Discipline: Computer science

Security+ NETLAB+ 19 – Cryptography Concepts w/CIS 195 Lab 25 Securing Data with Software EncryptionSecurity+ NETLAB+ 19 – Cryptography Concepts w/CIS 195 Lab 25 Securing Data with Software Encryption

  Submit the following in a Word document: Submit a Lab Reflection (In your own words). Four paragraphs. Paragraph 1: Describes the purpose of the lab. Paragraph 2: Discusses how the topic in this lab would be used in a real-world environment.  Paragraph 3: Describe how the lab went for you, including any problems you may have […]

Create a document retention policy for your College that complies with all state and Federal regulationsCreate a document retention policy for your College that complies with all state and Federal regulations

   You are the Chief Information Officer for Premier College. Recently, your college has received a notice from the Department of Education about an investigation of your college based on the state-specific testing and compliance procedures. The Department of Education has sent a Litigation Hold Notice wherein they have asked all college staff and administrators […]

NDG Security+ v3: Lab 02 Password Cracking with Linux, Lab 03 Password Cracking with WindowsNDG Security+ v3: Lab 02 Password Cracking with Linux, Lab 03 Password Cracking with Windows

NDG Security+ v3: Lab 02     Password Cracking with Linux, Lab 03     Password Cracking with Windows Submit the following items in a Word document.  Submit a Lab Reflection (In your own words). Four paragraphs: Paragraph 1: Describes the purpose of the lab. Paragraph 2: Discusses how the topic in this lab would be used […]

STEM High School Internship Program application in Computer Science at Johns Hopkins UniversitySTEM High School Internship Program application in Computer Science at Johns Hopkins University

please see below : – https://secwww.jhuapl.edu/stem/aspire/application-process – When completing your application, you will be asked to write 250 words or less on two topics: (1) explain why you chose your area(s) of interest and/or why you chose APL, and (2) tell us about a project you are proud of. These essays are your chance to share […]

Week 4 – Learning Activity Week 4 Hands-On Project [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 3, 4]Week 4 – Learning Activity Week 4 Hands-On Project [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 3, 4]

Prior to beginning work on this learning activity, review Module 08: Security Technology: Access Controls, Firewalls, and VPNs; Module 09: Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools; and Module 10: Cryptography in the Whitman and Mattord textbook. In addition, watch the videos Security Information and Event Management, and IDPS in the Whitman and […]

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud.For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud.

For this assignment, you are asked to provide your supervisor with a summary of cloud computing and the potential benefits and risks of migrating to the cloud. By summarizing your findings in a brief executive summary, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. […]

Cloud Computing-Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS)Cloud Computing-Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS)

This is a informational research project on Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS)  Select five (5) or more research papers/journals related to your chosen topic from any of the following websites. Science Direct:  https://www.sciencedirect.com/  Institute of Electrical and Electronics Engineers (IEEE):         https://ieeexplore.ieee.org/browse/periodicals/title  Association for Computing Machinery […]

Week 4 – Discussion Forum. Which Access Control Is Best? [WLOs: 1, 2, 4] [CLO: 4]Week 4 – Discussion Forum. Which Access Control Is Best? [WLOs: 1, 2, 4] [CLO: 4]

Prior to beginning work on this discussion forum, read Module 08: Security Technology: Access Controls, Firewalls, and VPNs in the Whitman and Mattord textbook. In addition, there are some recommended resources that may help with this discussion. Your readings discuss several types of access controls. Your organization’s employment practices should address such things as hiring, worker’s […]

write a report to address the following: The purpose of systems analysis and design in the development of information systems. The core processes of the Systems Development Life Cycle. The importance of planning during the systems analysis.write a report to address the following: The purpose of systems analysis and design in the development of information systems. The core processes of the Systems Development Life Cycle. The importance of planning during the systems analysis.

Complete the assigned readings under the background section and write a report to address the following: The purpose of systems analysis and design in the development of information systems. The core processes of the Systems Development Life Cycle. The importance of planning during the systems analysis. Using the Background materials and other sources, write a […]

Perform encryption and decryption using the RSA p = 3; q = 11, e = 7; M = 5 What is the public key PU? What is the private key PR? What is the cipertext C? How does the decryption to covert the ciphertext back to the plaintext M?Perform encryption and decryption using the RSA p = 3; q = 11, e = 7; M = 5 What is the public key PU? What is the private key PR? What is the cipertext C? How does the decryption to covert the ciphertext back to the plaintext M?

The pioneering paper by Diffie and Hellman introduced a new approach to cryptography and, in effect, challenged cryptologists to come up with a cryptographic algorithm that met the requirements for public-key systems. A number of algorithms have been proposed for public-key cryptography. Some of these, though initially promising, turned out to be breakable. One of […]