Computer Science

Password-based authentication and role-based authentication

$2.00

What are the differences between password-based authentication and role-based authentication? What are their advantages and disadvantages?

Mass transit systems

$4.00

Unit V Article Critique

In airports and mass transit systems around the world, nations are now using new technologies to study the behavior of traveling passengers. Security personnel typically review cameras and monitor the behavior patterns of people to include body language, facial expressions, and erratic behavior. Several software applications and advanced biometric applications are currently being field tested or used in various environments. Some of this technology can detect heart rate, breathing, HLS 3306, Homeland Security Technology 3

eye movement, body temperature, etc. Utilizing the CSU Online Library, search for and select a resource such as an article, white paper, or research study that discusses new or emerging behavioral profiling technology or technology used to collect physiological data as a homeland security measure. The resource you choose for this article critique must come from the CSU Online Library. Ensure the resource is no more than 5 years old. Provide a synopsis of the resource, and identify the purpose of the technology. What aspects of behavioral profiling technology are discussed? Is the technology experimental or mainstream? Explain the application of the technology as a tool in homeland security efforts. What is the expected return on investment (ROI) of the technology? What are the strengths and weaknesses of the technology?

Data Visualization

$2.00

What changed from Kirk’s 2012 book to his 2016 book? Discuss the similarities and differences of Kirk’s (2012, 2016) hats.

Note:

Read the attached Chapter2_Kirk_A_2012_Data Visualization A Successful Design Process.pdf (2012 book) and chapter 11 from Data Visualization-compressed.pdf (2016 book).

Ethical Issues in Privacy

$8.00

Question Description: Prepare a 4 – 6 page paper in Microsoft Word on one of the topics below. I encourage you to leverage outside sources/references, which can help bolster and strengthen your arguments and discussion.
If you discuss outside sources, be sure to cite them accordingly within your document and on your references page.
The 4 – 6 pages does not include the title page, abstract page, or references page (if outside sources are used).
Paper should be written in APA format (title page, double-spacing, abstract, page header, 1″ margins, references page, etc.)
Save the file using the following file naming convention:

The 4 – 6 page requirement means at least 4 FULL pages minimum, not 3 pages, not 3.5 pages, etc.
Adding numerous images/clipart, applying narrow margins or multiple blank lines will not count toward the required page count.

Case Study #1

The Department of Homeland Security (DHS) is interested in using technologies to identify suspected of money laundering operations within the United States. The system would perform data mining in order to

Network traffic

$3.00

Assignment: Develop 1-2 page guide on your experience with downloading and surfing the web using Tor. The guide is meant for the average user with no knowledge of the gateway. Your guide should include the below:

1. Title page

3. Answer to below questions:

What is Tor and how it works?

Discuss Tor Hops and provide a screenshot for each of the following: visit 3 different sites, 1) college or University, 2) a restaurants, 3) a major corporation. How are the hops similar or different?

What are the benefits and limitations of the Tor network?

4. Define and explain content types or topics encountered while using Tor or during class demo.

5. Explain usefulness to public and private sectors including the average citizen.

6. Use 12 pt font, times new roman, 1-inch margins all around

7. Submit in word or pdf format only

please make it look clear and simple and don’t use scholarly articles (use articles found on google so that it does not look sophisticated)

Heartbleed Vulnerability Management

$4.00

Search for a scholarly source on the topic of Heartbleed Vulnerability on Google Scholar ( https://scholar.google.com/). Summarize the article and discuss your opinion on the article

Computer technology

$4.00

Consider a technology invented outside of the U.S. in computer or software engineering since 1940.

(a) Describe the cultural and social factors that led to this technology’s “invention.”

(b) Describe how this invention has evolved and influenced the culture of the U.S.

Since the WWW is a sample, you can’t choose it as technology

Computer and internet security policy

$4.00

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.

Include at least 3 scholarly references in addition to the course textbook. The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Scroll to Top