#Reciprocal and Symmetric Networks
Explore tagged Tumblr posts
Text
A novel burrowing soft robot concept

- By Sonia Fernandez , UC Santa Barbara -
We’ve seen robots take to the air, dive beneath the waves and perform all sorts of maneuvers on land. Now, researchers at UC Santa Barbara and Georgia Institute of Technology are exploring a new frontier: the ground beneath our feet.
Taking their cues from plants and animals that have evolved to navigate subterranean spaces, they’ve developed a fast, controllable soft robot that can burrow through sand. The technology not only enables new applications for fast, precise and minimally invasive movement underground, but also lays mechanical foundations for new types of robots.
“The biggest challenges with moving through the ground are simply the forces involved,” said Nicholas Naclerio, a graduate student researcher in the lab of UC Santa Barbara mechanical engineering professor Elliot Hawkes and lead author of a paper on the cover of the journal Science Robotics. Whereas air and water offer little resistance to objects moving through them, he explained, the subterranean world is another story.
“If you’re trying to move through the ground, you have to push the soil, sand or other medium out of the way,” Naclerio said.
Fortunately, the natural world provides numerous examples of underground navigation in the form of plants and fungi that build underground networks and animals that have mastered the ability to tunnel directly through granular media. Gaining a mechanical understanding of how plants and animals have mastered subterranean navigation opens up many possibilities for science and technology, according to Daniel Goldman, Dunn Family Professor of Physics at Georgia Tech.
“Discovery of principles by which diverse organisms successfully swim and dig within granular media can lead to development of new kinds of mechanisms and robots that can take advantage of such principles,” he said. “And reciprocally, development of a robot with such capabilities can inspire new animal studies as well as point to new phenomena in the physics of granular substrates.”
youtube
Video: “Robotic burrowing with tip extension and granular fluidization” by UCSB Hawkes Lab, YouTube.
The researchers had a good head start with a vine-like soft robot designed in the Hawkes Lab that mimics plants and the way they navigate by growing from their tips, while the rest of the body remains stationary. In the subterranean setting, tip extension, according to the researchers, keeps resisting forces low and localized only to the growing end; if the whole body moved as it grew, friction over the entire surface would increase as more of the robot entered the sand until the robot could no longer move.
Burrowing animals, meanwhile, serve as inspiration for an additional strategy called granular fluidization, which suspends the particles in a fluid-like state and allows the animal to overcome the high level of resistance presented by sand or loose soil. The southern sand octopus, for instance, expels a jet of water into the ground, and uses its arms to pull itself into the temporarily loosened sand. That ability made its way onto the researchers’ robot in the form of a tip-based flow device that shoots air into the region just ahead of the growing end, enabling it to move into that area.
“The biggest challenge we found and what took the longest to solve was when we switched to horizontal burrowing, our robots would always surface,” Naclerio said. Whereas gases or liquids evenly flow over and under a traveling symmetric object, he explained, in fluidized sand, the distribution of forces is not as balanced, and creates a significant lift force for the horizontally traveling robot. “It’s much easier to push the sand up and out of the way than it is to compact it down.”
To understand the robot’s behavior and the largely unexplored physics of air-aided intrusions, the team took drag and lift measurements as a result of different angles of airflow from the tip of a solid rod shoved horizontally into sand.
“Frictional force response in granular materials greatly differs from that of Newtonian fluids, as intruding into sand can compact and stress large swaths of terrain in the direction of motion due to high friction,” said Andras Karsai, a graduate student researcher in Goldman’s lab. “To mitigate this, a low-density fluid that lifts and pushes grains away from an intruder will often reduce the net frictional stress it has to overcome.”
Unlike with gas or liquid, where a downward fluid jet would create lift for the travelling object, in sand the downward air flow reduced the lift forces and excavated the sand below the robot's growing tip. This, combined with inspiration from the sandfish lizard, whose wedge-shaped head favors downward movement, allowed the researchers to modulate the resisting forces and keep the robot moving horizontally without rising out of the sand.
A small, exploratory, soft robot such as this has a variety of applications where shallow burrowing through dry granular media is needed, such as soil sampling, underground installation of utilities and erosion control. Tip extension enables changes in direction, while also allowing the body of the robot to modulate how firmly anchored it is in the medium — control that could become useful for exploration in low gravity environments. In fact, the team is working on a project with NASA to develop burrowing for the moon or even more distant bodies, like Enceladus, a moon of Jupiter.
“We believe burrowing has the potential to open new avenues and enable new capabilities for extraterrestrial robotics,” Hawkes said.
Research for this paper was conducted also by Mason Murray-Cooper, Yasemin Ozkan-Aydin and Enes Aydin at Georgia Institute of Technology.
--
Header image: The burrowing robot looks at its sand-blowing tail. Credit: Nicholas Naclerio. Credit: Nicholas Naclerio.
Source: University of California, Santa Barbara
Full study: “Controlling subterranean forces enables a fast, steerable, burrowing soft robot”, Science Robotics.
https://doi.org/10.1126/scirobotics.abe2922
Read Also
A soft robot inspired by cheetahs
0 notes
Text
300+ TOP MICROWAVE Engineering LAb VIVA Questions and Answers
MICROWAVE Engineering VIVA Questions :-
1. What is Microwave Engineering? Ans. Microwave engineering is the study and design of microwave circuits , components , and systems. Fundamental principles are applied to analysis , design and measurement techniin this field.The short wavelengths involved distinguish this discipline from electronic engineering . This is because there are different interactions with circuits, transmissions and propagation characteristics at microwave frequencies. 2. Define s-matrix and its properties? Ans. In a microwave junction there is an interaction of three or more components.There will be an output port, in addition there may be reflection from the junction of other ports. Totally there may be many combination, these are represented easily using a matrix called S matrix. Properties of s- matrix 1. it possess symmetric properties sij=sji 2. it possess unitary property 3. *= 3. Write the applications of microwave engineering? Ans. Following are the applications of microwave engineering- 1. Antenna gain is proportional to the electrical size of the antenna. At higher frequencies, more antenna gain is therefore possible for a given physical antenna size, which has important consequences for implementing miniaturized microwave systems. 2. More bandwidth can be realized at higher frequencies. Bandwidth is critically important because available frequency bands in the electromagnetic spectrum are being rapidly depleted. 3. Microwave signals travel by line of sight are not bent by the ionosphere as are lower frequency signals and thus satellite and terrestrial communication links with very high capacities are possible. 4. Why is s-matrix used in MW analysis? Ans. Matrix is used in MW analysis to overcome the problem which occurs when H,Y & Z parameter are used in high frequencies. 5. What are the advantages of ABCD matrix? Ans. The advantages of ABCD matrix are as follows- 1. They are used in power transmission lines 2. They are helpful in case of cascade networks. 6. What are junctions ? Give some example Ans. A microwave circuit consists of several microwave devices connected in some way to achieve the desired transmission of MW signal. The interconnection of two or more microwave may be regarded as MW junction. E.g.: TEE, HYBRID RING 7. What are non-reciprocal devices ?Give two examples? Ans. The devices which are having the properties that the forward characteristics are not equal to the reverse characteristics are called non-reciprocal devices. 8. What are the applications of reflex klystron? Ans. The main applications of a reflex klystron are as follows- 1. Signal source in MW generator 2. Local oscillators in receivers 3. It is used in FM oscillator in low power MW links. 4. In parametric amplifier as pump source. 9. What is the purpose of slow wave structures used in TWT amplifiers? Ans. Slow wave structures are special circuits that are used in microwave tubes to reduce wave velocity in a certain direction so that the electron beam and the signal wave can interact. In TWT, since the beam can be accelerated only to velocities that are about a fraction of the velocity of light, slow wave structures are used. 10. Give two examples for two port junctions? Ans. Following are the two examples of two port junctions- 1. The junction of two rectangular guides of unequal height 2. A symmetrical junction consisting of two similar rectangular guides joined by an Intermediate guide of greater width. 11. Which frequency is used in Microwave Oven? 12. What is the speed of Electromagnetic waves in free space? 13. How EM wave Propagates? 14. What is Ampere's law? 15. what is Faraday's law? 16. What is Gauss law? 17. What is mean by TEM wave? 18. What is mean by TE wave? 19. What is mean by TM wave? 20. What is mean by HE wave? 21. What is the role of Transmission line? 22. How many types of transmission lines are there? 23. What is the bandwidth of two wire transmission line? 24. Define Reflection coefficient? 25. Define VSWR? 26. What are the various losses occurred in transmission lines? 27. What is Stub and what are the various types? 28. What is single stub matching? 29. What is Double stub matching? 30. What is Wave guide? 31. Microwave travels in which form? 32. What are the various transmission lines for microwaves? 33. Multi conductor lines supports which mode of waves? 34. Single conductor lines supports which mode of waves? 35. Open Boundary structure supports which waves? 36. Which transmission line are unbalanced transmission lines? 37. What is mean by Dominant mode? 38. What is the dominant mode in Co axial line? 39. What are the lower order and higher order modes in co axial cables? 40. At which frequencies strip lines are widely used? 41. What is the dominant mode for strip line? 42. What are the losses in micro strip lines and how those can be compensated? 43. Which mode does not exist in micro strip lines? 44. Which transmission line has higher Quality factor? 45. What are the various types of micro strip lines? 46. Parallel strip lines supports which mode? 47. Why micro strip antenna are more popular? 48. What are the general modes in wave guides? 49. Define Phase velocity and Group velocity? 50. What is the dominant mode in Circular wave guide? 51. What are the main advantages of microwave integrated circuits? 52. What is planar transmission line? Read the full article
0 notes
Text
Applying the Spiral of Silence Theory to Social Media
An image posted on Instagram. Advice on cancer treatment on Facebook. A 140-character political thought on Twitter. Widespread Internet access and the increase of social media data mining sites are transforming the mass communication landscape. Gone are the days that major television networks and companies control the communication pathways and airwaves by using the typical top-down, one-way communication model. Instead, individuals’ personal expressions and opinions have become more public than ever. Access to computers, mobile devices, and free social media platforms give everyday people the ability to promote their ideas and ideals. User-generated content has transformed the social media ecosystem, turning into a very complex and transactional virtual community, where communication comes, goes, and intersects like a web. This access has created an oversimplified notion that the Internet has democratized information, but this is not that simple. Instead, social media sites have fostered safer and alternative virtual environments more conducive to the expression of controversial issues, like groups and other less-intrusive platforms, away from the scrutiny of known relationships.
As people are more free to talk and express their thoughts, they have also become more unwilling to share what could be deemed “inappropriate” or opposite to the socially desired answer or perceived public’s opinion. This results in a possible social media self-censorship, the process of suppressing one’s own opinion, particularly in the midst of controversial issues. This essay uses the Spiral of Silence Theory to explore self-censorship on social media and examines techniques used to relate and “save face” in the midst of controversial issues, including participation in groups or using less invasive social media sites like Twitter.
Although controversial issues such as same-sex marriage, hate speech, racism, or vaccinations often “pop up” on timelines in forms of texts, images, and memes, most people are careful to express controversial issues, even if this means agreeing with it by liking or sharing. A 2014 Pew Research Center study shows that people are less likely to post views if their followers do not share their opinions (Hampton et al. 2014). As with television, social network data have a way to crystalize public opinion. It might not show what the majority view is, but it will give people the impression of what it could be, and according to the Spiral of Silence Theory, that impression is enough to keep people with opposing views silent. The Spiral of Silence Theory explains the growth and spread of public opinion, which is an intangible force that “keeps people in line.” Coined by Elisabeth Noelle-Neumann, the Spiral of Silence Theory refers to the pressure people feel to conceal their views when they think they are the minority (Noelle-Neumann 1984). It is a communication process in which people who think they hold a minority view do not speak up because of fear of social exclusion and relationship loss.
The Internet expansion in the past 20 years has created an opportunity and platform for freedom of expression. The prevalence of social media sites fostered an assumption that people would be fully free to express themselves, even if they were part of a minority view. The reality is that despite the boom of these social media sites, users are still cautious of what they share, particularly on social media sites with symmetrical relationship ties like Facebook, where the friendship is mutual and, in most cases, personal. Although social media sites and the First Amendment give Internet users the ability to share their personal views, “save face” continues to be a desirable behavior.
While many researchers have questioned the applicability of the Spiral of Silence Theory to online behavior, the fundamental concept of the theory explains that social media users also engage in self-censorship if they fear their opinion is the minority. People’s perception of dominant views has a lot to do with their willingness to share personal opinions on social media. Users seek alternative virtual spheres where it is safer to express controversial opinions. One of the advantages of social data mining, however, is the ability to participate in controversial discourses through alternative pathways, away from the scrutiny of people directly related, where similar views are shared, even if they are the opposite to the perceived majority. These include groups, less-invasive social media sites like Twitter, specific chat rooms and forums, and, in some extreme cases, the creation of aliases and fake profiles.
Facebook, for example, allows members to organize themselves into groups. In 2014, Google indexed 620 million Facebook groups, and a user can join up to 6,000 groups at any given time. In these groups, members are allowed to share updates, photos, and documents and send messages to other group members. There are different types of groups, depending on the desired level of privacy: public, closed, and secret groups.
Those who feel they hold the minority opinion on controversial issues may also join less-invasive and impersonal groups like Twitter, which offers a different platform than Facebook. The asymmetrical structure of Twitter gives users the option to follow, without being followed. Conversations are aggregated into hashtags and @mentions, and these interactions often take place among users with little or no personal relationship. The hashtags have also been used as a great tool to diffuse information, regardless of relationship statuses. Hashtags allow topics to be organized and collected as “trends,” and due to the lack of personal relationships, ideas are shared with the main purpose of self-expression without the expectation of reciprocation. Of the eleven reasons for using Twitter identified by the American Press Institute, only three were somewhat relational; all the other nine reasons were topic-specific (Rosenstiel et al. 2015). This gives those with minority views a less-invasive platform to express controversial views. There are also other virtual spaces where people are more comfortable to voice their opinions besides the well-known social media sites mentioned, including forums, chat rooms, blogs, and newsgroups.
Social media without a doubt have given an edge to the democratization of information: people are able to speak up more and share their perspectives and points of view. However, the relational nature of human beings, the need for acceptance, and saving face are still valued in human interactions—in some cultures even more than others. Ultimately, social media users, in fear of being in the minority view, seek alternative strategies to voice their opinions. Saving face, overall, continues to be the ultimate human communication goal, even if the opinion is not really the minority view but just perceived to be the minority view.
0 notes
Text
New Post has been published on Online Professional Homework Help
New Post has been published on http://hwcampus.com/shop/sec-360-full-course-new/
SEC 360 Full Course NEW
SEC 360 Full Course NEW
SEC 360 Data Privacy & Security Entire Course DeVry NEW SEC 360 You Decide Paper Week 2 DeVry
Scenario, Your Role, Key Players Sunshine Machine Works has expanded its infrastructure. When they started there were just three computers, and ten employees. Now there are over 100 employees and their network will have fifty computer terminals, with two servers. During the expansion there has been a lot of discussion about the need for a written computer use policy. You are the IT Services manager for Sunshine Machine Works. This company has seen rapid growth. Management is looking to you to provide a critical input for an Information Systems Use Security Policy. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy. When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we need to centralize our file storage. I am concerned that if we are not careful, some proprietary information could be compromised. We need a good information systems use policy in place. Keep in mind that I am also looking at expanding our business into some oil field work and the standards we will be required to comply with dictate that we have a written policy in place. There are a lot of spreadsheets which have our account information on them. There is restricted access so that the only ones to access those files are the CEO, the General Manager, and me. No other employees have access to most of them. When they need access to financial data, I am contacted and provide them with the feedback they request. I hope that we are able to keep this system running efficiently and any policy helps enhance the safeguarding of our financial data. I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales outreach. I need to have our staff utilize our computing resources with maximum efficiency; however, I want to balance this with the realization our staff may need to check their personal email accounts, bank information, etc. As our file server has arrived and all file storage has been centralized, we need to look at how we secure our network while keeping productivity up. Write a paper consisting of 500-1,000 words (double spaced) about your experience in the Week 1 You Decide exercise. Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems. Students should see Appendix C of the textbook for examples of policies that address the issues that companies may face. Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy suggestions, finalize the policy and it will be provided to the employees. Follow the instructions provided in the You Decide Exercise: Information Systems Use Security Policy. Preview: Over the years I learned through experience that a good security policy needs to adapt and it must be reviewed and revised as the business adapts. As the company continues to expand and many more users being added to the network environment, I advise to keep in mind that the policies and procedures will need to be adjusted accordingly. I suggest that management considers adding more IT Security…. SEC 360 Physical Security Simulation Report Week 5 DeVry Compose a report on the experience of performing the Physical Security survey. Students will write a report consisting of 250-500 words (double-spaced) on experiences in the Physical Security Simulation. Preview: The first stop in the walkthrough was the security guard shack to the Vehicle Yard. There was a sign that stated that badges must be at the ready. This showed that the company had security badges for its employees. I would recommend… SEC 360 You Decide Paper Week 6 DeVry Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server. You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works. Wilma Stone – Chief Executive Officer It’s great that we have expanded and are able to reach out to customers all over the country. With the way things are going, I see real potential for continued success as long as our field assets have the ability to access information here on our local network. I don’t have any problem with any or our people getting access to the resources they need. I just don’t want anything compromised because I don’t want to lose any proprietary information or have any of our customer’s data leaked. Margie Nelson – Chief Financial Officer I am pretty paranoid when it comes to this remote access stuff. I keep hearing about people getting their networks broken in to and the next thing you know their bank accounts have been drained! However, it is apparent that this is an option whose time has come. I hope we are able to keep our data safe. Gary Thomas – General Manager We have workers who travel to remote locations and need to access information here on the Intranet. I would rather have our people accessing information over a secure connection than sending them out to who knows where with a laptop or thumbdrive full of our company information. Let’s see if we can solve the problem of remote access and maintain company proprietary information. Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision. If you are finished reviewing this scenario, close this window and return to this Week’s You Decide tab, in eCollege, to complete the activity for this scenario. You can return and review this scenario again at any time. Preview: There are two possible options for providing the company employees with secure remote access to the company’s network. One is through the use of a VPN (Virtual Private Network), and the other is through cloud computing. A VPN is a private network that uses a public network to connect with remote sites or users (Frannkk, 2012). On the other hand… SEC 360 Quiz Week 1, 3, 5, 7 DeVry
SEC 360 Quiz Week 1 DeVry
(TCO 1) Defense-in-depth is a _____. Security requirement Security model Security strategy Security policy Security control (TCO 1) What are the common effects of controls? Prevention, detection, and response Administration, technology, and physical Detection, accounting, and access control Identification, audit, and access control Confidentiality, integrity, and availability (TCO 1) An organization’s security posture is defined and documented in _____ that must exist before any computers are installed. Standards Guidelines Procedures Tolerance for risk All of the above (TCO 1) The unique security issues and considerations of every system make it crucial to understand all of the following, except _____. Security standards Security skills of developers Hardware and software security configurations Data sensitivity The business of the organization (TCO 2) Which of the following domains is not part of the IISSCC CBK? Architecture Project Management Ethics Law Operations Security (TCO 2) A security event that causes damage is called _____. A compromise A violation An incident A mishap A transgression (TCO 2) What is the enemy of security? Industry Foreign nations Competitors Complexity People (TCO 2) The Cryptography domain includes all of the following topics, except _____. Block and stream ciphers Symmetric key algorithms The OSI model Public Key Infrastructure (TCO 1) Policies and procedures are often referred to as _____. Models A necessary evil Guidelines Documentation (TCO 2) The Application Development Security domain focuses on _____. Sound and secure application development techniques Who may access a system Single sign-on technologies and their risks Specific attacks and countermeasures SEC 360 Quiz Week 3 DeVry
(TCO 3) According to your text, what are the four types of corporate policies? Physical, personnel, technical, and administrative Programme-level, programme-framework, issue specific, and system specific Corporate, system, technology, and device Technical, operational, procedural, and management Laws, orders, directives, and regulations (TCO 3) A user cannot access a file/folder to perform his/her required work activities. Who should the user contact? Security testers Security administrators Access coordinators Network engineers Chief information security officers (TCO 3) _____ authorize access to information. Security administrators Information owners Access coordinators Network engineers Users (TCO 3) What does SDLC stands for? Software development license cycle Software development life cycle System development life cycle System definition life cycle None of the above (TCO 4) Various countries have different views of individual privacy. The European Union (EU) has very different privacy laws than the United States has. To allow U.S. companies better ease of operation in the European Union, the Department of Commerce negotiated the _____ with the EU. Privacy treaty Memorandum of Agreement regarding privacy Privacy Reciprocity Act of 1993 International safe harbor principles Privacy Act of 1983 (TCO 4) Which of the following statements is NOT true? Patent law can be used to protect systems and processes Trademark law can be used to protect a company idea Copyright law can be used to protect source code and user interfaces Trade secret law can be used to protect processes and source code. Trademarks can be used to protect domain names (TCO 5) A reference monitor should have all of the following except which attribute? Complete in that it mediates all access between subjects and objects Changeable by other system entities Simple enough to be completely verified Highly tamper resistant Impossible to bypass (TCO 5) Why are the Bell-LaPadula and Biba models called dual? They are both confidentiality models They use exactly the same rules They are both state transition models They are the same model with reversed rules They are both no read up, no write down models (TCO 4) The _____ program has created the need for companies that create protective equipment to help prevent spies from detecting stray computer signals Information warfare Qualitative risk analysis Information assurance TEMPEST None of the above (TCO 5) What does a product or system have enforced over it by one or more components of the trusted computing base (TCB)? Tools and methodologies Unified security policy Kernel monitoring Driver signing SEC 360 Quiz Week 5 DeVry
(TCO 6) Which of the following is a consideration in site selection? Visibility Transportation Both of the above Neither of the above (TCO 6) Which of the following are categories of intrusion detection devices? Door sensors Biometric detectors Perimeter detectors Security detectors All of the above (TCO 6) All effective security programmes require, among other things, _____. A good management team A physical security plan A sign-in roster A backup at an off-site location Security guards (TCO 7) Security operations generally does not provide controls for _____. Personnel security Resource protection Backup and recovery of locally stored workstation data Privileged entity controls Virus scanning (TCO 7) OPSEC is a(n) _____ discipline. Information security Intelligence Law enforcement Counterintelligence Legal (TCO 8) Disaster recovery planning includes all of the following except _____. IT systems and applications Application data Data entry users Networks Communication lines (TCO 8) A business impact analysis identifies _____. Risks to the business Quantifies risks Risks to the business if critical services are discontinued Priorities of restoring critical services All of the above (TCO 9) What is the U.S. government classification label that means that unauthorized disclosure may seriously damage national security? CONFIDENTIAL SECRET TOP SECRET NOFORN RESTRICTED (TCO 9) For purposes of access controls, identification and authentication applies to _____. Subjects Objects Files Applications All of the above (TCO 9) When a transaction requires only a _____, there is not any actual proof that a particular person conducted that transaction. Written signature Digital signature Password Driver’s license Fingerprint scan SEC 360 Quiz Week 7 DeVry
(TCO 10) A digital signature provides verification of _____ and _____. Sender reliability, message integrity Message authenticity, message integrity Message integrity, sender authenticity Message authenticity, sender integrity Message reliability, message integrity (TCO 10) Computers are _____, and at some point a random number generator becomes _____. Periodic, deterministic Deterministic, periodic Pseudorandom, deterministic Deterministic, pseudorandom Random, deterministic (TCO 11) A packet filter that keeps track of the state of a connection is called a _____. stateful inspection firewall stateful inspection filter stateful inspection router stateful inspection bridge stateful inspection gateway (TCO 11) A Layer 2 firewall is also called a(n) _____. Packet-filtering router Bastion host Packet-filtering bridge Application-level gateway Circuit-level gateway (TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____. Software Remote procedure calls Agent technology Common interfaces Access to local audit records (TCO 12) A decoy used to lure intruders into staying around is called a(n) _____. Pharm Phish Entrapment Honeypot Mug of ale (TCO 12) What are the two major classifications of potential intruders into a network? Foreign and domestic Outside and inside Domestic and international Anonymous and contracted None of the above (TCO 13) Which form of malware is independent of the operating system and replicating? Trap door Virus Worm Trojan Logic bomb (TCO 13) In which system life cycle phase should security policy be established? Test and evaluation Operations and maintenance Requirements definition Acquisition Initiation (TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work? Trap door Virus Worm Trojan horse Logic bomb SEC 360 Discussions Week 1-7 All Posts 253 Pages DeVry
SEC 360 Security Policy and Security CBK Discussions Week 1 All Posts 47 Pages DeVry
SEC 360 Security Policy Discussions 1 Week 1 All Posts 21 Pages DeVry
Policy is central to affecting security in organizations. Using the security policy for your workplace (or other organization with which you are familiar), what are some key features that allow personnel to control security? Are there any deficiencies? What can be added that would improve security? How do you come up with a set of policies for a particular business? How do you enforce? How would you handle non-compliance? Should you have a policy about Jump Drive if there was ONE incident about Jump Drive in the last 10 years?… SEC 360 Security CBK Discussions 2 Week 1 All Posts 26 Pages DeVry
The security Common Body of Knowledge (CBK) describes what security professionals collectively known about the discipline. What knowledge domains are included in the CBK? What do you think will be added to the CBK in the future? What is the logic behind the concept? How do we accommodate IOT? SEC 360 Compliance Legislation and Intellectual Property (IP) Discussions Week 2 All Posts 39 Pages DeVry
SEC 360 Compliance Legislation Discussions 1 Week 2 All Posts 21 Pages DeVry
How can we utilize the four types of security policies to develop a HIPAA security program for organizations? What kinds of information does HIPAA protect? What kinds of organizations does HIPAA cover? What are the differences between HIPAA and HITECH?… SEC 360 Intellectual Property (IP) Discussions 2 Week 2 All Posts 18 Pages DeVry
Your organization has asked you to assist in the discussion about how to best protect its intellectual property (IP). The engineers in your organization have developed new database and ordering software to support a faster process for fulfilling customer orders. Which of the various forms of IP protection will you recommend for safeguarding the engineers’ work? Should it be protected at all? What does the organization risk by getting IP protection? Is Grand’ma recipe a trade secret? So if somebody steals the recipe, what are the remedies? How do you make something a trade mark? Would a sorting program protect-able by law?… SEC 360 Snack Cake Security and Security and the OSI Model Discussions Week 3 All Posts 38 Pages DeVry
SEC 360 Snack Cake Security Discussions 1 Week 3 All Posts 18 Pages DeVry
Your company has a special recipe for snack cakes. This snack cake is a key product in your company’s lineup, and it is responsible for a large majority of shareholder value. Using a security model described in the text, describe an approach that will allow this important recipe to be kept secure. Think of what is most important and review your Security models? How would you use it then? For example KFC has to give the recipe to the stores? Maybe everything comes premixed? How would you control access to the recipe?… SEC 360 Security and the OSI Model Discussions 2 Week 3 All Posts 20 Pages DeVry
Security can have a cumulative effect. Consider the OSI model as a key component of the Common Body of Knowledge. For definitions of OSI layers, click here: OSI Layers. What is the OSI model about, and how can we use it when we are selecting security controls? Explain the function of the 7 layers. How about Confidentiality- where does it fit? How about Integrity? Where do we implement? Can you implement filtering at layer 2 (Data Link Layer)?…. SEC 360 Amusement Security and Security Operations Changes Discussions Week 4 All Posts 33 Pages DeVry
SEC 360 Amusement Security Discussions 1 Week 4 All Posts 17 Pages DeVry
Your company is in the business of entertainment; they run an amusement park. There are thousands of people all over the park every day. It is very important to control who has access to what, and not just for visitors, but for employees as well. Define groups of people, and indicate how you would control physical access for them. How would you handle a shooter in the crowd? How would you handle an evacuation? How about scarf, baseball hats and so on that can prevent identifications of bad folks?… SEC 360 Security Operations Changes Discussions 2 Week 4 All Posts 16 Pages DeVry
Describe how to insert changes in the operational security of the organization. How do you manage those who do not want to accept the changes?… SEC 360 Backup and Recovery Planning and Access Control Lists Discussions Week 5 All Posts 32 Pages DeVry
SEC 360 Backup and Recovery Planning Discussions 1 Week 5 All Posts 17 Pages DeVry
Why are backups so often overlooked in an organization? How do we sell the benefits of spending money on backup solutions to business managers and executives? Now that system are redundant, do we still need backup and recovery plans?… SEC 360 Access Control Lists Discussions 2 Week 5 All Posts 15 Pages DeVry
Access control lists are very valuable for administering granular control over an organization’s resources. So why do a lot of organizations opt not to use them in lieu of more general super user or administrator accounts? It is a challenge to remove administrator rights from users? What strategy should be used? Do you think common users need admin rights?… SEC 360 Cryptography and The Enterprise Firewall is Dead Discussions Week 6 All Posts 33 Pages DeVry
SEC 360 Cryptography Discussions 1 Week 6 All Posts 16 Pages DeVry
Which algorithm is more secure: AES256 or AES128? Why? How about stenography?… SEC 360 The Enterprise Firewall is Dead Discussions 2 Week 6 All Posts 17 Pages DeVry
A popular computer network publication stated at one time that the enterprise firewall was dead. It boldly stated that the exterior firewalls of the organization should be torn down and replaced with host-based firewalls instead. Is this insane, or is it the best new practice in security management? Explain your answer. What types of firewalls do we need today? Which type will provide you better protection? Are traditional firewalls still efficient today? Are these efficient? How do they handle encrypted packets?… SEC 360 Intrusion Detection and Secure as a Car Discussions Week 7 All Posts 31 Pages DeVry
SEC 360 Intrusion Detection Discussions 1 Week 7 All Posts 16 Pages DeVry
Your organization’s business manager has read an article about how intrusion detection systems can help deter hackers. He or she wants to spearhead a campaign to deploy them around the company’s locations in three states. Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary? Specific to this example, how do you respond to ad hoc security requests like this? In general, how can you keep requests like this in check? Are IDS systems enough to deter hackers?… SEC 360 Secure as a Car Discussions 2 Week 7 All Posts 15 Pages DeVry
Engineering software is like engineering a car; if one were so inclined, there could be a completely bug- and security-free application. Do you agree with this? Why or why not?…
0 notes