Ask Computer Network & Security Expert

Objectives:

- Write a reflection
- Hash files to verify their authenticity
- Use the cloud-based Dropbox to share content

- Learn how to create an encrypted disk image (Mac) or an encrypted VHD (PC)

Note: We will be discussing many of the assignment details in class.

Tasks:

1. REFLECTION: Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of enhancing your security?

Is there too much hype with respect to various breaches in security? Do you have anything to hide? What are your thoughts? Write a 350 - 400 word reflection.

- Please name your file as follows: LastName_FirstName_Reflection2.

- Reflections are personal introspections. There are no right or wrong answers.

- There is nothing wrong with doing a little reading before writing a reflection if you choose to do so. Just keep in mind that the reflection ultimately consists of your perspective.

-Take the reflection where ever you please.

- The reflection is informal, but reasonable spelling and grammar is appreciated.

- doc, docx, or PDF format only. Please ensure your name, student number, course number, and assignment number are in the header.

2. Examine the nine text files located in the folder found at:

https://www.dropbox.com/sh/ymp4t54s73hisiw/AAD7yXVqmFLfuKGiOgmXPHVqa?dl=0

At least one of them contains an "original" document representing the novel "A Christmas Carol" by Charles Dickens. Your task is to find out which of these nine very similar documents are original. It is known that the SHA-256 hash of the "original" document is:

HEX: F0968458E7E0823103872A503A350D90E607DE71E2B2BF486E884C746CDF3EEE

Which of these nine documents is an "original"? List out the SHA-256 hashes of each of the documents. Create a PDF document that contains your answer.

3. Upload your PDF document from (2) to a Dropbox account.

- If you do not have a Dropbox account, create one.

- Upload the PDF document; it doesn't matter where.

- Capture a link to this document and paste it into the comments box in of your assignment submission. Label this link "Question 3".

4. i. Create an event that takes place at a particular time on a particular date in March 2016.

ii. Create an event that takes place all day on a particular date in March 2016.

iii. Create an event that takes place and repeats once a week for all the weeks in March 2016.

iv. Create an event that takes place for five consecutive days (Monday through Friday) in March 2015.

Ensure your Google Form and Google Calendar are publically accessible and paste the URL for each into the comments box of your assignment submission. Label these links "Question 4".

5. As D2L Dropbox requires the submission of at least one file, submit your PDF from (2)

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91709875
  • Price:- $30

Guranteed 24 Hours Delivery, In Price:- $30

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As