Description
Programmed threats
I need a powerpoint presentation on the above topic
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Awesome! Made my life easier.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Cybersecurity Fundamentals Of Information Assurance Essay
Hello, this is a Cyber Security related class. In this assignment there is a hospital that got hacked and you as a cyber s ...
Cybersecurity Fundamentals Of Information Assurance Essay
Hello, this is a Cyber Security related class. In this assignment there is a hospital that got hacked and you as a cyber security person need to come up with a plan on how to deal with it.Everything for this assignment is included in the PDF that I will attach.
University of Maryland Global Campus Red Clay Renovations Employee Handbook
Project #1: Employee Handbook Company Background & Operating Environment Red Clay Renovations is an internationally rec ...
University of Maryland Global Campus Red Clay Renovations Employee Handbook
Project #1: Employee Handbook Company Background & Operating Environment Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in updating homes using “smart home” and “Internet of Things” technologies while maintaining period correct architectural characteristics. Please refer to the company profile (file posted in Week 1 > Content > CSIA 413 Red Clay Renovations Company Profile.docx) for additional background information and information about the company’s operating environment. Policy Issue & Plan of Action The company has grown substantially over the past few years. The current Employee Handbook was created from a set of templates purchased from a business services firm. The policies in the handbook were reviewed by the company’s attorney at the time of purchase. The attorney raised no objections at that time. During a recent legal review, the company’s corporate counsel advised that the company update the Employee Handbook to better address its current operating environment. The Chief Executive Officer has tasked the Chief of Staff to oversee the handbook updates including obtaining all necessary approvals from the Corporate Governance Board. The Chief of Staff met with the full IT Governance Board to discuss the required policy updates. (The IT Governance Board is responsible for providing oversight for all IT matters within the company). The outcome of that meeting was an agreement that the CISO and CISO staff will update and/or create IT related policies for the employee handbook. These policies include: Acceptable Use Policy for Information Technology Work From Home Policy Digital Media Sanitization, Reuse, & Destruction Policy
3 pages
Database Vulnerabilities
Scanning and enumeration are the first phases of hacking and involve the hacker locating target systems or networks. Notab ...
Database Vulnerabilities
Scanning and enumeration are the first phases of hacking and involve the hacker locating target systems or networks. Notably, the enumeration is the ...
Computer Science Question
Objective of Competition:
You will be implementing stock market future prediction system through multi-stage processing of ...
Computer Science Question
Objective of Competition:
You will be implementing stock market future prediction system through multi-stage processing of the stock market data. At the end of each stage, you will process raw time-series data using either ML algorithm or use some preprocessing filters. I have provided you with 20 years worth of daily data for 20 ticker symbols. You will use them for training and testing each stage of the algorithms.
Step 1: Clustering (Completed in assignment 3) - COMPLETED
In this step, you will cluster the candles (Open, High, Low, Close, Volume(optional)) of daily data in n clusters. Here is numbers of clusters will be chosen by you. You shall provide justification for choice. of number of clusters. Cluster validity shall be used to ensure that the clusters built by your method are good. You are free to choose one or more clustering algorithms and pick results of one that provides you the best cluster validity.
Step 2: Cluster labeling ( To be completed)
You may visually inspect each cluster to perform this step. Use the cluster center and variance to create an orderly label for each cluster that range from (-k to +k) . In this case, total numbers of clusters you will have are (n = 2k+1). Because there are negative and positive candles, your order will represent relative size of candle in each direction. In above example, I am assuming symmetric distribution of positive and negative candles. However, you may have asymmetric distribution.
Use the cluster label to represent each candle and generate a new file which has "Date" and respective "Cluster Label" replacing OHLC data.
Step 3: Create trends using zigzag indicator:
Download zigzag.ipynb (attached below).This will help you calculate long term trend in price data. The zigzag method expects to have OHLC pandas data frame object and returns same object with additional column called 'trend'. The value +1 represents up trend while -1 represents down trend. You can run program and understand how it works. The plot function will help you visualize those long term trend.
For this assignment, you will calculate 10% trend value, which you can pass as a parameter to zigzag function (pct=10.0). Generated trend values are now your labels for classification step.
Step 4: Create model that can predict trend
Now you have daily data with its trend value. In this step, you will divide all 30 stocks for training your model to predict the trend. Each daily sample is now represented as "Cluster label" and output as "trend". However system will not train better unless you give past n days cluster label as input vector and predict 'trend" of n+1 day as output. Ensure. that the day for which you are predicting trend is not included in past n day cluster label input feature vector.
For each of the 30 stocks, you will generate your experimental data set using described method in prior paragraph. Now combine all 30 stocks data and generate a large dataset for training.
Step 5: Train and Test your model
You will perform n fold validation to validate consistency of your model. I suggest using n = 7. At the end of your experiment, generate your confusion matrix representing accuracies with mean and its std deviation. At this point, I will provide you a new ticker symbol to test goodness of your model. The accuracy of this file shall be printed on output after your program calculates the confusion matrix.
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.”At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.Supporting MaterialsThe following resource(s) may help support your work on the project:Java Software Application: CS 305 Project Two Code Base.zipRefactor the code to meet the software security needs of your customer. You will need to submit your refactored code.
Similar Content
Business Case Research Paper, computer science assignment help
Business Case Research PaperA Business Case Definition: Documentation detailing the requirements to move an idea fro...
Goethe University Frankfurt ?improving Data Encryption Standard Paper
In this assignment, I would like you to propose criteria to develop a good encryption cipher
1.Making Data Encryption Stan...
UCM Ethical Hacking Standard Certifications Discussion
What are some of the industry standard certifications that exists. Which ones are the most sought after in the IT se...
R programming Tool
Download and Install the R Programming tool (Cran) and RStudio a free application onto your PC. Verify successful insta...
Project Proposal.......plagiarism check
You have been hired by a large company with branch offices aroundthe country to assist with rollout of a new companywide c...
IGlobal University Collaborative Communication System Discussion
describe two collaborative communications systems including features and benefits for business communications and producti...
Discussion 8
Data profiling can be described as the assessment of information for use in a data storeroom to clarify the content, struc...
Data Visualization Chapter 10
The chapter has presented and described the composition aspect as the final design anatomy that concerns space management....
Cryptography Aes 1
Data Encryption Standard (DES) is an algorithm for encrypting digital data that started in 1972. The National Bureau of St...
Related Tags
Book Guides
Daisy Miller
by Henry James
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
Little Fires Everywhere
by Celeste Ng
The Magic Mountain
by Thomas Mann
To Kill a Mockingbird
by Harper Lee
Fences
by August Wilson
Dandelion Wine
by Ray Bradbury
The Chosen
by Chaim Potok
The Nightingale
by Kristin Hannah
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Cybersecurity Fundamentals Of Information Assurance Essay
Hello, this is a Cyber Security related class. In this assignment there is a hospital that got hacked and you as a cyber s ...
Cybersecurity Fundamentals Of Information Assurance Essay
Hello, this is a Cyber Security related class. In this assignment there is a hospital that got hacked and you as a cyber security person need to come up with a plan on how to deal with it.Everything for this assignment is included in the PDF that I will attach.
University of Maryland Global Campus Red Clay Renovations Employee Handbook
Project #1: Employee Handbook Company Background & Operating Environment Red Clay Renovations is an internationally rec ...
University of Maryland Global Campus Red Clay Renovations Employee Handbook
Project #1: Employee Handbook Company Background & Operating Environment Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in updating homes using “smart home” and “Internet of Things” technologies while maintaining period correct architectural characteristics. Please refer to the company profile (file posted in Week 1 > Content > CSIA 413 Red Clay Renovations Company Profile.docx) for additional background information and information about the company’s operating environment. Policy Issue & Plan of Action The company has grown substantially over the past few years. The current Employee Handbook was created from a set of templates purchased from a business services firm. The policies in the handbook were reviewed by the company’s attorney at the time of purchase. The attorney raised no objections at that time. During a recent legal review, the company’s corporate counsel advised that the company update the Employee Handbook to better address its current operating environment. The Chief Executive Officer has tasked the Chief of Staff to oversee the handbook updates including obtaining all necessary approvals from the Corporate Governance Board. The Chief of Staff met with the full IT Governance Board to discuss the required policy updates. (The IT Governance Board is responsible for providing oversight for all IT matters within the company). The outcome of that meeting was an agreement that the CISO and CISO staff will update and/or create IT related policies for the employee handbook. These policies include: Acceptable Use Policy for Information Technology Work From Home Policy Digital Media Sanitization, Reuse, & Destruction Policy
3 pages
Database Vulnerabilities
Scanning and enumeration are the first phases of hacking and involve the hacker locating target systems or networks. Notab ...
Database Vulnerabilities
Scanning and enumeration are the first phases of hacking and involve the hacker locating target systems or networks. Notably, the enumeration is the ...
Computer Science Question
Objective of Competition:
You will be implementing stock market future prediction system through multi-stage processing of ...
Computer Science Question
Objective of Competition:
You will be implementing stock market future prediction system through multi-stage processing of the stock market data. At the end of each stage, you will process raw time-series data using either ML algorithm or use some preprocessing filters. I have provided you with 20 years worth of daily data for 20 ticker symbols. You will use them for training and testing each stage of the algorithms.
Step 1: Clustering (Completed in assignment 3) - COMPLETED
In this step, you will cluster the candles (Open, High, Low, Close, Volume(optional)) of daily data in n clusters. Here is numbers of clusters will be chosen by you. You shall provide justification for choice. of number of clusters. Cluster validity shall be used to ensure that the clusters built by your method are good. You are free to choose one or more clustering algorithms and pick results of one that provides you the best cluster validity.
Step 2: Cluster labeling ( To be completed)
You may visually inspect each cluster to perform this step. Use the cluster center and variance to create an orderly label for each cluster that range from (-k to +k) . In this case, total numbers of clusters you will have are (n = 2k+1). Because there are negative and positive candles, your order will represent relative size of candle in each direction. In above example, I am assuming symmetric distribution of positive and negative candles. However, you may have asymmetric distribution.
Use the cluster label to represent each candle and generate a new file which has "Date" and respective "Cluster Label" replacing OHLC data.
Step 3: Create trends using zigzag indicator:
Download zigzag.ipynb (attached below).This will help you calculate long term trend in price data. The zigzag method expects to have OHLC pandas data frame object and returns same object with additional column called 'trend'. The value +1 represents up trend while -1 represents down trend. You can run program and understand how it works. The plot function will help you visualize those long term trend.
For this assignment, you will calculate 10% trend value, which you can pass as a parameter to zigzag function (pct=10.0). Generated trend values are now your labels for classification step.
Step 4: Create model that can predict trend
Now you have daily data with its trend value. In this step, you will divide all 30 stocks for training your model to predict the trend. Each daily sample is now represented as "Cluster label" and output as "trend". However system will not train better unless you give past n days cluster label as input vector and predict 'trend" of n+1 day as output. Ensure. that the day for which you are predicting trend is not included in past n day cluster label input feature vector.
For each of the 30 stocks, you will generate your experimental data set using described method in prior paragraph. Now combine all 30 stocks data and generate a large dataset for training.
Step 5: Train and Test your model
You will perform n fold validation to validate consistency of your model. I suggest using n = 7. At the end of your experiment, generate your confusion matrix representing accuracies with mean and its std deviation. At this point, I will provide you a new ticker symbol to test goodness of your model. The accuracy of this file shall be printed on output after your program calculates the confusion matrix.
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.”At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.Supporting MaterialsThe following resource(s) may help support your work on the project:Java Software Application: CS 305 Project Two Code Base.zipRefactor the code to meet the software security needs of your customer. You will need to submit your refactored code.
Earn money selling
your Study Documents