Web Development Assignment Paper

Web Development
Web Development

Web Development

This assignment consists of creating a simple web page. The result will be one .html file with the
following requirements. Save your web page as a .html file.

Requirements
a) Add your name as heading (H1)
b) Make the heading italic and change its font color to red
c) Add two paragraphs of text about yourself
d) Add a secondary heading (H2), change the font color of this heading to blue
e) Add a short story about best foods that you had including where you had them
f) Make the 2nd word in the paragraph bold
g) Add title “My First Webpage” to the webpage
h) Change the background color
i) Add a line break after the food paragraph
j) Add a couple of images about foods you’ve liked

We can write this or a similar paper for you! Simply fill the order form!

Implementation of Ant Colony Routing in Internet of Things

Implementation of Ant Colony Routing in Internet of Things
Implementation of Ant Colony Routing in Internet of Things

Implementation of Ant Colony Routing in Internet of Things

Rewrite similar literature review about Ant Colony Routing Implementation in Internet of Things

Implementation of Ant Colony Routing in Internet of Things

In recent years, many scholars have put forward their own solutions for IoT routing. They have solved energy, reliability and other issues by using various methods.

Reference [7] using fog computing. The paper proposed an adaptive edge calculation solution based on Regression Admission Control (REAC) and Fuzzy Weighted Queueing (FWQ). In the algorithm, adaptive edge routers use the REAC method to monitor link performance to handle congestion and maintain the routing quality of priority users. Using FWQ in heterogeneous networks based on primary services. Through the decision-making process, the system adjusts the flow of information or assigns bandwidth weights to react to network changes, thereby bringing REAC and FWQ awareness to network routing.

Reference [8~9] originate from the fault-tolerant routing algorithm based on Learning Automata (LA) proposed by Misra for Mobile Ad Hoc Networks. In order to improve network reliability IoT, the authors are further proposed Mixed Cross- Layered and Learning Automata-based(MCLA) fault-tolerant routing protocol. In the case of a failure between the source node and the destination node, the success of the packet can also be guaranteed. It dynamically adapts to changing environments and chooses the best route. Nodes placed in an unused path will sleep.
The optimization of multiple metrics in the IoT is a NP-Complete problem. Many scholars try to use heuristic algorithms to solve this problem and get good results [10~12]. A heuristic algorithm is an empirically constructed algorithm that searches for the best solution within the acceptable computational cost, but does not necessarily guarantee that the resulting feasible solution is the optimal solution.
The literature [10] proposed a Particle Multi-Swarm Optimization routing algorithm that can build, recover, and select multiple disjoint routes that tolerate failures while satisfying the quality of service. The algorithm is mainly to use multi-group strategy to determine the best direction when selecting multi-path routing at the same time. Speed updates are introduced in the form of individual best locations and global locations to enhance the performance of the routing algorithm.
The literature [11] selected a Fuzzy C-means algorithm to complete the selection of cluster heads and proposed a new method combining Optimal Secured Energy Aware Protocol (OSEAP) and Improved Bacterial Foraging Optimization (IBFO) algorithms. This method can improve network security and save energy. In OSEAP, energy is saved by closing part of the sending nodes, and the receiving end node selects whether to accept and forward the route request message to its neighbor nodes according to the battery level.
In [12], IoT routing is optimized by a k-means clustering algorithm and a Genetic Algorith. Sensor nodes are clustered based on energy, and an optimal cluster head is selected by using a k-means clustering algorithm. Then determine the energy cost of the cluster head and the level of the sensor node. The optimal path is selected by genetic algorithm. The genetic algorithm is based on the energy cost of the cluster head, the level of the sensor node and the path length.

REFERENCES

[7] M. Jutila, “An Adaptive Edge Router Enabling Internet of Things,” in IEEE Internet of Things Journal, vol. 3, no. 6, pp. 1061-1069, Dec. 2016.

[8] S. Misra, A. Gupta, P. V. Krishna, H. Agarwal and M. S. Obaidat, “An adaptive learning approach for fault-tolerant routing in Internet of Things,” 2012 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, 2012, pp. 815-819.

[9] S. Misra, P. V. Krishna, A. Bhiwal, A. S. Chawla, B. E. Wolfinger, C. Lee, “A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks,” The Journal of Supercomputing, vol. 62, no. 1, pp. 4-23, 2012.

[10] M. Z. Hasan and F. Al-Turjman, “Optimizing Multipath Routing With Guaranteed Fault Tolerance in Internet of Things,” in IEEE Sensors Journal, vol. 17, no. 19, pp. 6463-6473, Oct.1, 1 2017.

[11] P. K. Reddy, R. Babu, “An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things,” International Journal of Intelligent Engineering and Systems, vol. 10, no. 3, pp. 337-346, 2017.

[12] A. V. Dhumane, R. S. Prasad, “Prasad J R. An Optimal Routing Algorithm for Internet of Things Enabling Technologies,” International Journal of Rough Sets & Data Analysis, vol. 4,no. 3, pp. 1-16, 2017.

We can write this or a similar paper for you! Simply fill the order form!

Software Vulnerabilities Research Assignment

Software Vulnerabilities
Software Vulnerabilities

Software Vulnerabilities

Software vulnerabilities, especially vulnerabilities in code, are a major security problem today. Not all bug or flaws in software become security vulnerabilities, but some of them do. An attacker can exploit these vulnerabilities to cause major disruption to a business. An exploit can result in a variety of damages including crash of a system, taking the role of a super user, deleting of information in a file or an entire file, changing critical content in a database or a file, stealing valuable proprietary information, planting of malware, turning a system into a bot so to launch attacks on other systems.
Common software code vulnerabilities include:
• Buffer overflow
• Logic error or logic bombs
• Race conditions
• Format string vulnerability
• Cross-site scripting
• Cross-site request forgery
• SQL and other command injection
• Memory leak
• Incomplete mediation
• Integer overflow, underflow, and sign conversion errors
• Insufficient data validation
The name of vulnerability and the name of an attack that exploits it are often called by the same name. For example, the attack that exploits the buffer overflow vulnerability is known as the buffer overflow attack. Similarly, a race-condition attack leverages a race condition vulnerability. An attacker can and have exploited more than one vulnerability in the same attack to cause more damage than would be possible with a single vulnerability.

Two organizations focus on improving software security and thus track the various vulnerabilities on a continual basis. They are

(1) Common Weakness Enumeration (CWE) by SANS/Mitre https://cwe.mitre.org/index.html ), and

(2) The Open Web Application Security Project (OWASP) (see https://www.owasp.org/index.php/About_OWASP ).

I am attaching two documents here, CWE Top 25 and OWASP Top 10. Please note the vulnerabilities or the type of vulnerabilities are not the same in these two lists. This is because, OWASP’s focuses only on web applications. Also, the two lists are also not exactly the same as the above bulleted list. They do, however, overlap.

In this exercise, you will investigate two vulnerabilities of your choice from these two lists or any other reputable source. For each of the two vulnerabilities you have chosen, you will explain the vulnerability including where it occurs (e.g., C language, database, web browser, etc.), and an example attack that exploited it. You will also describe how the vulnerability can be minimized, prevented or mitigated. All the description should be in your own words. You may use code excerpt to illustrate the vulnerability or remove the flaw that is the source of the vulnerability.
Your report should not be more than two pages long (double-spaced) for each vulnerability. You need to consult at least two references for each vulnerability. If you have a good C/C++ programming background, you may want to explore the following site: http://www.cis.syr.edu/~wedu/seed/labs.html (See Software Security and Web Security Labs.) There is an in-depth technical description and even a video class room presentation on many of these vulnerabilities, and how to exploit them and mitigate them in a lab setting. Feel free to try the one or more of these laboratory exercises using the Ubuntu VM you can download from the site, but you are on your own.

We can write this or a similar paper for you! Simply fill the order form!

Classic Models SQL Database Security

Classic Models SQL Database Security Download the classic model’s database from the following MySQL website:

Classic Models SQL Database Security
Classic Models SQL Database Security

http://www.mysqltutorial.org/mysql-sample-database.aspxLinks to an external site.) Links to an external site.

  1. Create a database user named jump with password start.
  2. Load the classic model’s database into your MySQL database instance.
  3. Grant create, drop, alter, insert, update, select, delete, and index privileges for user jump on the classic model’s database.
  4. Submit a 3- to 4-page Microsoft Word document containing a screenshot of the tables in the classic model’s database.
  5. Provide a brief explanation of the MySQL grant command. How is this command used to implement database security?
  6. – I NEED PRINT SCREEN ON NO’S 1, 2, & 3. Lastly, no.5 would be an essay with a conclusion.

The Internet of Things (IoT) Product Proposal

The Internet of Things (IoT) Product Proposal
The Internet of Things (IoT) Product Proposal

The Internet of Things (IoT) Product Proposal

Review the list of IoT product characteristics for various markets. Select a market from this list:  Manufacturing, Media, Environmental Monitoring, Infrastructure Management, Energy Management, Medical and Healthcare Systems, Boiling and Home Automation, Transportation, or Large-scale Deployments.

Introduction; Proposal of an Internet of Things product:What is the IoT proposed product?Provide the statement of need for the IoT product.What else is offered similar to the proposed IoT product in the market?How is your proposed IoT idea better or different? Identify the qualities that make the IoT product better or different than other products.Description of your chosen market that could benefit from an IoT product:Does the IoT product solve a problem for the market,enhance exiting processes,improve existing products, or provide a new product offering?Identify how the IoT product supports electronic commerce, business-to-business electronic commerce, or business-to-consumer electronic commerce in the market?Identification of both pros and cons for the proposed IoT product (see the Pros and Cons of IoT diagram above).What are the pros of the proposed IoT product?What are the cons of the proposed IoT product?Conclusion Reference List

We can write this or a similar paper for you! Simply fill the order form!

ETHICAL HACKING ESSAY PAPER ASSIGNMENT

Ethical Hacking
Ethical Hacking

ETHICAL HACKING

Since this is an Ethical Hacking class, I think that it is important to discuss some real-world events. This paper is going to be geared towards malicious malware. In your paper, please address the following questions:

1.What exactly was the Russo-Georgian War? Length of time? Details on the War.

2.From a Cyber perspective, what is the significance of this conflict?

3.What was some of the cyber maneuvers Russia used against Georgia?

4.Now that you have researched #1 and #2, could this methodology be used against another nation state, e.g. United States, Germany, Estonia? Why or Why not? Explain\Elaborate on your reasoning.

Guideline for Extra Points

This is for additional points and are counted as extra credit. This is not a mandatory class requirement, but extra credit so the below rules are being applied. If these are not exactly adhered to, no credit will be assessed.

Every paper should have a title page, table of contents, and reference page (these do not count for total page count)

Text must be in Times New Roman font, 11pt, double spacing. Every paper must have an initial summary and conclusion section.

The paper itself (body) should be between 4 and 6 pages, no more, no less.

There must be a minimum of 7 scholarly references cited for any bonus point paper.

APA format and citation will be adhered to throughout the paper.

It must be checked via Turnitin for authenticity/accuracy. It must also have a <10% similarity report (Reference page will not be counted).

The paper and the Turnitin report should then be emailed to me no later than (NLT) the assigned due date.

o Note CNN, NY Times, FoxNews, Reuters, ANY Blog or Forum, PC Magazine, Wired, Wikipedia, PC World, TechRepublic, ZDNet, Bleeping Computer, Dark Reading, Threatpost, CNET, Hacker News, etc. are NOT considered scholarly. You may cite them, but ensure you have your minimum scholarly references as well.

We can write this or a similar paper for you! Simply fill the order form!

Large-scale data/ security breach Research Paper

Large-scale data/ security breach
Large-scale data/ security breach

Research a recent Large-scale data/ security breach

The objective of the report is to research a recent large-scale data/security breach or a non-compliance issue for an organisation. The report must include details of the breach and the damages caused e.g. damaged reputation, cost overruns, quality issues, failure to meet deadlines etc. The report must also include how and why the breach occurred and what if any measures have since been implemented to eliminate this type of breach in the future.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

CIA Security Triad Research Assignment

CIA Security Triad
CIA Security Triad

CIA Security Triad

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Personal Cyber Crimes Essay Paper Assignment

Personal Cyber Crimes
Personal Cyber Crimes

Personal Cyber Crimes

Write a MLA format, 2-3 page Research Paper on Personal Cyber Crimes.

Explain what each of the following are and how you can protect yourself from each.

Phishing Clickjacking Pharming Malicious Scripts

The following are requirements:

* Proper MLA Heading

*at least 2 in text citations

* at least 2 footnotes

*Works Cited Page (This page is not included in the 2-3 pages of the paper)

*Proper MLA Format (dbl spaced, Arial, 12 pt font etc)

*Table of Contents (meaning you will need to put headings in your paper as well)

*Title Page including (Needs to be horizontally and vertically centered)

Personal Cyber Crimes

Your Name

Fort Hays State University

*You will need to use the Reference Tab within Word to create your citations, works cited, etc, as you are taught in the chapter.

*2 or more sources that are not the book and that are credible sources (No wiki)

Your paper should flow as Title Page, Table of Contents, Paper itself, Works Cited.

We can write this or a similar paper for you! Simply fill the order form!

Wireless networks – Computer Science

Wireless networks - Computer Science
Wireless networks – Computer Science

Wireless networks – Computer Science

Using your laptop or smartphone, identify the wireless networks that are nearby and then submit a short written report that discusses your findings. At a minimum, answer the questions below:
What wireless networks did you find? (Feel free to diagram your findings as part of your report.)
Were they secure? How do you know? What steps would you take and/or recommend to secure a wireless network in a business environment?

If you are using a smartphone or tablet, feel free to download an app to look for WiFi networks and collect data. I have a WiFi analyzer app on my phone that allows me to screen shot scans/data and then send them to my work Inbox.

If you want to take your report a step further, test Fing (or similar) and find out what devices are using your WiFi. Please make sure that you “keep it legal”.

Your submission should utilize the course’s standard written report format and all references should be cited using APA style. For more information about this format and APA, please refer to Getting Started.

This cheat sheet has been developed by Kathleen Hyde, MSCIS, MBA for the purposes of providing students and others who are unfamiliar with report writing and references cited using APA style with “the basics”. It is not meant to be a definitive manual for report writing and references, as those familiar with APA style would attest. For additional assistance with references, please take a look at www.bibme.org or http://www.citationmachine.net/apa/cite-a-book. Those using this cheat sheet should always remember that the primary emphasis in any report should be CONTENT.

Overview
Report writing, while not simple, can be simplified. Starting with an outline, one can organize his/her thoughts before putting pen to paper, fingers to keyboard or speech to digital recorder. A basic outline begins with an introduction, continues with development of the content, and ends with a conclusion. With this in mind, our basic report format will consist of an introduction, body, conclusion and references.

The Parts
Introduction – The introduction in a report “introduces” the topic you are writing about to your audience. It is your one and only chance to entice others to continue reading your report beyond the first or second paragraph. In the introduction, you briefly must answer at least two questions:
1 What are you writing about?
2 Why are you writing about it?
At the end of your introduction, you will need to transition from the introduction to the body of the report. Keep in mind that this transition is extremely important because you want your audience to continue reading. After all, if your audience only reads the introduction, any research, exploration, tests and analysis or insights (a.k.a. CONTENT) that you conducted to write the report and draw conclusions will be in vain.

Body – Often referred to as the CONTENT, the body will comprise the majority of your report. In this section, you answer the questions you introduced earlier in greater detail. You attempt to educate your reader. You present your research. You explore the topic. You document your findings. You offer your analysis. You provide insights.

Depending on the topic of your report, the body may consist of multiple sections. If you find yourself struggling with how to put your thoughts into words, or your topic is so broad that a 3-5 page report is instead 20 pages long, you might want to create a quick outline of the body of the report, assuming you did not create an outline for the entire report. If you are exploring a topic, identify three to five main points that you wish to make. If you are conducting research or performing an experiment, identify the steps in the process and the results that you want or are required to include in the report. Don’t forget to consider adding screenshots, infographics, and tables to your body, if they will enhance or illustrate your written work.

Conclusion – The conclusion is the portion of your report that tells the reader what he/she should “learn” from your work. In other words, what should the reader remember a day or longer after he/she has read your report? If your report documents research you have conducted or experiments you have performed, the conclusion might also suggest additional research or questions that should be answered at some point in the future, after more research or experimentation…of course!

We can write this or a similar paper for you! Simply fill the order form!