AES, Ciphers And Confidentiality Methods In Cryptographic Security

In 8–10 slides

As part
of your consulting assignment with the security staff of a local company, you
have been asked to explain the Advanced Encryption Standard (AES), Data
Encryption Standard (DES), and Triple DES (3DES). Prepare a PowerPoint
presentation that consists of 8–10 slides to explain these terms. Your
presentation should fully explain these concepts in the speaker notes and should
answer the following questions:

  • What are AES,
    DES, and 3DES?
  • How does DES
    work?
  • Why is 3DES now
    used?
  • What is the
    future of 3DES?
  • If three keys
    (K1, K2, and K3) were used to perform 3DES encryption and K1 = K3, how
    many independent keys were actually involved? Why?
  • What is a nonce?
  • What is a key
    distribution center
    ?

Be sure
to reference all sources using APA format.

In 2–5 paragraphs

In your
role as consultant, you have been asked to provide a short training
session for the security staff. The security staff has had some specific
questions, and the training session will help to answer those questions. Choose
only 1 of the following topics, and develop a short explanation of that topic
in a tool of your choice:

  • Is there a
    difference between link and end-to-end encryption? Explain.
  • What is traffic
    padding and its purpose?
  • Is there a
    difference between a session key and a master key? Explain.

Be sure
to document your references using APA format.

Dream Home Case Study Business Reporting and Analytics Assignment

Resources:

  • Completed Week One Individual Assignment “DreamHome Case Study”
  • Completed Week Two Individual Assignment “Object Oriented Data Model and SQL Query Definition”
  • Completed Week Three Individual Assignment, “Database Operations and Data Recovery”
  • Appendix A, “User Requirements Specification for DreamHome Case Study” of Database Systems: A Practical Approach to Design, Implementation and Management(6th edition).

Update the following DreamHome assignments:

  • Diagrams from the completed Week One Individual Assignment “DreamHome Case Study”
  • Diagrams from the completed Week Two Individual Assignment “Object Oriented Data Model and SQL Query Definition”
  • Completed Week Three Individual Assignment, “Database Operations and Data Recovery”

Diagram a distributed database environment in Microsoft® Visio® using the “DreamHome Case Study” in Appendix A of Database Systems: A Practical Approach to Design, Implementation and Management (6th edition) and your completed DreamHome-related assignments from Weeks One, Two, and Three.

Include the following in your diagram:

  • A production database
  • A data warehouse
  • Two data marts
  • Security and maintenance elements annotated in your first diagram

Create a 3-page summary in Microsoft® Word that:

  • Identifies and discusses the database tables used to create your distributed database environment
  • Identifies and discusses three SQL queries to develop reports from the data query list in the case study
  • Explains the typical operation of a data warehouse and data marts, along with operational considerations and constraints
  • Discusses how DreamHome could benefit from data mining and how OLAP and data mining applications could be applied to the DreamHome data model.
  • Includes the SQL statements for each of the required queries and screenshots showing the query results
  • A thorough explanation of the process you used to determine the data types used in each table
  • An explanation of the most difficult process in designing and building the data and how organizations can overcome these difficulties

Submit the Microsoft® Visio® file of your annotated diagram and the Microsoft® Word file of your summary to the Assignment Files tab.

Java Programming Project University Bookstore Data Analysis

The University bookstore hired your Learning Team to design a new textbook inventory system, including the following major processes:

  • Ordering textbooks
  • Receiving textbooks
  • Determining retail price and pricing used textbooks
  • Determining quantity on hand
  • Recording textbook sales and textbook returns

Create a 2-page document that summarizes the abstract data type algorithm headers for your textbook inventory system.

Write the abstract data type algorithm headers for the inventory system above. Each header should include name, parameters, purpose, preconditions, post conditions, and return value types. You may add additional algorithms as required by your analysis.

Include the following:

  • a pseudocode definition for a textbook data structure
  • a pseudocode definition for a student data structure

Basketball Team Points per Team and Player C++ Programming Assignment

Instructions:

1) This assignment should be done in teams of two members.

2) When you finish with the code, submit the a zip file in Canvas.

3) The zipped file you send must have the following format. “Last name1_LastName 2_ CS2_Project”. Example: John Adams and Michael Lee, then the file you submit must be named “adams_lee_Cs2_project. zip”. No need to submit both members but the submission need to clearly specify who is working on the assignment.

4) The zip file should contain:

  • Project .cbp file (The project created)
  • class.h file , clas.cpp file and main.cpp
  • Just zip the project folder and upload it.

5) Ask the instructor for any doubt when doing the assignment.

A basketball team develop a program that hold the statistics (points per team and player). The team has 7 players.

Each player provides the following information:

  • Name
  • Position
  • Points in each game (10 games played)

Write a program that reports the following information to the output file “Basketball_report.txt”

Player 1 Name Position total points avg per game

Player 2 Name Position total points avg per game

…….

Team Total points: xxxx Avg per game : xxx.xx

Requirements of the program:

1) Create a class called Player: Write the proper attributes

Name (string), Description (string), points[] for every game (array of int) and the correct functions (Accessors and mutators that access and update the info of the variables. Create the right specification file and implementation file. (.h and .cpp files)

2) Create a player (player1) and initialize its members to the following values: name=””, description=”” and points [0,0,0,0,0,0,0,0,0,0] through a constructor. (Create a private function called by the constructor to build the array)

3) Create 5 more players using a copy constructor. (Keep those players in an array.

4) The program asks to enter every player’s info to the user and keep that info in the instance variables of every player (Use the mutators).

5) Create an extra object of the class player (player_extra) and assign player1 to player_extra . (Overload the =operator) Then change Player_extra points (use the mutator to update the array contents)

6) Use the iomanipulators to display the total points of the team ,average points per game, total points per player, and avg per player results in the output file.

Use fixed, setw(), setprecision(2), and showpoint.

2 Extra point(voluntary) : Update the program to read the input data from a file called “data.txt” this should contain all the info for every player but the “player_extra” in every line.

Decision Tree for Potential Results and Choices Discussion

Hello, I need help with two Tasks

Task 1:

Discussion: Describe a decision tree by using a business example. Please explain why the decision tree helps leaders make decisions. Please discuss. Your post should be at least 300 words and include citation and reference formatted using APA 6 requirements.

Task 2:

Response: Please find the attachment. You should give response to attached document name (Friends post), You need to go through his post and give response to that post. your response must be professional, courteous, substantive, add to the conversation, a minimum of 150 words, and more than a statement of agreeing or accolades.

Note: I need these two documents in 2 seperate word documents

Computer Science Network Security Discussion

The maximum plagiarism allowed is 10%. Anything more than that I will deduct points for each additional percent of plagiarism.
How would you answer the following questions?

1. Data Security: protection of data at rest and in transit.

2. Software Security: development and use of software that reliably preserves the security properties of the information and systems it protects.

3. System Security: establishing and maintaining the security properties of systems, including those of interconnected components.

4. Human Security: protecting individuals’ personal data and privacy; threat mitigation combined with the study of human behavior as it relates to cybersecurity.

5. Organizational Security: protecting organizations from cybersecurity threats and managing risk to support successful accomplishment of the organizations’ missions.

6. Societal Security: aspects of cybersecurity that can broadly impact society as a whole for better or for worse.
The following should be submitted for grading:
• Prepare a least 2 paragraphs with single space for each questions report, spaced, size 12, in class to DEMO your results (5 points).
Note: Prepare a class PowerPoint Presentation (minimum 6-12 slides) and DEMO with all the requirements of this Research Paper (Survey, results, table, diagram, etc) (50% of your grade is based on DEMO) (5 points)
REQUIREMENTS
– Any assignment received after the time of the class is considered late (NO EXCUSES) and is graded with 0%.

Please follow this rubric and watch for plagiarism.

Please only pick this if you have the knowledge.

Golden Gate Building Shared Services at RR Communications Case Analysis

Read the mini case, Building Shared Services at RR Communications (pp. 156-159).

Submit a Word document with the following:

  • Complies with the APA and writing standards for this course
  • Has a SafeAssign score of less than 25%. You may submit your assignment multiple times to check the SafeAssign score. Only the final submission will be graded. Final submissions with a SafeAssign score of 25% or higher will not be graded.
  • Has three scholarly sources, not including our textbook.
  • Answer question two and five on page 159. Your answer to each question should be about two pages long.

CIS210 Strayer University Low Cost Automated Inventory System Plan Paper

Your sister owns a small clothing store. During a conversation at a family dinner, she mentions her frustration with having to manually track and reorder high demand items. She would like an automated system but has a very small budget.

Write a 4-5 page paper in which you create a plan for a low-cost automated inventory system in which you:

  • Describe all the necessary equipment.
  • Explain the costs involved in the creation of the system.
  • Describe the ongoing maintenance that will be required.
  • Provide a workflow diagram in Visio or equivalent software to illustrate how the system will work.

Cumberlands BitGold Turning Digital Currency Into Gold Case Study Essay Questions

Please read BitGold case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. BitGold’s IPO took place in Canada; however, as a global platform, BitGold aimed to appeal to users in developing countries around the world. Where should BitGold focus on acquiring users?

2. How could BitGold continue to stay on the right side of the law?

3. How could BitGold market its services to users and merchants, both in Canada and abroad?

4. Given the uneven state of the regulatory environment in the United States with respect to bitcoin startups, how should BitGold organize its US expansion?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

iPhone Recovery Forensics Software Descriptive Essay

In order to mobile forensics one must have the phone in physical possession. But what happens if you have an legal situation and you want to collect specific artifacts from the mobile phone i.e. an iPhone such as texts or SMS messages? And having the phone shipped to you is not an option?

Please do research as there are several companies that offer software where an user can download an commercial software that will let you walk the use through in creating a forensically sound backup of the phone then ship the package to you. Please identify at least companies.

Write a paper with 500 words.