2. Tell if the data is k-anonymity where k = 2

3. Apply suppression over all EI and generalization over some QI, make the data be k-anonymity where k is 3. Write down the DGHs.

4. Comment on the l-diversity and t-closeness property on the data you have processed in Step 3. Suggest some ways that you can further improve its l-diversity and t-closeness.

Social Engineering Attack Paper

Description

Social Engineering

As additional background, read the following articles:

In your analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on an organization. Discuss what methods and weaknesses you would use to exploit the employees to try and gain positive access and/or control. Include any additional recommendations to the company/employees to protect against such exploitation.