Computer Science Homework Help

Campbellsville University Distributive Bargaining Passing or Defeating a Bill Discussion

 

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons which might arise toward the passing or defeating of this bill.

Computer Science Homework Help

University of Phoenix Wk 3 Cloud Deployment Models Article

 

The decision on how to deploy cloud computing involves weighing multiple factors for any organization. Some models will be more scalable than others, but the cost to deploy may be prohibitive. In this assignment, you will consider security most heavily, though you will examine the advantages and disadvantages of each of the four most prominent cloud deployment models.

Write a 2- to 3-page article for a company’s Knowledge Base about the security threats for each of the four most prominent cloud deployment models: private, public, hybrid, and community.

Explain each deployment model, including advantages, disadvantages, general level of security, and provide an example of how it may be used.

Identify at least 2 specific security threats for each deployment model. Include what is at risk for each threat (data, availability, etc.).

Describe how to mitigate each threat, including who is responsible for managing that threat and why.

Computer Science Homework Help

Ashford University Mobile Forensics and Information Technologies Essay

 

The research paper should address the below questions

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are the challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Use the below paper for reference 

Nnoli, H. Lindskog, D, Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam, 734-741.

Computer Science Homework Help

Barry University Algorithms & Data Structures Worksheet

 

I’m working on a algorithms & data structures question and need guidance to help me learn.

  1. Create an ordering of the numbers 1 through 8 that will cause Merge Sort to do the worst-case number of comparisons. Show details of all your work by applying merge sort on your list. (Hint: Work backwards through the sorting process)
  1. We have n apparently identical gold coins. One of them is false and lighter, but is otherwise indistinguishable from the others. We also have a scale with two pans but without weights. So any measurement will tell us only if the loaded pans weigh the same or, if not, which one weighs more.

How many measurements are necessary and sufficient to find the false gold coin?

  1. Provide an algorithm (in words if you wish)
  2. Write a recurrence equation
  3. Solve the recurrence equation.
  1. Consider the algorithm below:

SPLIT (List, lower, upper, pivot_loc)

{

//Upper ≥ pivot_loc≥lower > 0

pivot = List[pivot_loc];

exchange List[lower] and List[pivot_loc];

low= lower; high= upper

while (high > low)

{

while (upper ≥ low and pivot ≥ List[low] )

low ++;

while (high ≥ lower and List[high] > pivot)

high–;

if (high > low) then exchange List[low] and List[high];

}

pivot_loc=high;

exchange List[lower] and List[pivot_loc];

return pivot_loc;

}

Assume array start from 1.

  1. What does this algorithm do? Explain all steps.
  2. Apply this algorithm on the list 5 4 3 2 1 where pivot_loc =3. Show your work.
  3. Apply the partition algorithm we used in quick sort (Algorithm 2.7 of the textbook) on the list 3 5 4 1 2.

Computer Science Homework Help

internet of Things and Blockchain

 

Describe in three pages the following points :-

Introduction about internet of things (IoT)

Introduction about blockchain 

  • Security and privacy issues on the Internet of Things (IoT) should include some statistics.
  • ARCHITECTURE AND FUNCTIONALITY OF BLOCKCHAIN and how blockchain work
  • How we can secure IoT using blockchain.
  • How we can secure IoT USING FOG COMPUTING
  • Describe the FOG COMPUTING ARCHITECTURE

Computer Science Homework Help

Northern Virginia Community College Significance Digital Forensic Skills Discussion

 

part1:

please answer the following question in two paragraphs with two links also you can share your opinion or your experience for answering the question :

Of what value would it be to attain a certification in digital forensics?

part 2:

reply one paragraph with one link on each of the following thread :

1-Mustafa Albassam

According to this week’s lecture. Computer Forensics refers to the investigation and analysis of media originating from digital sources in an effort to uncover evidence to present in a court of law. Getting a certification in digital forensics allow the person to assert his or her credibility in the forensics field. Additionally, having the proper certification can validate the integrity of computer forensics professionals. As was mentioned in the lecture, anyone can present themselves as a computer forensic expert, which in turn can lead to poor quality examinations and a negative view of the profession as a whole. Especially, when digital forensic professionals have to present their findings in front of a jury. One way to overcome this issue is by requiring these forensic experts to provide their credentials and professional certifications so they can validate their skills and expertise and show that their work is credible.

Here is a link for the Certified Digital Forensics Examiner program if anyone is interested to learn more about the field! https://niccs.cisa.gov/training/search/mile2/certified-digital-forensics-examiner-cdfe

Thank you

2-Sai Sohila Mantena

As digitalization has taken over the world there is equall rise in thefts, data breaches and cybercrimes as we forward together in this digital world. How does a certification in digital forensic help? Computer forensic is the only effective solution to tackle the current cyber crime situation. Cumputer forensics refers to the evidence obtained from the digital media and computer storage and form a major part of computer investigation and analysis techniques to access the potential legal evidence. Clearly the value of a certificate in digital forensics is tremendous and highly recommended. It leverages the position of the forensic professional when they present themselves as a forensic expert in front of the court. It is not only highly respected and well paid job , its a job of great resposibility as he/she deals with sensitive Information which from the crucial evidence in a court of law.

The different types of digital forensic are-

1)Disk forensics, 2) Netwok forensics, 3)Wireless forensics, 4)Malware forensics, 5)Database forensics, 6)Email forensics, 7)Memory forensics, 8)Mobile phone forensics.

It equally inprotant to recognize the right kind of certification as they are offered by numerous companies with various curriculums. one of the popular and viable option is the Computer Hacking Forensic Investigator (CHFI) program by EC-Council.

Computer Science Homework Help

CS 305 Computer Science Static Testing and Reconfiguration Question

 

Overview

As a software developer who develops secure code, you will need to add vulnerability assessments to your list of code reviews. As an experienced programmer, you know that the code you write using a web application framework may only amount to a small percentage of the overall web application code base. Most of the code to be compiled or interpreted for execution is locked away in libraries. Your web application is dependent upon the code in these libraries, which represents a dependency vulnerability.

In this assignment, you will have an opportunity to be proactive in DevSecOps! You will find potential security vulnerabilities using the OWASP dependency scanner. This is an open source scanner that points out potential security vulnerabilities known in the libraries of your code base. You can then make adjustments to your use of libraries based on the dependency check report. Implementing the dependency check process is highly recommended as part of DevSecOps. You have used a dependency check in the default configuration mode. Now, you will look at the configuration options to suppress the reporting of false positives.

In this assignment, you will find that this is a good place to alter the current OWASP dependency check for the suppression of false-positive reporting. To do so, you will need to create a suppression.xml file and revise the code in the pom.xml file of your software application, in order to change the configuration settings of the dependency check in Maven and point to this suppression.xml file.

Prompt

Please follow the steps below to complete this assignment.

  1. Static Testing: Using the code base provided, edit the pom.xml file to integrate the Maven dependency check. You may want to reference the Integrating the Maven Dependency Check Plug-in Tutorial. Then, run a dependency check and identify the known vulnerabilities found. Submit the HTML dependency check report with the known vulnerabilities found.

A dependency check will show false-positive vulnerabilities. It is important that you understand the false positives. You have been told that you cannot implement a fix at this time for the vulnerabilities identified because there is no solution that currently exists. However, you do not want this warning signal to pop up for the community of developers that will be testing the security of this code base.

  1. Reconfiguration: Sometimes, you have to live with an error until there is a fix for it. You must reconfigure the dependency check tool to stop the alarms for false positives by creating a suppression.xml file and revising the code in the pom.xml file to alter the configuration of the dependency check tool. By doing so, you will hide the false positives. Please note: The false positives are still there, but they won’t show up on the dependency check report. To reconfigure the dependency check tool, complete the following steps.
    1. Open the dependency report HTML file in a web browser.
    2. Click the suppress button next to the found vulnerability. See example below:

Published vulnerabilities screen showing the "suppress" button next to the found vulnerability

  1. Click on the Complete XML Doc button, then use Ctrl+C to copy the highlighted contents as shown below:

Click on the "Complete XML Doc" button and use Ctrl+C to copy the contents.

  1. Next, navigate back to the code base project in Eclipse and create a file called suppression.xml in the same directory as the pom.xml file.
  2. Add the contents you copied from the complete XML doc in Step C to the suppression.xml file you created.
  3. Edit the pom.xml file and add the following in the configuration section of the OWASP check:

<suppressionFiles>
<suppressionFile>suppression.xml</suppressionFile>
</suppressionFiles>

  1. Verification: Finally, use Maven Run As to run the dependency check again to verify that all dependencies are valid and no false positives exist. Submit the HTML dependency check report showing that all dependencies found are valid and no false positives are present.

In addition to the dependency check reports, be sure to zip the project folder in Eclipse and submit the refactored code including suppression.xml and the revised pom.xml file.

Computer Science Homework Help

ISSC 411 APUS W8 Application Vulnerability & Penetration Tests Essay

 

I’m working on a computer science case study and need a sample draft to help me study.

In 1-2 pages conduct a comparative analysis of Application Vulnerability Assessments and Application Penetration Tests. Make sure to include an analysis of the following variances:

  • Scope
  • Methodology
  • Techniques
  • Tools