Description
TCP/IP Protocols
As you learned in your reading, TCP/IP is a suite of protocols. The Dean text identifies the protocols within the suite and touches on the importance of these. In this discussion:
- Select one of the protocols from this suite and do additional research to learn more about it. Note that you can find a large amount of information on the Internet about the protocols by doing a search on any major search engine.
- In your post, note which protocol you research, and write your analysis of the research. This may include:
- What the protocol is used for and its importance.
- What would occur if the protocol were not working or not available.
- Dependencies the protocol has on other protocols or devices.
- Other important information about the protocol that should be noted.
- at least 1 reference is required
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Goes above and beyond expectations!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
UC Transformational Leadership and Knowledge Sharing Discussion
This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organiza ...
UC Transformational Leadership and Knowledge Sharing Discussion
This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:
How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?
How does servant leadership assist with transferring knowledge in an organization?
When thinking about data analytics, how does transformational leadership assist with building good data structures?
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.”At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.Supporting MaterialsThe following resource(s) may help support your work on the project:Java Software Application: CS 305 Project Two Code Base.zipRefactor the code to meet the software security needs of your customer. You will need to submit your refactored code.
6 pages
Windows 10 Upgrade Plan For Tetra Shillings Accounting Llc 1
Tetra Shillings Accounting LLC uses Windows 8.1. Windows 8.1 is a great operating system, but with changes in security and ...
Windows 10 Upgrade Plan For Tetra Shillings Accounting Llc 1
Tetra Shillings Accounting LLC uses Windows 8.1. Windows 8.1 is a great operating system, but with changes in security and other important software ...
5 pages
Data Science And Big Data Analytics N
Both python and R programming languages are open-source and can handle large databases. Both languages also support new to ...
Data Science And Big Data Analytics N
Both python and R programming languages are open-source and can handle large databases. Both languages also support new tools or libraries.
9 pages
Etsy Company
Etsy is a company in the form of an e-commerce website that facilitates trade in certain goods. The company specializes in ...
Etsy Company
Etsy is a company in the form of an e-commerce website that facilitates trade in certain goods. The company specializes in vintage or handmade ...
Campbellsville University Computer Science Paper
Write up a 1-2 page summary of what you have learned and any issues you encountered during the installation.
https:/ ...
Campbellsville University Computer Science Paper
Write up a 1-2 page summary of what you have learned and any issues you encountered during the installation.
https://www.youtube.com/watch?v=BFdTHGcsmkk
https://www.youtube.com/watch?v=4OpInrItxo8
Similar Content
what is solutions for Evil Twin attack?
A Literature Review section (2 page with single space & 2-column, font size 12 like IEEE paper format ) that summarizes ma...
ISOL531 University of the Cumberlands Digital Signatures Worksheet
1. What are three uses for digital signatures? 2. Does a digital signature provide confidentiality? Why or why not? 3. I...
Berkeley City College YouTube Gmail & GIMP Tutorial Evaluation Paper
Read, critique, & evaluate the following three Tutorials, using the example tutorial rubric below.1) GIMP Tutorial2) Gmail...
IT Definition 1 Page Essay
Can someone help me with writing this urgent essay with short notice:Select a Information Technology Term
You need to writ...
CTU Computer Science Security Compliance Paper
At this point the management team is quite impressed with the work performed to this point. They like the basis you have ...
Advanced Computer Architecture
QUESTION 2:Cite all reference materials (other than the
text book or class notes).
Problem 1: Loop Optimizatio...
Introduction To Intell Computer Science
This idea is based on someone solving unsolved problems based on previous solutions of the same nature. It is analogous to...
Computer Discussion
Both desktop and laptop computers have their advantages and disadvantages. However, I would choose a laptop over a desktop...
F085 Response
I agree with my friend that today because everything has advanced, it can be a headache choosing the right glass windows t...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
UC Transformational Leadership and Knowledge Sharing Discussion
This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organiza ...
UC Transformational Leadership and Knowledge Sharing Discussion
This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:
How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations?
How does servant leadership assist with transferring knowledge in an organization?
When thinking about data analytics, how does transformational leadership assist with building good data structures?
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom sof ...
CS 305 Southern New Hampshire University Software Security Project
ScenarioYou work as a developer for a software company, Global Rain, an engineering company that specializes in custom software design and development for entrepreneurs, businesses, and government agencies around the world. At your company, part of your mission is that “Security is everyone’s responsibility.”At Global Rain, you are tasked with working with a client, Artemis Financial. Your client is a financial consulting company that develops individualized financial plans for savings, retirement, investments, and insurance for their patrons.As an important step in Artemis Financial’s desire to modernize its operations and as a crucial part of the success of their custom software, they want to implement and apply the most current and effective software security. Artemis Financial has a public web interface and is seeking Global Rain’s expertise in taking steps to protect their client data and financial information.Specifically, Artemis Financial is seeking to add a file verification step to their web application to ensure secure communications. When the web application is used to transfer data, they will need a data verification step in the form of a checksum. You have been asked to take their current software application and add secure communication mechanisms to meet their software security requirements. You will deliver a production quality integrated application that includes secure coding protocols.DirectionsYou are tasked with examining Artemis Financial’s software to address any security vulnerabilities. This will require you to refactor the code base to add functionality to meet software security requirements for Artemis Financial’s application. Specifically, you will need to follow the steps outlined below to facilitate your findings, address and remedy all areas, and document your work in the Practices for Secure Software Report.Algorithm Cipher: Review the scenario and the Supporting Materials. Determine an appropriate encryption algorithm cipher to deploy given the security vulnerabilities, justifying your reasoning. In your Practices for Secure Software Report, be sure to address the following:Provide a brief, high-level overview of the encryption algorithm cipher.Discuss the hash functions and bit levels of the cipher.Explain the use of random numbers, symmetric vs non-symmetric keys, and so on.Describe the history and current state of encryption algorithms.Certificate Generation: Generate appropriate self-signed certificates using the Java Keytool, which is used through the command line.To demonstrate that the keys were effectively generated, export your certificates (CER file) and submit a screenshot of the CER file in your Practices for Secure Software Report.Deploy Cipher: Refactor the code and use security libraries to deploy and implement the encryption algorithm cipher to the software application. Verify this additional functionality with a checksum.Include a screenshot of the checksum verification in your Practices for Secure Software Report. The screenshot must show your name and a unique data string that has been created.Secure Communications: In the application.properties file, refactor the code to convert HTTP to the HTTPS protocol. Compile and run the refactored code. Then once the server is running, you can verify secure communication by typing https://localhost:8443/hash in a new browser to demonstrate that the secure communication works successfully.Provide a screenshot of the web browser that shows a secure webpage and include it in your Practices for Secure Software Report.Secondary Testing: Complete a secondary static testing of the refactored code using the dependency check tool provided below to ensure code complies with software security enhancements. You only need to focus on the code you have added as part of the refactoring. Complete the dependency check and review the output to ensure you did not introduce additional security vulnerabilities.Include (1) a screenshot of the refactored code executed without errors and (2) a screenshot of the report of the output from the dependency check static tester in your Practices for Secure Software Report.Functional Testing: Identify syntactical, logical, and security vulnerabilities for the software application by manually reviewing code.Complete this functional testing and include a screenshot of the refactored code executed without errors in your Practices for Secure Software Report.What if I receive errors or new vulnerabilities?You will need to iterate on your design and refactored code, address vulnerabilities, and retest until no new vulnerabilities are found.Summary: Discuss how the code has been refactored and how it complies with security testing protocols. In the summary of your Practices for Secure Software Report, be sure to address the following:Refer to the Vulnerability Assessment Process Flow Diagram and highlight the areas of security that you addressed by refactoring the code.Discuss your process for adding layers of security to the software application and the value that security adds to the company’s overall wellbeing.Point out best practices for maintaining the current security of the software application to your customer.What to SubmitTo complete this project, you must submit the following:Practices for Secure Software ReportUse the template provided and submit one comprehensive report of the steps you have taken to increase the layers of security in Artemis Financial’s software application. You will also submit the zipped project files that contain the refactored code. See below for more information. Include details about the code files being “attachments” to the completed report.CS 305 Project Two Refactored Code Base.zipRefactor the code provided in the Supporting Materials section. Be sure to zip the refactored code into one zipped project folder that contains all files associated with Artemis Financial’s software application. Submit the zipped project folder in addition to the Practices for Secure Software Report. Include details about the code files being “attachments” to the completed report.Supporting MaterialsThe following resource(s) may help support your work on the project:Java Software Application: CS 305 Project Two Code Base.zipRefactor the code to meet the software security needs of your customer. You will need to submit your refactored code.
6 pages
Windows 10 Upgrade Plan For Tetra Shillings Accounting Llc 1
Tetra Shillings Accounting LLC uses Windows 8.1. Windows 8.1 is a great operating system, but with changes in security and ...
Windows 10 Upgrade Plan For Tetra Shillings Accounting Llc 1
Tetra Shillings Accounting LLC uses Windows 8.1. Windows 8.1 is a great operating system, but with changes in security and other important software ...
5 pages
Data Science And Big Data Analytics N
Both python and R programming languages are open-source and can handle large databases. Both languages also support new to ...
Data Science And Big Data Analytics N
Both python and R programming languages are open-source and can handle large databases. Both languages also support new tools or libraries.
9 pages
Etsy Company
Etsy is a company in the form of an e-commerce website that facilitates trade in certain goods. The company specializes in ...
Etsy Company
Etsy is a company in the form of an e-commerce website that facilitates trade in certain goods. The company specializes in vintage or handmade ...
Campbellsville University Computer Science Paper
Write up a 1-2 page summary of what you have learned and any issues you encountered during the installation.
https:/ ...
Campbellsville University Computer Science Paper
Write up a 1-2 page summary of what you have learned and any issues you encountered during the installation.
https://www.youtube.com/watch?v=BFdTHGcsmkk
https://www.youtube.com/watch?v=4OpInrItxo8
Earn money selling
your Study Documents