Please read Chapters 7 & 9 in the textbook.

Within Chapter 7, Francis Gavin brilliantly articulates an analogy between the expansion of cyberspace and the growth of the railroads in the early 20th century.

He opens his discussion, “The role of new technologies, especially the massive expansion of rail lines throughout Europe and their ability to move huge numbers of men and weapons more quickly to the battlefield, is often seen as a key element of how the July 1914 Crisis began and played itself out in a catastrophic world war. Can we generate insights from this history into how emerging cyber capabilities might affect great power crises in the future? What, if anything, can the story of railroads and their effect on international stability tell us about cybers influence on crisis stability today, and looking into the future”

In your discussion post, I want you to answer those specific questions. In no more than 750 words, please discuss those critical questions, and the analogy he unpacks in the chapter

Book to use for assignment:

Understanding Cyber Conflict: 14 Analogies – Chapter 7 & 9

https://carnegieendowment.org/files/GUP_Perkovich_Levite_UnderstandingCyberConflict_FullText.pdf

In no more than 750 words, please discuss the following one (1) of the following three (3)  questions:

1) Is it important to distinguish between different types of cyber attacks? How should we do it?

2) What should the role of the United States be in Internet Governance?

3) Is cyberspace at risk of being militarized?

Please utilize outside sources. They must be “credible” by all academic standards. You will be rewarded by the use of outside sources.

This assignment asks you to build simple Unix shell and gives you in the process an opportunity to
demonstrate that you are mastering concurrency (including running external executables) and file
manipulation using the POSIX API. You may have seen similar assignments in other courses but
they are similar and not identical; make sure you follow the specifications herein, not something
else.
Our shell repeatedly provides a prompt, accepts a command (possibly with arguments), and
executes it. Most commands are external executables, but some are internal.
The shell ignores completely its environment and reads a simple configuration file upon
startup instead. The file is named shconfig and resides in the current directory. It contains pairs
consisting in a variable name and a value for that variable, separated by at least one blank. The
two interesting lines in this file have the form
VSIZE v
HSIZE h
where v and h are strings representing positive integers. These variables are used by the internal command more. If these lines do not exist (or if the file is missing altogether), two such lines
must be appended to the configuration file (which must be created first if not already there) with
the values 40 for v and 75 for h. The configuration file may contain other lines, which should be
ignored.
The following functionality should then be implemented:
All the typed in commands should be considered external except the commands more and
exit. Your shell should attempt to execute these commands. The search path for the external
commands contains only the directories /bin and /usr/bin (so any command outside these
directories should be ignored unless it is given by absolute path). If the command cannot
be found, then the shell should print an appropriate message; if the command produces an
error during its execution, then the shell should print yet another appropriate message (in
addition to whatever is printed by the command itself).
The arguments for the commands are provided in the same manner as in normal shells.
A command may be prefixed by the character & followed by a blank. If this is the case, then the
command is executed in the background, in the sense that the shell presents the prompt (and
accepts another command) before the completion of the previous command. Whenever the
background command terminates (with or without errors) the shell must print an appropriate
message, again in addition to whatever is printed by the command.
1
The command more must be implemented internally. This command receives one file name
as argument, and displays it to the standard output page by page. The number of columns
in a page and the number of characters in a column are taken from the configuration file and
are given by the value v of variable VSIZE and by the value h of variable HSIZE, respectively1
.
The command more displays v lines of the file given as argument and then awaits user input.
If the input is the character blank, then the next v lines are displayed; if the input is anything
else, then the command terminates. The command also terminates when it reaches the end
of the file. All the lines are displayed truncated to h characters if necessary (i.e., if they are
longer than h characters).
The command exit terminates the shell.
What to submit For this assignment you must use the POSIX interface presented in class for file
access rather than library functions.
The default target of your makefile must produces an executable named sshell and residing
in the root directory of your submission

    Ask the user to input the degree of the polynomial.

    Based on the inputted degree, ask the user to input the different polynomial coefficients.

    Generate a range X of values between  100 and 100.

    Calculate polynomial P(x) for all values of range X. These results should be allocated in a vector P.
    Plot the graph of P(x) in a figure titled Graph of Polynomial.

    P(x) should be plotted in blue.
    The title should be in blue, Font Size 16, Font Weight bold.
    The x-axis should be labelled x-axis in red, Font Size 12, Font Weight bold.
    The y-axis should be labelled y-axis in red, Font Size 12, Font Weight bold.
    The figure should display major and minor grid lines.
    x-axis limits should be set between the first and final roots 2.
    y-axis limits should be set between the extrema 2.

    Find in vector P the indices for which P(x)=0 and the indices at which P(x) sign changes. Based on these indices the root will be determined.
The root must not be determined using any embedded Matlab functions such as fzero, roots, poly, polyval, etc.

    The code should return in the command window the number of roots, and the roots value sorted in ascending orders.

The assignment is a python notebook with a problem to be solved.
The marking scheme is :
Depth of analysis: 25% of marks.
Analysis appropriate to questions: 25% of marks.
Quality, clarity and organization of analysis code: 25% of marks.
Answers based in analysis: 25% of marks.

FiftySeven Coffee 57C is a coffee retailer who is in a phase to further develop its current product portfolio (coffee). The current product offering has 13 attributes. 57C’s board believes that consumers are not considering all attributes as important when they buy their coffee. Moreover, the board wants to know how each attribute is being perceived with respect to the market benchmark of importance. The board is ready to focus more onto the important attributes when they offer their coffee in the future. To do so, 57C has conducted a survey to understand the decision making buying behavior of its consumers when they buy their coffee. They asked their consumers about their perception regarding the 13 attributes and to rate their overall satisfaction towards the current product offering as well as their buying behavior in the future from 57C.

Research Report – Twitter Analysis and Presentation

The aim of this assignment is to collect Twitter data, summarise the data using a spreadsheet or other tool, and then write a report about that data. The purpose of the report is to investigate and discuss the use of twitter analysis by researchers, brands or journalists (depending on your major). The report is not meant to be written as a public facing report or feature, but rather an internal research report that might be used in a professional context or to inform your own practices.

You can choose to follow a group of people or a hashtag/hashtags over a period of time that will yield a reasonable sized data set ( a few thousand tweets at least up to a max of 250 thousand is about the right size for this task, much bigger as Excel will struggle to open the file). Suitable targets could be hashtags for a TV show or media event, a new or defective product, a group of journalists attending a conference or the conference hashtag,  a brand campaign, or news event as it happens.

You may have to try a few different scenarios before you get some data you can use. For example broad hashtags like christmas or happy is a bad choice, corbyn (during PMQ) or MUFC (during a game) are probably better ones. Spend a little time exploring how hastags are used together (co-hashags) partly to make sure that you have all the relevant tags covered (i.e ‘Manu’ as well as ‘MUFC’), this can be done with the Twitter advanced search page. You should write about this hashtag research as part of your reflection.

Once you have collected the tweets and profile data use this data set to discuss the following questions in your report. You can do more analysis than this, but these are expected as part of the report.

Required analysis

a) Who were the top tweeters and retweeters?

b) How many of your top tweeters are bots? (remove as many as possible from your data set before performing the rest of the analysis)

c) What was the top retweet? and what was the ratio of tweets to retweets in your data set?

d) What % of tweet/retweets in your data set came from the top 10  tweeters?

e) Use a word cloud or word tree of the most used words in your data set to show the type of language being used. Was the hashtag being used in conjunction with other hashtags?

f) Where to the tweets come from? What % are geocoded, what % of profiles have a location?

g) Do the tweeters fall into any demographic groupings that you can see (look at some follower, friend counts, total number of tweets etc)

In addition to answering these questions you can perform other types of acquisition and/or analysis and you may be awarded extra marks for doing so.

Visualisations you should also include your report.

Time series for your tweets on a suitable timeframe unit

Word Cloud or Word Tree of language in popular retweets (or co-hashtag use)

Chart showing the % of tweets to retweets

Chart showing the % tweets geocoded and the % of profiles with locations

Histogram of tweeters volumes (i.e. 1 person tweeted more than 100 times, 5 people tweeted 50-100 times, 50 people tweeted 10-50 times, 1,000 people tweeted 5-10 times etc)

The report should be ~1500 words done as a basic but well styled HTML page that includes some visualisations to help illustrate your data. MSc students should attempt visualisations using a JavaScript library rather than iframe embeds. You should try to use a template system to start your page. As well as answering the questions above in your report you should do some research on social media analytics and Twitter use in journalism and consider the how the types of analysis you have performed can be used in a professional context. Include references to research material you used in your report. You can also talk about the 5th estate and Twitter more generally and it’s effect on journalism and society making reference to your own data where possible.

You should also supply a written ~500 word reflection. The reflection should consider the following points. Why did you settle on the hashtag(s) and timeframe that you did? What issues did you encounter in gathering the tweets and analysing them, how did you overcome these problems. How would you extend or improve your study given more time and/or resources? Include attributions for any code libraries or images used in your report.

Submission

The submission should consist of a single word or rtf document that contains your reflection and a link to the online report. If you have used code in the acquisition or analysis of your tweets, you should also provide a link to a github GIST for each one. You should add plenty of comments to this code to demonstrate your understanding of how it works.

Marking scheme

Will be allocated based on the following scheme

5/25 Acquisition – Research and discussion of method used to acquire tweets and data obtained

5/25 Presentation – HTML/CSS, layout, quality of writing, overall quality

5/25 Visualisation – Quality, scope/difficulty, integration with report

5/25 Analysis – Quality, depth, difficulty

5/25 Reflection – Discussion of techniques, self critique, journalistic context

Note that extra marks can be used for using acquisition, analysis and presentation techniques beyond those taught in class.

Code is not required for the acquisition stage to pass the assignment unless you are on an MSc award. Note that use of code in this coursework can contribute towards the award of the MSc for journalism students.

create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.

Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.

Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.