Computer Science Question

Assignment 2Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Pg. 01
Learning
Outcome(s):
CLO2
Analyze security
threats,
vulnerabilities,
and risks.
Question One
2 Marks
How can software testing be used to improve the security of software
applications against emerging cyber threats? List at least three different ways
that cybersecurity researchers could use to find security issues.
Pg. 02
Learning
Outcome(s):
CLO4
Conduct forensics
analysis to
determine the
cause of security
incidents.
Question Two
2 Marks
What are the challenges of using event logs for cybersecurity purposes, and
how can organizations overcome these challenges?
Pg. 03
Learning
Outcome(s):
CLO5
Examine the
implemented
security controls.
Question Three
2 Marks
What are the similarities and differences between Multi-Party Authorization
(MPA) and Three-Factor Authorization (3FA), and how can they be used
together to improve security?
Pg. 04
Learning
Outcome(s):
CLO1
Describe main
principles of cyber
security.
Question Four
2 Marks
What is the least-privilege principle in cybersecurity, and how does it help
protect sensitive information?
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g., misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Pg. 01
Learning
Outcome(s):
CLO2
Describe
advanced
Business
Intelligence,
Business
Analytics, Data
Visualization, and
Dashboards.
Question One
1 Marks
Why is it important to match the data to the needs of a specific predictive algorithm or
software tool?
Pg. 02
Learning
Outcome(s):
CLO2
Describe
advanced
Business
Intelligence,
Business
Analytics, Data
Visualization, and
Dashboards.
Question Two
3 Marks
Suppose a teacher asks you to design a dashboard to monitor the students’ grades in
different courses. Design a dashboard by identifying the basic elements that should be
displayed on the dashboard using any drawing programming to give an idea of how the
dashboard should look like. You should use some graphs and analysis on the dashboard.
Pg. 03
Learning
Outcome(s):
CLO1
Demonstrate an
understanding of
the concepts of
decision analysis
and decision
support systems
(DSS) including
probability,
modelling,
decisions under
uncertainty, and
real-world
problems.
Question Three
1 Marks
What are the components of Decision Support Mathematical Models? Choose any area
and give examples.
Pg. 04
Learning
Outcome(s):
CLO3
Recognize DSS
evolution to the
current state of
analytics and
artificial
intelligent.
Question Four
3 Marks
AI technologies affect our lives in different domains such as education, healthcare,
business, etc. Choose any one domain and discuss one AI application that has been used
in that domain. You should be specific about how the technology has been implemented
and which AI method has been used?
Student Details:
Name:
ID:
CRN:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Pg. 01
Learning
Outcome(s):
Analyze problems
related to the field
of Security and
Information
Assurance
Question One
Discuss the employee lifecycle stages, and give example for each?
3 Marks
Pg. 02
Learning
Outcome(s):
Analyze problems
related to the field
of Security and
Information
Assurance
Apply the most
appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance.
Question Two
1.5 Marks
What is the best, when the company Posting Job, is to have one versions of a job
description or two versions of a job description? And why?
Pg. 03
Learning
Outcome(s):
Apply effective,
proper, and stateof-the-art security
tools and
technologies.
Question Three
Explain, how layered defense model is helping securing facility?
1.5 Marks
Pg. 04
Learning
Outcome(s):
Demonstrate
processes to
implement and
enforce policy
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
Question Four
2 Marks
What is Data Destruction? And what is the benefit of physical destruction? Give two
examples of using physical destruction?
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Pg. 01
Learning
Outcome(s):
Demonstrate the
use of the security
tools and services
Question One
In detail write about S/MIME message content types defined in RFC 5652
Cryptographic Message Syntax, and give some examples for S/MIME
messages.
at TCP/IP layer
model.
2 Marks
Answer
Pg. 02
Learning
Outcome(s):
Question Two
2 Marks
encryption, hash
In IEEE 802.11, open system authentication simply consists of two
communications. An authentication is requested by the client, which contains
the station ID (typically the MAC address). This is followed by an
communications response from the AP/router containing a success or failure
message. An example of when a failure may occur is if the client’s MAC
functions,
address is explicitly excluded in the AP/router configuration.
Explain the
concepts of
cryptography,
message
authentication,
a. What are the pros and cons of this authentication scheme?
digital signatures
and Network
Security.
b. What are the security vulnerabilities of this authentication scheme?
Answer
Pg. 03
Learning
Outcome(s):
Recognize
Question Three
Explain a Distributed Denial of Service Attack (DDOS) and give a real incident
about this attack with details, please attach source.
network security
issues, including
threat,
countermeasures,
malicious
software and
intruders.
2 Marks
Answer
Pg. 04
Learning
Outcome(s):
Evaluate the
Question Four
Compare IPsec tunnel mode and transport mode in terms of data protection
and usage.
procedures to
secure a network
system against
failure, theft,
invasion and
sabotage.
2 Marks
Answer

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed with your coursework?
Get quality coursework help from an expert!