Computer Science Homework Help

Computer Science Homework Help. INFA 610 United Medical And Dental College Database Security Discussion

 

Hi, please, respond to peer discussions in 100 words minimum. The references should be in APA style and format.

Peer 1

Inference in Ordinary or Statistical Databases

A database inference attack occurs when non-sensitive public information is gathered from accessible databases and used to make inferring assumptions regarding sensitive, personal, or private data. Statistical databases are typically used to obtain new information based on previously collected or existing data sets without revealing private or individual data (Turkanović et al., 2015). Inference attacks on statistical databases, or compromises, occur when the inferences and assumptions created are tailored to specific individuals or entities (Stallings, 2017). Methods used by attackers to make inferences are typically based on “data mining, record linkage, knowledge discovery, and data analysis” (Domingo-Ferrer, 2002). Inference attacks are difficult to identify since the information used is typically general or aggregated and connections between the data must exist (Turkanović et al., 2015). Inference attacks cannot use traditional access control methods for prevention or detection since the information inferred is not unauthorized or directly accessed.

The most popular methods of protection from inference attacks are query restrictions and perturbation (Stallings, 2017). Query restrictions, or query denial, use the size of a database records to restrict query search results. For example, if a database has 10 records, the query will block access to any search results with less than 10 records. This protection puts a limitation on the ability to focus on one specific record. This protection method is useful for smaller attacks with small datasets; however, it can be weak for more complex query searches where the attacker can split his query and obtain specific characteristics from different searches. An issue with the query restriction method is that the “denial of a query may provide sufficient clues that an attacker can deduce underlying information” (Stallings, 2017). If an attacker is denied in multiple query searches, they can conclude what the restriction is and thus use it to infer information. Data perturbation produces statistical query results that cannot be used to infer specific details, while output perturbation produces modified query results that are based on original databases (Stallings, 2017). An issue with perturbation relates to the size and severity of the modification to the statistical query results provided. If the error is too small, an attacker can make inferences that are close to actual values, and if the error is too big, the query results may be invalid (Stallings, 2017).

In summary, inference attacks are a category of access, system, and computer, control that is often missed since the focus is not on direct access violations. These controls are no longer enough, and though methods of prevention and protection against inference attacks exist, they may not be as effective as required to provide continuous security of private or personal data. Inference attacks are still being researched and studied today and systems are being launched to provide increased protections and security. As inference problems continue to emerge, so will improvements and updates to the security systems that are used to protect against them.

References

Domingo-Ferrer, J. (2002). Inference Control in statistical Databases – From Theory to Practice. Springer. Retrieved from https://www.springer.com/gp/book/9783540436140.

Stallings, W. (2017, August 17). Informit. InformIT. Retrieved from https://www.informit.com/articles/article.aspx?p=782117.

Turkanović, M., Družovec, T. W., & Hölbl, M. (2015). Inference Attacks and Control on Database Structures. TEM Journal, 4(1), 3–15. Retrieved from https://www.temjournal.com/content/41/01/temjournal4101.html.

Peer 2:

Cloud Security

A relational database is a type of database management system (RDBMS) that uses related tables to store data. RDBMS’s are used commonly in modern databases because of their versatility and widespread availability. DBMS’s also have more fine grained security services and mechanisms than typical operating systems (University of Maryland Global Campus, 2021). A recent trend in the storage of large data volumes is a shift to cloud service providers. By definition, cloud computing consists of hardware, service components, networks and software which supports the development of cloud services and delivery of same via internetwork (Franklin & Ojekudo, 2021). A major concern following the shift to these cloud providers is data confidentiality.

Cloud computing confidentiality concerns include secret data loss, data leakage, and disclosing of personal data privacy (Hussein & Khalid, 2016). Solutions consist of security best practices, protecting data in transit, protecting stored data, protecting credentials, managing multiple users, and securing applications (Shazhad, 2014). These solutions are exemplified in practice by Amazon Web Services, the largest cloud service provider. The issues highlighted with these proposed solutions are mainly that cloud storage can be outsourced through a chain of providers, increasing overall vulnerability to attacks. Outsourcing can cause users to lose control of their data. Also, the transfer of cloud services between providers due to merging, government seizures, or the sale of their company can result in user files remaining inactive on multiple hard drives even after a user requests deletion of their account, increasing the timeframe in which a user’s files can be accessed and infiltrated. One future suggestion for cloud networks is for the implementation of an intrusion detection system in combination with a network intrusion prevention system, which would help to mitigate security risks relating to data leakage and attacks. This would aid in identifying, stopping and reporting abnormal traffic within the cloud storage system (Kumar, 2019).

In summary, DBMS systems make up the majority of modern databases. The responsibility of large data storage has steadily transferred to cloud service providers over the course of the last decade. The largest concern of cloud storage is data confidentiality, mainly data leakage and disclosure of personal data. Solutions for increasing confidentiality in cloud systems are security best practices, protecting data in transit, protecting stored data, protecting credentials, managing multiple users, and securing applications. Downfalls to these solutions are data outsourcing and data transfer over different providers.

References:

Franklin, M., & Ojekudo, N. A. (2021). Cloud Computing: Review of Architecture, Security Risks, Threats and Countermeasures.

Hussein, N. H., & Khalid, A. (2016). A survey of cloud computing security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), 52.

Kumar, G. (2019). A review on data protection of cloud computing security, benefits, risks and suggestions. PDF). United International Journal for Research & Technology, 1(2), 26.

Shahzad, F. (2014). State-of-the-art survey on cloud computing security challenges, approaches and solutions. Procedia Computer Science, 37, 357-362. https://doi.org/10.1016/j.procs.2014.08.053

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. ITCO 391 AIU Unit 3 User Interface Design Reflection Paper

 

Building on your initial user interface (UI) design mock-up of the organization’s program UI, the interface now needs to present more information to the user. Complete the following for this assignment:

  • The interface should present information visually with icons or graphics and text regarding critical issues related to the system, such as the following:
    • New orders
    • Change in employee status
    • Updated pictures
    • New products or services offered
  • Describe techniques for developing prototypes of user interfaces.
  • You must add at least 5 critical issue UI design items to your interface. Remember to ensure that these are easily understood by users.
  • • Submit a screenshot in Word. Or a functional application if pre-approved by your instructor.
  • Describe the items that you added to your interface design. Be specific with your descriptions, and identify the particular design features along with an explanation of why they are added in the way that they were.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Gomal University Cambridge Analytica in Wired Magazine Article Discussion

 

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

1) Relate any incident you have been involved with that relates to a web security issue. 150-200 words

2) Read this article about Cambridge Analytica in Wired Magazine. Discuss whether you think the premise of the article is correct and that people are more aware of privacy concerns.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. SEC 572 Keller Graduate School of Management Malware to Breach Organization Security PPT

 

  • Describe how a threat actor can utilize malware to breach the organization’s security to exfiltrate critical data assets. Use external resources from the open-source intelligence (OSINT) to justify your claim.
  • Propose two effective security controls against malware-based attacks and ways to monitor and assess the effectiveness of the security controls.
  • For each proposed security control considered, provide a qualitative (descriptive) analysis of its operation, availability, cost, implementation issues, and overall benefit to the company.
  • Provide a high-level flow diagram like the Microsoft Security Development Lifecycle (SDL) that shows how the implementation of DevSecOps can mitigate risks to the organization’s computing resources. See Appendix A for more information.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. San Jose State University Definition of Data Mining Essay

 

After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.

https://ucumberlands.primo.exlibrisgroup.com/disco…

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriately for the use case?  Why or why not?

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. 3D Object and Industry Standard Code Formatting Practices Project

 

I’m working on a Computer Science exercise and need support.

Create a complex 3D object using at least two primitive shapes. The object you create should be reflective of one object from your 2D scene. At this stage of your object’s creation, you should add different colors to each vertex of the object. This will help you better visualize the variance between the different parts of the shapes you are creating. Note that the code you already have uses rainbow colors on the shapes that are provided; if you use this code you may keep that rainbow format. Remember, the shapes you may wish to use are as follows:CubeCylinderPlanePyramidSphereTorus

Apply transformations so shapes are scaled, rotated, and translated (placed) correctly. This work should be relevant for the 2D reference image. For example, if you are working with a cylinder, should it be standing up or lying on its side, based on the image you are referencing? If you are also creating a cube, where should it be placed relative to the cylinder? What sizes are the two objects when compared to each other? It will be easier if you complete these transformations in the right order for your specific object. In general, you will wish to first scale, then rotate, and then translate. While this is not always the case, that is the most likely order for your process to follow.Create code that follows a logical flow without syntax errors. The code you create needs to be executable and all the code that is included will have to be reached by the execution. Note that not everything should be written in a single function and your work should be well-modularized.Apply coding best practices in your creations. Pay particular attention to the way you format and comment your code. Program code should be easy to read and follow industry standard code formatting practices, such as indentation and spacing. Commenting best practices should be in place to ensure the source code is briefly and clearly explained using descriptive comments.

3D OBJECT TO RECREATE IS A SALT SHAKER (CUBE WITH CYLINDER ON TOP). I included the code to create a cube to help.

Ensure proper libraries (glew.lib and glfw3.lib) are used. Do not use FreeGlut.

Needed ASAP!!

#include <iostream> // cout, cerr#include <cstdlib> // EXIT_FAILURE#include <GL/glew.h> // GLEW library#include <GLFW/glfw3.h> // GLFW library // GLM Math Header inclusions#include <glm/glm.hpp>#include <glm/gtx/transform.hpp>#include <glm/gtc/type_ptr.hpp> using namespace std; // Standard namespace /*Shader program Macro*/#ifndef GLSL#define GLSL(Version, Source) “#version ” #Version ” core n” #Source#endif // Unnamed namespacenamespace{const char* const WINDOW_TITLE = “Tutorial 3.5”; // Macro for window title // Variables for window width and heightconst int WINDOW_WIDTH = 800;const int WINDOW_HEIGHT = 600; // Stores the GL data relative to a given meshstruct GLMesh{ GLuint vao; // Handle for the vertex array object GLuint vbos[2]; // Handles for the vertex buffer objects GLuint nIndices; // Number of indices of the mesh}; // Main GLFW windowGLFWwindow* gWindow = nullptr;// Triangle mesh dataGLMesh gMesh;// Shader programGLuint gProgramId;} /* User-defined Function prototypes to: * initialize the program, set the window size, * redraw graphics on the window when resized, * and render graphics on the screen */bool UInitialize(int, char*[], GLFWwindow** window);void UResizeWindow(GLFWwindow* window, int width, int height);void UProcessInput(GLFWwindow* window);void UCreateMesh(GLMesh &mesh);void UDestroyMesh(GLMesh &mesh);void URender();bool UCreateShaderProgram(const char* vtxShaderSource, const char* fragShaderSource, GLuint &programId);void UDestroyShaderProgram(GLuint programId); /* Vertex Shader Source Code*/const GLchar * vertexShaderSource = GLSL(440, layout (location = 0) in vec3 position; // Vertex data from Vertex Attrib Pointer 0 layout (location = 1) in vec4 color; // Color data from Vertex Attrib Pointer 1 out vec4 vertexColor; // variable to transfer color data to the fragment shader //Global variables for the transform matrices uniform mat4 model; uniform mat4 view; uniform mat4 projection; void main() { gl_Position = projection * view * model * vec4(position, 1.0f); // transforms vertices to clip coordinates vertexColor = color; // references incoming color data }); /* Fragment Shader Source Code*/const GLchar * fragmentShaderSource = GLSL(440, in vec4 vertexColor; // Variable to hold incoming color data from vertex shader out vec4 fragmentColor; void main() { fragmentColor = vec4(vertexColor); }); int main(int argc, char* argv[]){ if (!UInitialize(argc, argv, &gWindow)) return EXIT_FAILURE; // Create the mesh UCreateMesh(gMesh); // Calls the function to create the Vertex Buffer Object // Create the shader program if (!UCreateShaderProgram(vertexShaderSource, fragmentShaderSource, gProgramId)) return EXIT_FAILURE; // Sets the background color of the window to black (it will be implicitely used by glClear) glClearColor(0.0f, 0.0f, 0.0f, 1.0f); // render loop // ———– while (!glfwWindowShouldClose(gWindow)) { // input // —– UProcessInput(gWindow); // Render this frame URender();

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Pace University New York Information Security Theory Discussion

 

Date: April 27, 2021 Est 6 pm

Length: 2 hours

Subject include: information security principle of success

certification programs and the common body of knowledge

Governance and risk management

Security architecture and design

Law, investigations and ethics

Operations security

Cryptofraphy

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Networking Foundations and PKI Infrastructure Lab Report

 

I would provide textbook pdf as reference laster.

PKI Infrastructure

  1. History (500 words max)

Please provide a history of PKI (public key infrastructure). Make this your 30,000 foot elevator summary that discusses the problem that PKI is solving and how it does so.

2. Digital Signatures (250 words max)

Explain how digital signatures work. An illustration will help you keep this section brief.

3. VPN Authentication (250 words max)

Document both client and server-side authentication process. The easiest way to document the initial handshake/authentication is to illustrate the sequence of packets sent between the client and server. The illustration should be accompanied by an explanation of each packets purpose.

4. Encryption/Decryption Algorithms (250 words max)

Discuss a commonly used asymmetric algorithm. Include features such as key size, security issues, speed.

Computer Science Homework Help

Computer Science Homework Help

Computer Science Homework Help. Ashford University R Programming Sorting Mechanism Program Report

 

Take the assignment from the previous week, add at least twice as much data to the data sets. Note how this impacted the results from the previous week. Be sure to have a visualization to show the initial results and the new results. Use graphs to present your results. Be sure to explain why the results are different or similar from last week.

Use RStudio to generate a word document with simple graphs of the following dataset: dataset_price_personal_computers.csv

Provide full screenshots and explanations of how the tasks were completed.

Your graphs must contain pie chart, bar chart, histograph, scatter plot, and box plot.

Computer Science Homework Help