What is the Compile-time defenses /techniques to harden programs to resist attacks against operating systems? What are the basic steps to use to secure an Operating System?

Operating system and team management

QUESTION 1 There is a need for an Intrusion Detection System. Read the given parameters and write your decision about the type of intrusion detection system you would use to fulfill the requirements;

Requirements: The intrusion detection system must

  • Monitor system activities for signs of suspicious behavior.
  • Analyze traffic and log malicious behavior
  • Provide visibility into what’s happening on your critical security systems
  • Help to identify threats inside the network perimeter

QUESTION 2 What is the Compile-time defenses /techniques to harden programs to resist attacks against operating systems?

QUESTION 3 What are the basic steps to use to secure an Operating System?

QUESTION 4 Which Access Control Models you would deploy for these given two business cases? Write the Access Control Model name for each case.

Case 1: In this Government Company uses a hierarchical approach for access control. All the documents have been classified as Confidential, Secret and Top secret. The sensitivity levels are in order from most sensitive to least sensitive. For example, Only the Employee with a Secret classification level can reach the document with a Secret classification label

Case 2: This Access Control Model determines which permissions the system grants to the user. The organization let some individuals create or modify files while providing others with viewing permission only. For example, the Human Resources Database Manager was authorized to add, change, or delete employee records for anyone in the organization but has no access to the customer database and financial database.

Question 5: Describe the four different project evaluations or reviews: (1) individual performance review, (2) postmortem review, (3) project audit, and (4) evaluation of the project’s MOV with specific examples.

Explain how the compliances associated with the law impact business procedures. Select at least two of the risk management scope topics, and summarize their function. Explain what countermeasures you would utilize for the selected scope topics.

Unit V Power Point Risk Assessment Compliance

Instructions
Once you have selected one of the laws from the list above, create a PowerPoint presentation that addresses the following items.
1. Explain how the compliances associated with the law impact business procedures.
2. Select at least two of the risk management scope topics, and summarize their function.
3. Explain what countermeasures you would utilize for the selected scope topics.

Your presentation must be at least five slides in length including title and reference slides. Slides two, three, and four must contain a minimum of two graphics (pictures, photographs, or graphs). Your slides must contain speaker notes. You are required to use at least two resources in your presentation; one of which must be your textbook, and one must be from theWaldorf Online Library. Your reference slide and in-text citations must be in APA style.

What is the inode number of the home directory? List two websites that the user had bookmarked on 1-7-2009. What mail client does the user have? Did the user have any mail in their inbox? If yes, what is the subject line of the email?

Virtual Computing Lab

Questions to answer:
1. What is the operating system (be specific include the distribution) of this disk image? What is the file system?

2. This particular file system has what are called inodes. What is an inode? What information do inodes store?

3. What is the inode number of the home directory?

4. List two websites that the user had bookmarked on 172009.

5. What mail client does the user have?

6. Did the user have any mail in their inbox? If yes, what is the subject line of the email?

7. Find a document from Karen S. Evans about the planning guidance for Trusted Internet Connections (TIC). Who is the memorandum for? How many pages is the document?

8. Based on all of the documents and data on the users computer, what can you surmise the user was trying to do?

9. Do you think this person was acting honestly or committing a crime? How did you come to this conclusion?

Discuss the topic, the problem the model has been used in the research, and any present findings. Look into attached document for abstract and introduction.

Limitations of cyber security

Write 300 words main and two replies on same topic with 150 words each.Here are some pointers that will help critically evaluate some viable topics.

Discuss the topic, the problem the model has been used in the research, and any present findings. Look into attached document for abstract and introduction.

  • Is the topic attainable for a first-time dissertation student?
    • Is the problem rooted in the literature?
    • Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?
    • Is there a theoretical model or framework discussed?

Describe the shown graph, highlighting the relation of x and f(x). K ;S 1,%cf ectS inq -Pc/ i• 4. I “C, What are the elements of this relation?

Special Subjects Department — Computer Science)

Observe the shown linear graph and answer the following questions:

1=r4
12
10
a
6
4
2
o4
0
1

The Relation of x and f(x)
1, 3
2, 5
,7
4
4, 9
5, 11
5 6

 

1. Describe the shown graph, highlighting the relation of x and f(x). K ;S 1,%cf ectS inq -Pc/ i• 4. I “C,

2. What are the elements of this relation?

3. If the computer Is going to use the value of x to find f(x), what are the possible variables that can be used in the program being designed.

4. What are the efficient and proper datatypes that may be used with the above variables?  Explain.

5. Write below a description of how your program will work.

In the YouTube video “Pandas for Data Science in 20 minutes,” the speaker used the describe method, list four of the results from the describe method for the variable “account length.” What is the purpose of the describe method?

Discovery and learning with big data week 6

Instructions

Watch the YouTube video (at least 10 minutes) and read the two articles provided to answer the questions listed below. Ensure your answers are drawn primarily from the video and articles and cite your source for each question.

Next, download and open the Assignment 6 Hands-On ipynb file in your Jupyter Notebook and run through the three exercises.

Questions

  1. In the YouTube video “Pandas for Data Science in 20 minutes,” what does the acronym CRUD stand for in the video?
  2. In the YouTube video ” Pandas for Data Science in 20 minutes,” what were the data types in the telco_churn file?
  3. In the YouTube video “Pandas for Data Science in 20 minutes,” the speaker used the describe method, list four of the results from the describe method for the variable “account length.” What is the purpose of the describe method?
  4. In the article, “Top 10 Python Libraries Data Scientists Should Know in 2022”, name one of the four libraries not discussed in class. Should the professor include this library in future lectures? Why or why not?
  1. In the article, “Top 10 Python Libraries Data Scientists Should Know in 2022,” what libraries were SciKit-Learn designed from, according to the author? Why do you think the creator of SciKit-Learn used those libraries?
  1. The article, ” An overview and comparison of free Python libraries for data mining and big data analysis,” identify two of the least used data visualization libraries discussed in the article. Why do you think they are used the least?
  2. In the article, “An overview and comparison of free Python libraries for data mining and big data analysis,” the author discusses several deep learning libraries. Which deep learning library list in the article would you want to use and why?

 

Hands-On

Use Jupyter Notebook to complete the Python exercises.

  1. Download Series, DataFrames, NumPy Arrays.ipynb file that includes three exercises. Complete the exercises and save your work. Upload your ipynb and pdf files.

How does Computer Forensics differ from data recovery?

Information security week 6

How does Computer Forensics differ from data recovery?

Identify any states with shift/reduce conflicts in your automaton. Is the grammar SLR parseable? Justify your answer by constructing the SLR parsing table.

Computer Construction

Answers are to be submitted via Blackboard by March 2nd. Submit your answer as an archive username.tar.gz containing a PDF file with answers to theoretical questions, and a code directory like the provided one, containing all files required to build your solution.
Use any resources you can, the recitation lecture slides, asking each other, and Piazza. Start early, and when the deadline approaches, submit what you have got, no matter how finished. Remember to cite your sources and collaboration partners wherever they have influenced your work.

1 Bottom/up parsing tables
Consider the following grammar:
E E + T |T
T T F |F
F x

1.1 Augment the grammar, and construct its LR(0) automaton.
1.2 Identify any states with shift/reduce conflicts in your automaton.
1.3 Is the grammar SLR parseable?

Justify your answer by constructing the SLR parsing table.

Why is being able to search data important in industry? Why is being able to sort data important in industry? Why are arrays or lists a critical data structure needed for searching and sorting data?

Programming Activity 2: Searching and Sorting Arrays

Complete Chapter 8, Section 8.7 ”Programming Activity 2: Searching and Sorting Arrays” from the textbook. Once you have completed it, answer the following questions:

1) Why is being able to search data important in industry?

2) Why is being able to sort data important in industry?

3) Why are arrays or lists a critical data structure needed for searching and sorting data?

4) Are there other data structures that we can use to search or sort data?

5) What advice or code can you provide to help other students with this activity?

Create a displot for the data. Explicitly pass in the number 20 for the number of bins in the histogram. Display the plot using plt.show().

Weekend 2 _Class Assignment

Question 1

1. What library provides the foundation for pandas and seaboard plotting

2. Import modules to load cvs file

  • < import pandas as ____
  • import seaborn as ____
  • import matplotlib.pyplot as plt
  • # Read in the DataFrame
  • df = pd.____(sample.file) >

3. Use Seaborn’s displot() function to plot a distribution plot of the same column.

  • Create a displot for the data.
  • Explicitly pass in the number 20 for the number of bins in the histogram.
  • Display the plot using plt.show().

4. Use Seaborn’s displot() function to plot a distributiom

  • Create a displot of the [column] column in the df.
  • Configure it to show a shaded kde plot (using the kind and fill parameters).
  • Add a rug plot above the x axis (using the rug parameter).
  • Display the plot.