Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

EXERCISE 1 For this project, you will write a report that details threat assessments for three different organizations. Submit this report as a PDF file on Canvas. Organizations Colonial Pipeline....

1 answer below »
EXERCISE 1

For this project, you will write a report that details threat assessments for three different organizations. Submit this report as a PDF file on Canvas.



Organizations



  1. Colonial Pipeline. You should consider both their corporate network and their operational resources. Reading about the Colonial pipeline attack may help you in this exercise.Colonial Pipeline ransomware attack - WikipediaLinks to an external site.

    .

  2. Oak Ridge National Laboratories. Consider what they do and who their customers are.Oak Ridge National Laboratory - WikipediaLinks to an external site.

    .

  3. An organization of your choosing.



Report details


For each organization's threat assessment, you will need to detail the following information:



  • Who are the actors?

    • What are the organization's users? What are their tasks? What are their goals?

    • Who are the defenders? What are their goals?

    • Who are the adversaries? What are their goals



  • What are the organizational assets?

    • How are they protected?



  • What attacks will the adversaries use?

    • Use the STRIDE model. Be specific with how these attacks will impact the organization's assets, users, and/or defenders.



  • What is the risk for the five most relevant threats?


    • Use the DREAD model. Give justifications for your ratings.














EXERCICE 2 FIND THE ATTACHED FILES

Answered 28 days After Feb 02, 2023

Solution

Deepak answered on Feb 05 2023
50 Votes
If you have any doubt kindly ask in comments !!!!!!
Solution:
*
* bitAnd - x&y using only ~ and |
* Example: bitAnd(6, 5) = 4
* Legal ops: ~ |
* Max ops: 8
* Rating: 1
*
int bitAnd(int x, int y) {
eturn ~(~x|~y);
}
*
* getByte - Extract byte n from word x
* Bytes numbered from 0 (LSB) to 3 (MSB)
* Examples: getByte(0x12345678,1) = 0x56
* Legal ops: ! ~ & ^ | +

* Max ops: 6
* Rating: 2
*

int getByte(int x, int n) {
return (x
(n
3)) & 0xff;
}
*
* logicalShift - shift x to the right by n, using a logical shift
* Can assume that 0 <= n <= 31
* Examples: logicalShift(0x87654321,4) = 0x08765432
* Legal ops: ! ~ & ^ | +

* Max ops: 20
* Rating: 3
*

int logicalShift(int x, int n) {
int n_equals_zero = ~(!n + ~0);
int y = ((x
1) & ~(1
31))
(n + ~0);

return (n_equals_zero & x) | (~n_equals_zero & y);
}
*
* bitCount - returns count of number of 1"s in word
* Examples: bitCount(5) = 2, bitCount(7) = 3
* Legal ops: ! ~ & ^ | +

* Max ops: 40
* Rating: 4
*

int bitCount(int x) {
int mask = 1 + (1
8) + (1
16) + (1
24);
int sums = ((x
0) & mask) +
((x
1) & mask) +
((x
2) & mask) +
((x
3) & mask) +
((x
4) & mask) +
((x
5) & mask) +
((x
6) & mask) +
((x
7) & mask);

return ((sums
0) & 0xff) +
((sums
8) & 0xff) +
((sums
16) & 0xff) +
((sums
24) & 0xff);
}
*
* bang - Compute !x without using !
* Examples: bang(3) = 0, bang(0) = 1
* Legal ops: ~ & ^ | +

* Max ops: 12
* Rating: 4
*
int bang(int x) {
int minus_x = ~x + 1;
int x_msb = (x
31) & 1;
int minus_x_msb = (minus_x
31) & 1;
int x_is_not_zero = x_msb | minus_x_msb;

eturn ~x_is_not_zero & 1;
}
*
* tmin - return minimum two"s complement integer
* Legal ops: ! ~ & ^ | +

* Max ops: 4
* Rating: 1
*
int tmin(void) {
eturn (1
31);
}
*
* fitsBits - return 1 if x can be represented as an
* n-bit, two"s complement integer.
* 1 <= n <= 32
* Examples: fitsBits(5,3) = 0, fitsBits(-4,3) = 1
* Legal ops: ! ~ & ^ | +

* Max ops: 15
* Rating: 2
*
int fitsBits(int x, int n) {
int minus_1 = ~0;
int n_equals_32 = !(n ^ 32);
int x_equals_zero_or_minus_one;

x = x
(n + minus_1);
x_equals_zero_or_minus_one = !((x + 1)^(!x));

eturn n_equals_32 |...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here