Using the framework presented in class, draft a sample issue-specific security p

Using the framework presented in class, draft a sample issue-specific security p

Using the framework presented in class, draft a sample issue-specific security policy for an organization. At the beginning of the document, describe the organization for which you are creating the policy and the complete the policy using the framework.

Single Salt You discover that a system you are reviewing is using hashed passwor

Single Salt
You discover that a system you are reviewing is using hashed passwor

Single Salt
You discover that a system you are reviewing is using hashed passwords, but all the salt fields are identical. The implementer just used one salt for all accounts. Unfortunately, they can’t feasibly rewrite all the code in their system to fix this.
Propose a method that would let them improve security of the salts without resorting to moving to individually unique salts? Hint: think midnight
Your response should provide a detailed explanation of your proposed method. Include any assumptions or limitations in your method.
Keep it Private
Without salt, password hashes can be provided calculated by the user and the hash, not the actual password sent to the authenticating system where the hash provided is compared to the hash stored. Unfortunately, with salting, the user does not know the salt. This means they must provide their password in clear text – preferably over a secure channel.
Without requiring the user to keep track of the salt, propose a possible protocol that would allow the user to send a hash of the salted password, so that the authenticating server never has access to the plaintext password.
Your response should provide a detailed explanation of your proposed method, and include a protocol narration and/or sequence diagram of the protocol. Include any assumptions or limitations of your protocols.
When you are done, have one member of your group submit a single PDF covering both parts of this assignment.
To understand how your work will be assessed, view the scoring rubric below.

1) In a paragraph for each Discuss the role of an Oracle Database Administrator

1) In a paragraph for each Discuss the role of an Oracle Database Administrator

1) In a paragraph for each Discuss the role of an Oracle Database Administrator in : a. Database Creation and Maintenance (One paragraph) b. Application Design (One paragraph) c. Security (One paragraph) 2) List 3-4 ‘other’ database products that Oracle offers besides the Oracle database and in 2-3 sentences each, describe what particular market segment those products would be used for. 3) In 2 paragraphs, understanding that this is a very early stage of class, describe the origin’s of the relational database model and why you believe Oracle is the market leader in this segment in 2024.

Descriiption Software development has witnessed tremendous advances with the dev

Descriiption
Software development has witnessed tremendous advances with the dev

Descriiption
Software development has witnessed tremendous advances with the development of new and better tools and models for development. Businesses typically no longer use models with sequential phases and limited iterations. New development models, such as agile development, extreme programming (XP), and scrum, use teams with highly focused goals, clear deliverables, and iterative development cycles to improve the efficiency of development. These software development models also introduce new security risks in the development organization and the code that is produced.
For this assignment, you will continue development of your software assurance guidelines document to address security in nontraditional development models. This new section of your document will provide guidance to the company when it is using nontraditional development models to ensure that it follows processes and policies that will minimize the threat of security problems. The security development model will be used as the basis for your analysis.
The project deliverables are as follows:
Update the software assurance guidelines document title page with the new date and project name.
Update previously completed sections based on instructor feedback.
Security in Nontraditional Development Models section:
Identify a non-traditional software development model that could be used by your company.
Provide a summary of the major steps in the development model, and describe the potential security threats for each step.
Using the security development model as the foundation for analysis, develop and document appropriate policies and processes for each security risk that will minimize the threat.
Association with the security development model should be demonstrated in the policies and processes.
Be sure to update your table of contents before submission.
Name the document “yourname_CSS321_IP3.doc.”
Submit the document for grading.
I have attached what I have so far in this project. This project has been broken down for each week and I currently need help with week 3 please. All help is much appreciated!

Anwer the following questions: Chapter 2 For apps to be featured on the iPhone,

Anwer the following questions:
Chapter 2
For apps to be featured on the iPhone,

Anwer the following questions:
Chapter 2
For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?
Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

Based on the feedback you received in the Discussion, revise your network design

Based on the feedback you received in the Discussion, revise your network design

Based on the feedback you received in the Discussion, revise your network design diagram to produce the best possible final product to support your client. Export your network diagram to an image/picture format and copy it into a Word document. Review the requirements list that you developed for client needs in Week 8. Describe how each requirement is specifically met by the network design. Your document should be 3–5 pages long (not including the list of works cited), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA 7 format and style guidelines and submit in a single document.

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 re

Please complete this assignment in APA Style and 1-3 pages. Also included 1-2 references in the section at the end. Use the instructions below: ——–Discovery Exercise 5-1——– OBJECTIVE: View filesystem configuration. DESCRIPTION: Answer the following questions regarding your system by using the commands listed in this chapter. For each question, write the command you used to obtain the answer. If there are multiple commands that can be used to obtain the answer, list all of the commands available. 1.What are the total number of inodes in the root filesystem? How many are currently utilized? How many are available for use? 2.What filesystems are currently mounted on your system? 3.What filesystems are available to be mounted on your system? 4.What filesystems will be automatically mounted at boot time? ——-Discovery Exercise 6-5——– OBJECTIVE: Research Linux installation issues. DESCRIPTION: Search the Internet for information about five Linux installation problems that are different from those described in this chapter. How have other people solved these problems? If you had similar difficulties during installation, how could you get help?

This research paper should be based on the blog post I wrote about securing VPN

This research paper should be based on the blog post I wrote about securing VPN

This research paper should be based on the blog post I wrote about securing VPN of Mobile Device by using routers on both sides, where each uses 4 different ISPs to create separate IPSec tunnels, then Bond these 4 interfaces on each side using Link aggregation (IEEE 802.3ad) in order to distribute traffic over completely independent secure channels preventing interception, statistical analysis attacks, man in the middle attacks and reconstruction.
Please read the following post I wrote which is basis for the Research paper before bidding and please don’t bid if you don’t understand the POC here:
https://www.linkedin.com/pulse/ipsec-multiple-wans-8023ad-top-secure-tcp-poc-going-stefan-%25C4%2587erti%25C4%2587/?trackingId=XVD9qt3rReeECMg3ymhUYA%3D%3D
I need this methodology professionally written and presented in proper form of research paper suitable for publishing.
It is ok to mention that devices such as RaspberyPi can be used with 4 LTE modems on “field work” Endpoint, for example. In proof of concept we used RaspberyPi with 4 USB Modems – each using different carrier exposing each IPSec tunnel to Mikrotik Router interface. From there, Bonding (Link Aggregation) is created and exposed to user on field as single interface.
At the other side of the network, same has been done. Device connected to a router on field was able to access resources on remote network – while packets got dispersed over 4 different ISPs each having it’s own unique IPSec tunnel.
I need a research paper based on blog post and POC we did, well written and suitable for publishing.

Module 1.2 Assignment: Service Models Learning Objectives and Outcomes You will

Module 1.2 Assignment: Service Models
Learning Objectives and Outcomes
You will

Module 1.2 Assignment: Service Models
Learning Objectives and Outcomes
You will learn how to differentiate the different types of service models to determine which would better serve the need of an organization based on the current business need.
Assignment Requirements
SaaS, PaaS, and IaaS service models are the three primary types of services offered by cloud service providers (CSP). However, on page 14 of your study guide they list several other service models. Select three of the service and models and research the service that they provide, the type of businesses that are likely to need the services. Explain why you feel these businesses can benefit from these services that are offered by the CSP.
A good source to use is IBM, other cloud providers and open Internet search.
Required Resources
None
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: Chicago Manual of Style or APA
Length: At least 2 pages
Due By:
Self-Assessment Checklist
I have selected at least three cloud service models and identified the businesses that would utilize the services.
In my report, I have explained in detail why the businesses would benefit from the services.
I have cited my sources.

please writer a proposal for me about 315words. the instruction is in the file

please writer a proposal for me about 315words.
the instruction is in the file

please writer a proposal for me about 315words.
the instruction is in the file number 1.1 and I would like to talk about the topic and big issue around video game, espacilly teenagers’ dependence on video games. you can talk about What are the effects of youth addiction to video games. thank you!
instruction in the 1.1 Research Question and Audience Identification (5%)