Instructions
In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.
1. Identify and explain the factors that have limited local law enforcement efforts against digital crime.
2. Explain and describe the best practices for collection, preservation, transportation, and storage of electronic evidence.
3. What is the importance of chain of custody as it relates to computer crime?
Category: Computer Science homework help
Instructions 1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC.
Instructions
1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protocols establish handshakes to exchange parameters which will be used to set up VPN connections. In this paper you will first describe the TLS/SSL VPN handshake followed by a the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.
You must do this project in fedora linux using C++ and use the command terminal
You must do this project in fedora linux using C++ and use the command terminal as well. I will provide you the instructions here and as a file. This project is due 11/9/23 at 11:59p.m. You must provide me with instructions on how to compile this program and if you can make a Makefile that would be easier for me. I would greatly appreciate it if you could send me a video of you running the program so we dont have complications. The project is half finished beacuse it came with code that simulates the aircrafts I would suggest running what I provide you with first so you get an idea of what you have so far. I will also provide a video of what the program should look like once completed. I will provide this video once someone accepts this assignment.
You will be simulating an airport where 8 planes go out on tours repeatedly. Each tour will be
for exactly 12 passengers and last approximately 30 seconds. In performing the simulation,
you must make sure that no plane tries to leave a gate with less (or more) than 12 passengers
and that no plane lands or takes off at the same time as another plane is landing or taking off.
The first thing your program should do is read the following from the command line (in the
order specified):
• the total number of passengers that are in the airport.
• the sum total number of tours that all of the planes are to do. (NOT the number of tours
that each plane is to do, the total number of tours that all planes will do when their
number of completed tours is added together.)
You should then create 8 new threads, each one representing a (uniquely numbered) plane; the
main function should wait for all of the threads to complete and then exit. Each thread
represents an airplane, and should repeatedly follow these steps:
1. board. Waits for 12 passengers to get on the plane. Between each available passenger
boarding a random delay of between 0 and 2 seconds should be enforced. This can be
accomplished by calling sleep(rand()%3) after each passenger boards.
2. The associated plane should then be shown taxi-ing to the runway. See the provided
AirportAnimator class !
3. The associate plane should then use the runway to take off, animating such (see the
provided AirportAnimator class!) Of course, the plane should wait for exclusive access
to the runway.
4. The plane should then go on tour. This basically just sleeps for between 15 and 45
seconds, and can be accomplished by calling sleep(15+rand()%31).
5. The plane should then request to land. Once exclusive access to the runway is granted
to land, the plane landing should be animated (See the provided AirportAnimator class!)
6. The plane should then taxi back to its gate. See the provided AirportAnimator class!
7. Each passenger should then deplane and thus be returned to the “pool” of available
passengers. There should be a 1 second delay between each passenger deplaning.
After completing the above steps, you should update the number of completed tours (keeping
in mind that two planes could conceivably attempt to do so at the same time) and go back to
step 1 only if the number of tours required was not yet completed! Otherwise, the thread
should return. Don’t forget to use the provided AirportAnimator class!
You should appropriately update the status of the individual planes as each step is being
processed.
Problem Details
• This problem once again requires that you use a Linux machine to complete !
• You are being provided with code to display the requested animations. Do not wast time
trying to re-invent the wheel!
• Should you have to stop your program (via either ctrl-C or ctrl-Z), you may find the resulting
terminal in an unusable state. Typing reset (which may not be visible as you type it) should
fix the underlying problem.
Submission
You should post to Canvas both your C++ source code file(s) and a plain text file (not an
MS Word file) called read.me in a zip or tgz file. Make sure the “root” of your submission
is a folder (not just a collection of files.)
The read.me file should contain:
• your name and any other identifying information.
• any special details on how to compile your project
• any special details on how to run your project – note that you cannot circumvent the project
specifications here!
• any known bugs your project has, and possible fixes to those bugs (partial credit abounds
here).
• an overview of how you solved the project.
• You may put any other information you like in this file, although you are not required to do
so – one common additional set of entries is a “software engineering log” that indicates what
you have done every time you sat down and worked on the project. Many programmers find
that such actually helps you to finish projects faster!
The read.me file MUST also contain the answers to the following questions:
1. Try running your program with only 11 passengers. What happens? Why?
2. Try running your program with 12 passengers. What happens? Why?
3. Try running your program with 50 passengers and 100 tours. What happens? why?
4. Try running your program with 100 passengers and 20 tours. What happens? Why?
5. What is the minimum number of passengers that will guarantee avoidance of
deadlock? Why?
Tasks to complete Goal: This project will be used to integrate concepts develo
Tasks to complete
Goal: This project will be used to integrate concepts developed from all the assignments in the second half of this class, specifically. You will identify a data driven business problem that requires preparation of the data. This preparation involves Extracting data (from 3 or more sources), Transforming (or cleaning) the data before Loading it into a database for analysis. In other words, you will experience, first-hand, the ETL process of Data management.
Options: You can take this project in one of two directions: (1) Identify a large file, clean the data and normalize it into three or more tables OR (2) Identify three or more large data sources, clean the data and merge them into a denormalized table for analysis. In both cases, you will need to identify what you plan to learn from the cleaned and loaded data.
Resource: This articleLinks to an external site.
In preparation for your project this term, I need you to do some digging to identify sources and ideas for a decent project.
There are a couple of decisions that have to be made. And so, I am making part of the project a “deliverable” so you can begin mulling over it. Most ETL tasks involve cleaning and integration. For integration, it is vital that you have an attribute that is common across all three data sets
Cleaning
Cleaning is one of the most important steps as it ensures the quality of the data in the data warehouse. Cleaning should perform basic data unification rules, such as:
Making identifiers unique (sex categories Male/Female/Unknown, M/F/null, Man/Woman/Not Available are translated to standard Male/Female/Unknown)
Convert null values into standardized Not Available/Not Provided value
Convert phone numbers, ZIP codes to a standardized form
Validate address fields, convert them into proper naming, e.g. Street/St/St./Str./Str
Validate address fields against each other (State/Country, City/State, City/ZIP code, City/Street).
Transform
The transform step applies a set of rules to transform the data from the source to the target. This includes
converting any measured data to the same dimension (i.e. conformed dimension) using the same units so that they can later be joined.
generating surrogate keys or FKs so that you can join data from several sources,
generating aggregates
deriving new calculated values,
Adding columns to create PKs and/or FKs
Data Integration
It is at this stage that you get the most value for the project. This typically means you are adding some attribute from a related set that adds ‘Color’ to the data. Perhaps Census data to labor data or other demographic data. The challenge is to locate data that are relatable.
Project direction: You will need to complete a datamart with significant pre-processing (ETL) activities.
Requirements:
Problem being solved: What do you propose to learn from this data? List several of these business questions and show how your project solution (data set) could answer them.
Tools: You must complete the entire project using Visual Studio. OR you can do this with some other tool of your choice (ETL) like Power BI or tableauLinks to an external site..
Volume: Total result data set must add up to at least 5k records, but not more than 100k.
Destination: SQL server table(s). Depending on the direction you are taking, you can move all the data to a single CSV file and dump it into SQL server at the end or direct the final destination tables to SQL server.
Transformation – it must include TWO new columns (for each final destination) that is populated by (a) the current date and time so you know when that data was brought into the final dataset and (b) a second one to know where the data came from (source file name). This may be done through SSIS or in SQL server.
Note: Filename capturing works only when the source is a flat file. So, if your source is NOT a flat file, you may want to make a CSV file an intermediate destination and then use this file as the source (Hint: Use derived column transformation to add a column)
In addition it must include at least 3 of the following transformations: data conversion, derived column, data split, lookup, merge, merge join, multicast, union all, fuzzy lookup or any of the transforms not covered in class.
Data sources: You are welcome to use datasets from work that has been sufficiently “anonymizedLinks to an external site.”. In fact this itself is a valuable transformation task that you can then use to protect your data and make it available for additional analysis/exploration. There are many public data sets that can be used (see “data sources” tab)
Submit: Use the text area to submit a project “proposal” that addresses the following points; I am not looking for an elaborate write up, but use these 4 prompts to develop 4 well-written paragraphs free from language/grammar errors. Please do not write it in Q&A format!
Be sure to give a meaningful title.
Motivation for the project: what insights do you anticipate getting from this ETL project?
what problems do you anticipate during the ETL process? Cleaning? Transforming?
What data will you be using? where will you be getting these? How many rows would you be processing in all? What are the keys (Pk/fk)
And finally, include
What type of decision support do you expect this project to provide? Would this have been possible with Excel? Why is this approach an improvement?
An ERD showing how the data sets are related to each other (either source or destination tables – see “options” above)
A subset of data from EACH file (5-10 rows and 5-10 columns) that shows the kind of data you are dealing with. For each file, be sure to identify what you would consider as a primary key. These can be included as a screenshot with column headers.
The datasets, properly named. Its best that you create a folder called {myGateID}_Project and save your datafiles there. ZIP this FOLDER and attach it
Problem statement: what kind of problem is presented by the authors and why
Problem statement: what kind of problem is presented by the authors and why this problem is important?
Approach & Design: briefly describe the approach designed by the authors
Strengths and Weaknesses: list the strengths and weaknesses, in your opinion
Evaluation: how did the authors evaluate the performance of the proposed scheme? What kind of workload was designed and used?
Conclusion: by your own judgement.
Create the following SQL script (Save as w6_firstname_lastname.sql) . Create a
Create the following SQL script (Save as w6_firstname_lastname.sql) .
Create a simple Database with the following
1) Create insert script (10 inserts)
2) Create update script (10 updates)
3) Create the following:-
a) Select all records
b) Select all records sorted descending , ascending
c) Select all records with condition (where)
d) Count all records
e) Count all record with condition
4) Create 3 delete scripts
Submit your week 6 work in w6_firstname_lastname.txt (Please save the file as a text file of your scripts and upload the text file here for final review.)
Requirements
Points
Script 1)
40
Script 2)
30
Script 3) & Script 4)
30
TOTAL POINTS
100
Overview The final installment of your training manual will focus on auditing an
Overview
The final installment of your training manual will focus on auditing and log collection. An audit should use a variety of tools and utilities, not just a single packet scanner. Tools can include utilities and power tools, both open source and commercial. Continue the development of your training manual with an overview of the assigned topic and a summary of functions and capabilities. Demonstrate your implementation with corresponding screenshots from your labs (when applicable).
Prompt
You are now ready to perform your network audit. The kind of information you can expect to find at this stage will depend on how you conduct the audit and interpret the results. Continue using the Training Manual Template document to develop the section on auditing and log collection.
For each section of the training manual, develop guidelines for employees to select and employ specific software, tools, and methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools.
Specifically, the following critical elements must be addressed:
Summarize the key company-approved tools, represented by those used in the lab exercises.
Identify the importance and rationale for selecting each tool (with applicable supporting examples from labs).
What to Submit
Fill in Section Six of the Training Manual Template document. This section contains two main parts with additional subtopics related to detecting intrusions. This section should address best practices and tools and methodologies for scanning your network and assessing its security. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font and APA references and citations.
The purpose of this assignment is for students to write a case study based on a
The purpose of this assignment is for students to write a case study based on a common information security scenario.
Prompt
You are the senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 20 cases with Social Security numbers of individuals he has been assisting. How would you handle this security incident? What is the first thing you should do? How would you retrieve/destroy the data? You may have an internal thief—what would you do to find out who stole the laptop? What security violations have been committed? How would you prevent this from happening again? Write a report summarizing the issue and addressing all questions.
Specifically, the following critical elements must be addressed:
Discuss how the situation would be handled and what steps to begin with.
Examine how data would be retrieved and/or destroyed.
Address what steps would be taken to determine the culprit.
Name what security violations have been committed.
Determine what steps could be taken in order to prevent this from happening again.
What to Submit
Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.
In Module Eight, you will submit a communication plan that addresses and summari
In Module Eight, you will submit a communication plan that addresses and summarizes the importance of a security awareness program. How can it enhance the success of the organization? The goal of the communication plan is to find and implement messaging strategies to gain senior management’s buy-in and support of the security program. Cyber laws, personally identifiable information breaches and implications, costs of security breaches, and advantages of awareness programs should be addressed. The plan should also include how the awareness training and security policies and procedures will improve the security posture and culture throughout the organization.
Specifically, the following critical elements must be addressed:
What messaging strategies should be used to ensure that stakeholders understand, buy into, and support the continuous improvement of your proposed security awareness program? Provide specific examples of the types of communication you are proposing.
In a broader sense, how would you convince diverse stakeholders of the overall need for a healthy security culture? How do you make it real and relevant for nontechnical audiences?
What to Submit
Your paper should be submitted as a four- to five-page Microsoft Word document, with double spacing, 12-point Times New Roman font, and one-inch margins, in APA format.
Operating systems typically offer some native log-management functionality. But
Operating systems typically offer some native log-management functionality. But these log- and event-management mechanisms fall short of consolidating the data in any meaningful way, leaving bits and pieces of event logs scattered across a network. For your main post, identify examples of data that should be included on an audit log, and explain the reasons these should be included on the log. Support your reasoning with specific examples, and explain how the data should be logged and organized. Conclude your post by identifying the person(s) likely to view the information you have gathered.