Computer Science Homework Help

George Mason University Backdoors in Encryption Software Discussion

 

Over the last several years there has been a push to insert back doors into encryption software so government and police can access encrypted data, see p. 116-117 in the book for examples.

For this discussion, you are to research an article either for or against backdoors in encryption software and summarize the article. Discuss if you agree or disagree with the author and why.

In your peer responses (2 minimum) evaluate the initial post and discuss the points in the article and your classmate’s response. Do you agree or disagree and why?
below I attended page 116-117

Computer Science Homework Help

Bryant and Stratton College Technological Innovations Discussion

 

1,What problems has technology solved? The goal for this session is to learn about different problems innovative technology might solve and to form teams to innovate.

2.Discuss the team problem, what has been done to solve the problem, what obstacles have arisen.

Computer Science Homework Help

University of the Cumberlands Emerging Threat And Countermeasures Discussion

 

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

Computer Science Homework Help

University of the Cumberlands Contingency Planning Paper

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Computer Science Homework Help

Ashford University Week 4 Release Planning SCRUM Project Paper

 

SCRUM Project, Part 4: Release Planning with Priority

Prior to beginning work on this assignment, read Chapters 6 and 7 in your textbook, and watch the Managing Schedule, Release Planning, and Cost with Visual Studio Online (VSO) (Links to an external site.) video. This video will demonstrate how VSO can be used to setup the schedule for your SCRUM project.

Last week, you developed a product backlog for your SCRUM project. This week, you will estimate the schedule of your project in VSO. Follow the steps below to estimate the schedule of your project:

  1. Determine the cadence of your iterations.
  2. Revisit each work item in your VSO backlog and estimate the level of effort that is required to implement it.
  3. Determine the velocity of your team.
  4. Calculate the number of iterations that are needed to complete the project.

Assume that you have only 1 SCRUM development team made of three developers. Also assume that the business owners mandated three release dates that the development team must commit to.

Your project schedule must span at least 4 sprints

Once you have estimated your project schedule in VSO, take a screenshot of it to submit for your assignment. Set up the starting dates of your iterations based on either regular work schedule or business mandated dates or both.

In addition to your screenshot, include a 750- to 1250-word (3-5 page) paper with the following:

  • Summary of the relative level of effort for the items in your product backlog and your team velocity
  • Explanation of your approach to completing this assignment and the decisions you made
  • Summary of personal reflection and lessons learned in completing this assignment

The assignment

  • Must be 750-1250 words (3-5 pages) in length (not including title and references pages, or the screenshot of your product backlog) and formatted according to APA style as outlined in the Writing Center.
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  •  

Computer Science Homework Help

Keller Graduate School of Management Groupware Discussion

 

  1. Explain why it is useful to describe group work in terms of the time/place framework.
  2. Describe the kinds of support that groupware can provide to decision makers.
  3. Explain why most groupware is deployed today over the Web.
  4. Explain in what ways physical meetings can be inefficient. Explain how technology can make meetings more effective.
  5. Compare Simon’s four-phase decision-making model to the steps in using GDSS.

Computer Science Homework Help

Create a Program Code Computer Coding Task

 

You can check the screenshots attached to see the assignment in details.

Also, here is the explanation for the assignment:

Write an assembly program to set R0=1 if there’s a 5 in one of ten memory locations, starting at x3100. At the beginning of the program, set R0 = 0. If no 5 is found, it should leave R0 set to 0. Please submit your assembly program below. I will run it with my data.

Extra credit – 20 points: If a 5 is found, output the following message to the console. “A 5 was found at x31xx.” 31xx is the hex address of the 5.

Here is the test data I used to generate the screen print below. It is not the test data I will use to grade your project.

.ORIG x3100
.FILL #10
.FILL #20
.FILL #30
.FILL #40
.FILL #50
.FILL #5
.FILL #70
.FILL #5
.FILL #90
.FILL #100

.END

Computer Science Homework Help

Bryant and Stratton College Ethical Behavior and Social Norms Discussion Questions

 

Did they do the right thing releasing the personal information?

3. Are we in a position to judge their actions?

4. Is this a security violation?

Ashley Madison Incident- Cheaters’ Nightmare

-Anonymous , MSIS, Stratford University

We do not scan the world 24/7 just to find digital threats. We find them and destroy them. That is security on offense.

Norton antivirus, install now!!

Oh no. I am not in any way getting paid by Norton to say that on my blog. Advertisements like these are one of the most common ones that you would see when you use internet. This is the world that we have come to. Is it all about protecting yourself? We say security on the offense but usually we are the ones constantly defending ourselves. Defending from whom? Ourselves?

A recent incident which highlights another security issue is of Ashley Madison, a Canada based online dating service, which was targeted by hackers. The website provided services for people who were already married or in a relationship. Basically, it was a paid service to have an affair, hence the slogan, “Life is too short, have an affair.”

A group of hackers, called the “Impact team” stole all the existing user data and used it to threaten the Avid Life Media Inc. to shut down their operations for both Ashley Madison and Established Men.

They proved that they meant business by posting sample files on the Dark Net which contained company’s confidential information, but the management ignored the breach and continued the operations. The group of hackers who were against infidelity and did not approve of such unethical practice, kept their word by uploading 9.7 gigabyte data on the Dark Net earlier this month, which had data of up to 40 million users. People who are effected also include members of U.S government and military officials and infidelity is against their Code of Conduct.

The data included information such as addresses, phone numbers and passwords for the account along with the last four digits of the credit card for all the transactions. The hackers also condoned the business conducted by Avid Life Media and accused them of conducting fraudulent business against their customers by charging them a $19 fee for deleting their user data from the website which was an optional service chosen by many. Instead ALM did not delete the data and jeopardized the confidential information of the members.

This data breach also opens up window for other related scams for many who have doubts on their partners and could easily be lured into giving up personal information by clicking on the malicious links by scammers. Once the scammers gain access into the computers, they can do anything such as steal passwords, change/destroy confidential information, gain access to the bank accounts or even use information to blackmail curious spouses.

This havoc exposed another fact that close to 81,000 female accounts were traced back to the I.P address which belonged to Ashley Madison itself. So, these men who were forced to believe that they were having an affair with women were actually chatting with web robots (bots) or bored admins who created multiple accounts on the website from the home computer.

ALM recently released a statement that they have started an investigation against hackers who have committed this crime against people who were engaging themselves in having an affair, which by no means is illegal. The CEO, Noel Biderman of Avid Life Media Inc. had to step down after the breach. The organization has also announced a reward amount of Cad $500,000 for information about the hackers. On the other hand, the company faces many class-action lawsuits including one potential class action lawsuit filed by John Doe on behalf of U.S users for causing emotional duress.

Brian Krebs claims the likelihood of Ashley Madison hack could be performed by a Twitter user Thadeus Zu. This information on the hack has not been verified yet.

One unethical act gave birth to innumerous possibilities for immoral, unethical and illegal criminal activities such as identity theft, extortion and blackmailing. Sad but a reality that the occurrence is almost certain. I leave it up to the readers for them to decide whether this moral policing of hackers was justified or do you think there is a hidden agenda behind all this mess?

Computer Science Homework Help

CCC Prescriptive Analytics Relate to Descriptive & Predictive Analytics Question

 

How does prescriptive analytics relate to descriptive and predictive analytics? 

Explain the differences between static and dynamic models. How can one evolve into the other? 

  1. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty? 
  2. Explain why solving problems under uncertainty some- times involves assuming that the problem is to be solved under conditions of risk.  
  3. What is the difference between decision analysis with a single goal and decision analysis with multiple goals (i.e., criteria)? Explain the difficulties that may arise   when analyzing multiple goals.