Responses

Article 1:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

 

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

 

 

Article 2:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

Web applications, or software as a service (SaaS) Web applications, has certainly revolutionized the way individuals utilize the net. Advancement as advanced and as more people have started to utilize the Internet, the net has experienced through predominant turns specially Web2.0, Web 3.0 and Internet of things. Example customer-facing applications, it has ended up exceptionally troublesome with recently presented security threats. Such applications can effortlessly enter through the conventional security measures taken and enable the programmers to break classified data.

How web 2.0 change securities for internet:

Web 2.0 capabilities serve 2 main purposes 1) to reach the public straightforward manner referred to as social media and 2) to improve the business process. They are progressively utilized by companies for superior staff collaboration and communication. Web 2.0 innovation offers numerous preferences in terms of enhancing the Web and making strides the client involvement, they are too bringing a number of security concerns and assault vectors into presence. Since one characteristic for a web2.0 application is to emerge more noteworthy client association, the presentational the person or client to security threats and vulnerabilities increases.

The following are few security issues of Web 2.0 Environment. They are:

Insufficient Authentication Controls:

In numerous Web 2.0 applications, content is confined within the hands of numerous different clients, not only a select number of affirmed clients. That implies there’s a more noticeable possibility that a less-experienced client will roll out an improvement that will adversely influence the general framework.

Cross Site Scripting (XSS):

In a stored cross-site scripting (XSS) vulnerability, malevolent info sent by a hacker is put away in the framework at that point, then showed to different users. Frameworks that enable clients to include arranged substance – like HTML for instance – are particularly defenseless to this assault

Phishing:

In spite of the fact that phishing isn’t only a hazard related with Web 2.0 applications using any and all means, the huge number of unique client programming being used makes it harder for users to recognize the honest to goodness and the phony sites. That empowers more viable phishing assaults.

Information Leakage and Integrity:

Data Integrity is one of the key components of information security. In spite of the fact that a hack could prompt loss of respectability, so can unexpected falsehood. An incredible case of this in the general population field is a mixed up alter on Wikipedia which is then acknowledged as truth by a considerable lot of the site’s guests. In a business domain, having frameworks open to numerous clients permits a vindictive or mixed up client or clients to post and distribute incorrect data which crushes the respectability of the information.

Despite many security issues, I would use Web2.0 because Web 2.0 is a people-oriented technology. Convenience, social highlights, joint effort, quick stacking applications, intelligence, snappy advancement times and continuous updates are on the whole real patterns. Rather than a million highlights stuffed into one costly programming program, you get littler, sleeker online applications that mean to do only a couple of things extremely well.

 

 

 

 

Article 3:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

 

While developing a new product its uniqueness should be different from others so that it can survive in the competitive world. Its features must be different and understandable so that it can be preferred by everyone easily. Further these features must provide benefits which can attract more customers by using strategies in marketing. This way we can increase sales and also profits. Based on the benefits only customers prefer your product so they must be easy to use, safe and affordable. Further purpose of the product must be easily understood by consumers. Based on products features we can find potential customers. For example say when painting your building you may chose to paint professionals or laborer to paint. But each one’s work is different to each other. While describing your product to customers, say about its benefits and qualities which will make them interest in the product. For example if the product is about athletic gear focus on durability, comfort and design of the product. We can share the social responsibility by creating the product eco friendly and attract more customers.

Social media sites are better platform for interacting with customers. It also helps in building brand among customers daily. By answering their questions and sharing, will helps in building product image and forms loyal group of customers. It has also drawbacks like problem related to customer service may change violent on facebook and twitter and this causes trolls to harass employee and consumers because of inappropriate posts on website. So organizations have to resolve these conflicts sometimes (Basu, 2017).

Web marketing:  this is another strategy for advertising which involves search engine marketing, email marketing, social media marketing, and banner advertising which are done through online. Currently pay per click marketing, SEM is best and evolving quickly in business organizations for advertising.

Consumer Review Networks: with this, consumers can find any product reviews, services and information about brands etc. these reviews will add more value to products in websites. Through this reviews organizations can build up their product value.

 

 

 

 

Article 4:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

This is a service of delivering cargo, especially small-sized goods what do not weigh much by drones. This will require the manufacture of programmed drones, which will use GPS to take route and travel from the point of order to the point of delivery. This will make the process of delivery of small packages fast and efficient, with the recipient receiving his cargo on time. Use of the drones will be more economical as it will save on time and money. No manpower will be required, where the time spent by delivery-persons can be taken, and the individuals find other things to do. Nonetheless, use of drones is a way of improving lifestyle.

Any products will be delivered using drones, especially in urban areas. Therefore, the drones can be used in transferring retail products between sellers and consumers. For instance, vendors of fast foods can be sending lunch boxes to individuals who may have ordered online, right in the places where they are. Therefore, every individual is fit to use the service so long as s/he may wish to transport items without necessarily traveling. The drones will, however, be limited to lifting the weight.

Use of drones in the delivery of cargo is much more economical and environmentally friendly as no burning of fuel is involved and thus, no release of carbon dioxide into the air. The drones use electric energy, which sometimes can be gotten from natural sources such as solar and wind. Among how this service can be marketed electronically include using advertisement though ads on websites, search engines, and phone applications (Gabbai, 2017; Zhang, 2017). The other possible way is through using a tell-a-friend-to-tell-a-friend, initiative after that the service being introduced, the first individuals to use it will recommend their friends using social media such as Facebook, Instagram, among others. The third way is through creating a commercial website and optimizing it using Google search engine, such that upon a customer looking up for such as service, it be popping up atop the list (Gabbai, 2017; Zhang, 2017). One basic disadvantage is that the drones may face obstacles, and they can travel limited ranges of distances. Use of this service will mean joblessness to delivery-person.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab #9

CS1150 Introduction to Computer Science

Lab #9 – Networking, 40 points

Objective:

To study how networks route packets to various destination hosts. Learn how networks ensure reliable delivery.

 

Instructions:

Make sure to do the Activity as outlined in the LabCH19.pdf file. The activity is actually a tutorial that will help you to solve the problems in the exercises. It is expected that you will complete the Activity before you begin the exercises.

When you are finished, save and rename the completed document as “firstname_lastname_lab9.docx”. Then, submit the saved document to Pilot.

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 1

 

1) Start the “TCP/IP” applet.

2) Copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

Note that this message is exactly 52 ASCII characters long, counting spaces and the period at the end.

 

It should look like this:

 

 

 

Then, press the button “Send a message” and watch.

 

3) Count how many DAT and ACK packets were sent. (Don’t rely on the “Status” box, actually count the packets yourself.)

 

Write your answers here:

 

DEFINE DAT AND GIVE NUMBER OF DAT PACKETS:

 

DEFINE ACK AND GIVE NUMBER OF ACK PACKETS:

 

 

4) Determine the steps for calculating how many characters were sent during the entire exchange.

 

Assuming that:

· Every DAT or ACK packet has a packet header (example: DAT 1 0 221)

· Besides the packet header, every DAT packet carries AT MOST 10 characters of data.

· The last packet carried less than 10 characters of data. (52 data characters in the message, remember? 52 doesn’t divide nicely into 10)

· ACK packets have no data, just a packet header.

· Every blank space, even in a packet header, counts as a character.

· Assume that every packet header is 9 characters long

 

We calculated that exactly 171 characters were sent back and forth in total during the entire process. How did we get that number?

 

Show the mathematical steps to calculate the number 171 here, below this line.:

 

 

 

5) Calculate the overhead, expressed as a percentage. Here is the process:

· There are 52 characters of actual data in the message, including blanks and punctuation.

· Subtract the number of characters of actual data (52 characters) from the total number of characters sent in both directions in all the packets (from earlier in the lab). This gives you the number of characters sent that were not actually data, just part of the cost/overhead of sending the actual data.

· Divide the number of overhead characters by the total number of characters to calculate the overhead expressed as a percentage of the total.

 

Write the overhead percentage here, below this line:

 

 

 

 

6) Imagine you have a million-character message to send. Calculate how many packets will be needed and how many characters will be sent in total for the entire process to move the message from node 0 to node 1:

 

Write your answers here:

 

HOW MANY PACKETS TOTAL:

HOW MANY CHARACTERS TOTAL:

 

 

 

7) What would be an obvious way to decrease the overhead percentage? Why might this solution backfire? Under what conditions would that occur?

 

Write your answers here:

 

OBVIOUS WAY TO DECREASE OVERHEAD PERCENTAGE:

HOW THAT COULD BACKFIRE:

UNDER WHAT CONDITIONS:

 

 

8) What is the purpose of IP address? What is the purpose of Routers?

 

Write your answers here:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 2

 

1) Start or restart the “TCP/IP” applet again. Once again, copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

2) This time, change the selection away from Leave packets undamaged to Delete packets that are touched.

3) Delete some data packets by clicking on them as they move along the wire, and watch the re-transmission after timeout.

 

 

 

 

 

4) What happens if you delete the re-transmitted packet? Does the TCP/IP applet need to take any special action?

 

Write what happens here, below this line:

 

 

 

Is special action needed if re-transmitted packet is deleted? Write your answer here, below this line:

 

 

 

 

5) What happens if you delete ACK or NAK packets?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

EXERCISE 3

 

1) Start the “Network router” applet.

Select Example 3, the ring network.

 

 

2) Double-click on the node 37.61.25.46. List the nodes it is directly connected to (the nodes in its connection table).

 

Write your list of nodes here, below this line:

 

3) If 37.61.25.46 wants to send packets to a node that is not directly connected, to which node will it first send the packets? (Check the routing table by double clicking on the node.)

 

Write the address of the next node here, below this line:

 

4) Run the applet for a while, letting it generate packets continuously. Double-click on 37.61.25.46 again and look at its statistics. How many packets were sent? Received? Forwarded?

 

Write your answers here:

 

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

5) Which nodes are sending packets out, and to whom?

 

Write your answers here:

 

NODES THAT ARE SENDING PACKETS:

NODES THAT ARE RECEIVING PACKETS:

 

6) Click on 138.92.6.17. Write down its statistics.

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

 

 

 

 

EXERCISE 4

 

1) Start the “Network router” applet. Select Example 4, the star network.

2) Look at the routing and connection tables for the center node and several other nodes. Describe any pattern you can see in these tables.

 

Write your description here, below this line:

 

3) How is the connection table for the center node different from the other nodes?

 

Write your answer here, below this line:

 

4) Select Generate when I click on a node from the pull-down menu.

 

5) If you double-click on 159.121.2.13, you will see that its destination node is 126.14.5.46. Run the applet, click on 159.121.2.13, and watch the packets go. What color does the sending computer turn briefly? What color does the destination computer turn? What does it mean if a node flashes green?

 

Write your answers here:

WHAT COLOR (SENDING COMPUTER):

WHAT COLOR (DESTINATION COMPUTER):

WHAT DOES IT MEAN IF A NODE FLASHES GREEN:

 

Try it again with 8.10.20.25 to confirm.

 

 

 

6) Many early computer networks used a star topology like this example. What would happen if the center node in this type of network dies?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Exercise 5

 

Create a new topology using 4 nodes.

 

1) Create 4 nodes with following IP addresses

Node 1 = 130.108.7.11

Node 2 = 130.108.7.22

Node 3 = 130.108.7.33

Node 4 = 130.108.7.44

 

2) Make Node 3 as a forwarding node and connect it with all the other remaining nodes.

3) Let the sender receiver pair be as following:

Sender Receiver
Node 1 Node 2
Node 2 Node 4
Node 4 Node 1

 

 

4) Your topology should look like as given below:

5) Paste your screenshot below this line:

 

 

Rubric (40 pts possible):

Exercise   Points
1 Question 1 0
  Question 2 0
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 1
  Question 7 1
  Question 8 2
2 Question 1 0
  Question 2 1
  Question 3 1
  Question 4 3
  Question 5 3
3 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
4 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
5 Question 1 2
  Question 2 2
  Question 3 2
  Question 5 2
Total   40
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch03_Cap_Gym

Exp19_Excel_Ch03_Cap_Gym

 

#Exp19 Excel Ch03 Cap Gym

 

Project Description:

You and a business partner opened a fitness gym three years ago. Your partner oversees managing the operations of the gym, ensuring the right equipment is on hand, maintenance is conducted, and the appropriate classes are being offered with the right trainers and staff. You oversee managing the business aspects, such as marketing, finance, and general personnel issues. The business is nearing the end of its third year. You have put together the financials, and now you want to show the data more visually because you know it will make more sense to your business partner that way. You want to create charts and insert sparklines that show the trends to discuss with your partner.

 

Start   Excel. Download and open the file named Exp19_Excel_Ch03_Cap_Gym.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

You will create a pie chart to   focus on the expenses for the current year.
Insert a 2-D pie chart using the ranges A11:A19 and D11:D19 on the Income   worksheet.

 

Move the chart to a new chart   sheet named Expenses. Move it to the right of the Membership sheet.

 

The chart needs a descriptive,   easy-to-read title.
Change the chart title to Expenses for Year 3 and change the font size to 20.

 

You want to create a clustered   bar chart.
Insert a clustered bar chart using the ranges A4:D4 and A11:D19 on the Income   worksheet.

 

You want to place this chart and   other charts on a Summary worksheet to look at trends.
Move the chart as an object on the Summary worksheet. Cut the bar chart and   paste it in cell I1.

 

The chart should have a   descriptive title to explain which expenses are excluded.
Change the bar chart title to Expenses (Without Payroll and Cost of Sales).

 

You want to filter out the   Payroll and Cost of Sales to focus on other expenses. The bar chart displays   expenses the first expense (Advertising) at the bottom of the category axis.   You want to reverse the categories to display in the same sequence as the   expenses are listed in the worksheet.
Apply a chart filter to remove Payroll and Cost of Sales. Select the category   axis and use the Format Axis task pane to display categories in reverse   order. Change the Maximum Bound to 25000.
Mac Users: Apply the filter using Select Data and Switch Row/Column. Be sure   to switch the rows and columns back after filtering the data.

 

You decide to format the pie   chart with data labels and remove the legend because there are too many   categories for the legend to be effective.
Display the Expenses sheet and remove the legend. Add Percent and Category   Name data labels and choose Outside End position for the labels. Change the   data labels font size to 10.

 

You want to emphasize the   Education & Training slice by exploding it.
Explode the Education & Training slice by 12%.

 

Add the Light Gradient – Accent   2 fill color to the chart area.

 

You create another chart showing   the Balance sheet items. You change the chart to a clustered column and   switch the row and column data to focus on each balance sheet item.
Insert a stacked column chart using the ranges A4:D4, A10:D10, A15:D15, and   A16:D16 on the Balance sheet.
Change the chart type to Clustered Column and switch the rows and columns in   the chart.

 

You want to move the column   chart to be on the Summary worksheet along with the bar chart.
Move the column chart to the Summary worksheet. Cut the chart and paste it in   cell A1.

 

The column chart needs to have a   descriptive title to indicate the data comes from the Balance
sheet.
Change the title to 3-Year Balance Sheet.

 

The last chart will be a line   chart to show the trends in Memberships.
Insert a line chart using the range I3:L15 on the Membership worksheet.

 

You want to move the line chart   to be on the same Summary sheet as column and bar charts.
Move the line chart to the Summary worksheet. Cut the chart and paste it in   cell A17.

 

Because the lowest value is   between 200 and 300, you will change the vertical axis at 200 instead of 0.
Adjust the vertical axis so the Minimum Bound is 200 and display a vertical axis title # of   Memberships for   the line chart.

 

Apply Chart Style 4 and change   colors to Monochromatic Palette 8 for the line chart.

 

Move the legend to the top of   the chart and add the chart title 3-Year Membership Trends.

 

It is a best practice to add Alt   Text for each chart for accessibility compliance.
Display the pie chart and add Alt Text: The pie chart displays percentage of   expenses for Year 3. (including the period)

 

Display the column chart and add   Alt Text: The column chart displays total assets, total   liabilities, and retained earnings for three years. (including the period)

 

Display the bar chart and add   Alt Text: The bar chart displays expenses for three years without   payroll or cost of sales. (including the period)

 

Display the line chart and add   Alt Text: The line chart displays monthly trends in   memberships for three years. (including the period)

 

You want to add sparklines to   the Daily Attendance Trends. You add high points to emphasize which time of   day is the most popular for your membership.
Select range B16:F16 on the Membership worksheet. Insert Column Sparklines using   data from the range B6:F14. Display the high points for the sparklines.

 

Insert a footer with Exploring   Series on the   left, the sheet name code in the center, and the file name code on the right   on the Membership, Expenses, and Summary sheets individually. Change to   Normal view.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Web Design

5-21bApply: Case Problem 1

Data Files needed for this Case Problem: gp_cover_txt.html, gp_page1_txt.html, gp_page2_txt.html, gp_page3_txt.html, gp_layout_txt.css, gp_print_txt.css, 2 CSS files, 21 PNG files

Golden Pulps Devan Ryan manages the website Golden Pulps, where he shares tips on collecting and fun stories from the “golden age of comic books”—a period of time covering 1938 through the early 1950s. Devan wants to provide online versions of several classic comic books, which are now in the public domain.

He’s scanned the images from the golden age comic book, America’s Greatest Comics 001, published in March, 1941 by Fawcett Comics and featuring Captain Marvel. He’s written the code for the HTML file and wants you to help him develop a layout design that will be compatible with mobile and desktop devices. Figure 5-59 shows a preview of the mobile and desktop version of a page you’ll create.

Figure 5-59Golden Pulps Sample PageA screenshot shows “Golden Pulps” sample page in mobile and desktop versions.Enlarge Image© 2016 Cengage Learning; © Courtesy Patrick Carey; Source: Comic Book Plus

Complete the following:

  1. 1Using your editor, open the gp_cover_txt.html, gp_page1_txt.html, gp_page2_txt.html, gp_page3_txt.html, gp_layout_txt.css, and gp_print_txt.css files from the html05 ► case1 folder. Enter your name and the date in the comment section of each file, and save them as gp_cover.html, gp_page1.html, gp_page2.html, gp_page3.html, gp_layout.css, and gp_print.css respectively.
  2. 2Go to the gp_cover.html file in your editor. Add a viewport meta tag to the document head, setting the width of the layout viewport to the device width and setting the initial scale of the viewport to 1.0.
  3. 3Create links to the following style sheets: a) the gp_reset.css file to be used with all devices, b) the gp_layout.css file to be used with screen devices, and c) the gp_print.css file to be used for printed output.
  4. 4Take some time to study the contents and structure of the file. Note each panel from the comic book is stored as a separate inline image with the class name panel along with class names of size1 to size4 indicating the size of the panel. Size1 is the largest panel down to size4, which is the smallest panel. Close the file, saving your changes.
  5. 5Repeat Steps 2 through 4 for the gp_page1.html, gp_page2.html, and gp_page3.html files.
  6. 6Go to the gp_layout.css file in your editor. In this style sheet, you’ll create the layout styles for mobile and desktop devices. Note that Devan has used the @import rule to import the gp_designs.css file, which contains several graphical and typographical style rules.
  7. 7Go to the Flex Layout Styles section and insert a style rule to display the page body as a flexbox oriented as rows with wrapping. As always, include the latest WebKit browser extension in all of your flex styles.
  8. 8The page body content has two main elements. The section element with the ID sheet contains the panels from the comic book page. The article element contains information about the comic book industry during the Golden Age. Devan wants more of the page width to be given to the comic book sheet. Add a style rule that sets the growth and shrink rate of the sheet section to 3 and 1 respectively and set its basis size to 301 pixels.
  9. 9Less page width will be given to the article element. Create a style rule to set its flex growth and shrink values to 1 and 3 respectively and set its basis size to 180 pixels.
  10. 10Go to the Mobile Devices section and create a media query for screen devices with a maximum width of 480 pixels.
  11. 11With mobile devices, Devan wants each comic book panel image to occupy a single row. Create a style rule that sets the width of images belonging to the panel class to 100%.
  12. 12For mobile devices, Devan wants the horizontal navigation links to other pages on the Golden Pulps website to be displayed near the bottom of the page. Within the media query, set the flex order of the horizontal navigation list to 99.
  13. 13Create a style rule to set the flex order of the body footer to 100. (Hint: There are two footer elements in the document, use a selector that selects the footer element that is a direct child of the body element.)
  14. 14Go to the Tablet and Desktop Devices: Greater than 480 pixels section and create a media query that matches screen devices with widths greater than 480 pixels.
  15. 15For tablet and desktop devices, you’ll lay out the horizontal navigation list as a single row of links. Within the media query, create a style rule that displays the ul element within the horizontal navigation list as a flexbox, oriented in the row direction with no wrapping. Set the height of the element to 40 pixels.
  16. 16For each li element within the ul element of the horizontal navigation list set their growth, shrink, and basis size values to 1, 1, and auto respectively so that each list items grows and shrinks at the same rate.
  17. 17With wider screens, Devan does not want the panels to occupy their own rows as is the case with mobile devices. Instead, within the media query create style rules, define the width of the different classes of comic book panel images as follows:
    1. Set the width of size1 img elements to 100%.
    2. Set the width of size2 img elements to 60%.
    3. Set the width of size3 img elements to 40%.
    4. Set the width of size4 img elements to 30%.
  18. 18Save your changes to the file and then open the gp_cover.html file in your browser or device emulator. Click the navigation links to view the contents of the cover and first three pages. Verify that with a narrow screen the panels occupy their own rows and with a wider screen the sheets are laid out with several panels per row. Further verify that the horizontal navigation list is placed at the bottom of the page for mobile devices.
  19. 19Devan also wants a print style that displays each comic book sheet on its own page and with none of the navigation links. Go to the gp_print.css style sheet in your editor. Add style rules to
    1. hide the nav, footer, and article elements.
    2. set the width of the section element with the ID sheet to 6 inches. Set the top/bottom margin of that element to 0 inches and the left/right margin to auto in order to center it within the printed page.
    3. set the width of size1 images to 5 inches, size2 images to 3 inches, size3 images to 2 inches, and size4 images to 1.5 inches.
  20. 20Save your changes to the file and then reload the contents of the comic book pages in your browser and preview the printed pages. Verify that the printed page displays only the website logo, the name of the comic book, and the comic book panels.

gp_back1.pnggp_cover_txt.htmlgp_designs.cssPreview the documentgp_layout_txt.cssPreview the documentgp_layout_txt.cssPreview the documentgp_logo.pnggp_next.pnggp_page1_txt.htmlgp_page2_txt.htmlgp_page3_txt.htmlgp_panel01.pnggp_panel02.pnggp_panel03.pnggp_panel04.pnggp_panel05.pnggp_panel06.pnggp_panel07.pnggp_panel08.pnggp_panel09.pnggp_panel10.pnggp_panel11.pnggp_panel12.pnggp_panel13.pnggp_panel14.pnggp_panel15.pnggp_panel16.pnggp_panel17.pnggp_prev.pnggp_print_txt.cssPreview the documentgp_reset.cssPreview the document

PreviousNext

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

6 Queztion In Artificial Inteligence

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 7

Pascal’s successes with calculating machines inspired Gottfried Wilhelm von Leibniz in 1694 to complete a working machine that become known as the Leibniz Wheel. It inte- grated a moveable carriage and hand crank to drive wheels and cylinders that performed the more complex operations of multiplication and division. Leibniz was also fascinated by the possibility of a automated logic for proofs of propositions. Returning to Bacon’s entity specification algorithm, where concepts were characterized as the collection of their necessary and sufficient features, Liebniz conjectured a machine that could calculate with these features to produce logically correct conclusions. Liebniz (1887) also envisioned a machine, reflecting modern ideas of deductive inference and proof, by which the produc- tion of scientific knowledge could become automated, a calculus for reasoning.

The seventeenth and eighteenth centuries also saw a great deal of discussion of episte- mological issues; perhaps the most influential was the work of René Descartes, a central figure in the development of the modern concepts of thought and theories of mind. In his Meditations, Descartes (1680) attempted to find a basis for reality purely through intro- spection. Systematically rejecting the input of his senses as untrustworthy, Descartes was forced to doubt even the existence of the physical world and was left with only the reality of thought; even his own existence had to be justified in terms of thought: “Cogito ergo sum” (I think, therefore I am). After he established his own existence purely as a thinking entity, Descartes inferred the existence of God as an essential creator and ultimately reas- serted the reality of the physical universe as the necessary creation of a benign God.

We can make two observations here: first, the schism between the mind and the phys- ical world had become so complete that the process of thinking could be discussed in iso- lation from any specific sensory input or worldly subject matter; second, the connection between mind and the physical world was so tenuous that it required the intervention of a benign God to support reliable knowledge of the physical world! This view of the duality between the mind and the physical world underlies all of Descartes’s thought, including his development of analytic geometry. How else could he have unified such a seemingly worldly branch of mathematics as geometry with such an abstract mathematical frame- work as algebra?

Why have we included this mind/body discussion in a book on artificial intelligence? There are two consequences of this analysis essential to the AI enterprise:

1. By attempting to separate the mind from the physical world, Descartes and related thinkers established that the structure of ideas about the world was not necessar- ily the same as the structure of their subject matter. This underlies the methodol- ogy of AI, along with the fields of epistemology, psychology, much of higher mathematics, and most of modern literature: mental processes have an existence of their own, obey their own laws, and can be studied in and of themselves.

2. Once the mind and the body are separated, philosophers found it necessary to find a way to reconnect the two, because interaction between Descartes mental, res cogitans, and physical, res extensa, is essential for human existence.

Although millions of words have been written on this mind–body problem, and numerous solutions proposed, no one has successfully explained the obvious interactions between mental states and physical actions while affirming a fundamental difference

 

 

8 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

between them. The most widely accepted response to this problem, and the one that provides an essential foundation for the study of AI, holds that the mind and the body are not fundamentally different entities at all. On this view, mental processes are indeed achieved by physical systems such as brains (or computers). Mental processes, like physi- cal processes, can ultimately be characterized through formal mathematics. Or, as acknowledged in his Leviathan by the 17th century English philosopher Thomas Hobbes (1651), “By ratiocination, I mean computation”.

1.1.2 AI and the Rationalist and Empiricist Traditions

Modern research issues in artificial intelligence, as in other scientific disciplines, are formed and evolve through a combination of historical, social, and cultural pressures. Two of the most prominent pressures for the evolution of AI are the empiricist and rationalist traditions in philosophy.

The rationalist tradition, as seen in the previous section, had an early proponent in Plato, and was continued on through the writings of Pascal, Descartes, and Liebniz. For the rationalist, the external world is reconstructed through the clear and distinct ideas of a mathematics. A criticism of this dualistic approach is the forced disengagement of repre- sentational systems from their field of reference. The issue is whether the meaning attrib- uted to a representation can be defined independent of its application conditions. If the world is different from our beliefs about the world, can our created concepts and symbols still have meaning?

Many AI programs have very much of this rationalist flavor. Early robot planners, for example, would describe their application domain or “world” as sets of predicate calculus statements and then a “plan” for action would be created through proving theorems about this “world” (Fikes et al. 1972, see also Section 8.4). Newell and Simon’s Physical Symbol System Hypothesis (Introduction to Part II and Chapter 16) is seen by many as the arche- type of this approach in modern AI. Several critics have commented on this rationalist bias as part of the failure of AI at solving complex tasks such as understanding human lan- guages (Searle 1980, Winograd and Flores 1986, Brooks 1991a).

Rather than affirming as “real” the world of clear and distinct ideas, empiricists con- tinue to remind us that “nothing enters the mind except through the senses”. This con- straint leads to further questions of how the human can possibly perceive general concepts or the pure forms of Plato’s cave (Plato 1961). Aristotle was an early empiricist, emphasiz- ing in his De Anima, the limitations of the human perceptual system. More modern empir- icists, especially Hobbes, Locke, and Hume, emphasize that knowledge must be explained through an introspective but empirical psychology. They distinguish two types of mental phenomena perceptions on one hand and thought, memory, and imagination on the other. The Scots philosopher, David Hume, for example, distinguishes between impressions and ideas. Impressions are lively and vivid, reflecting the presence and existence of an exter- nal object and not subject to voluntary control, the qualia of Dennett (2005). Ideas on the other hand, are less vivid and detailed and more subject to the subject’s voluntary control.

Given this distinction between impressions and ideas, how can knowledge arise? For Hobbes, Locke, and Hume the fundamental explanatory mechanism is association.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 9

Particular perceptual properties are associated through repeated experience. This repeated association creates a disposition in the mind to associate the corresponding ideas, a pre- curser of the behaviorist approach of the twentieth century. A fundamental property of this account is presented with Hume’s skepticism. Hume’s purely descriptive account of the origins of ideas cannot, he claims, support belief in causality. Even the use of logic and induction cannot be rationally supported in this radical empiricist epistemology.

In An Inquiry Concerning Human Understanding (1748), Hume’s skepticism extended to the analysis of miracles. Although Hume didn’t address the nature of miracles directly, he did question the testimony-based belief in the miraculous. This skepticism, of course, was seen as a direct threat by believers in the bible as well as many other purvey- ors of religious traditions. The Reverend Thomas Bayes was both a mathematician and a minister. One of his papers, called Essay towards Solving a Problem in the Doctrine of Chances (1763) addressed Hume’s questions mathematically. Bayes’ theorem demon- strates formally how, through learning the correlations of the effects of actions, we can determine the probability of their causes.

The associational account of knowledge plays a significant role in the development of AI representational structures and programs, for example, in memory organization with semantic networks and MOPS and work in natural language understanding (see Sections 7.0, 7.1, and Chapter 15). Associational accounts have important influences of machine learning, especially with connectionist networks (see Section 10.6, 10.7, and Chapter 11). Associationism also plays an important role in cognitive psychology including the sche- mas of Bartlett and Piaget as well as the entire thrust of the behaviorist tradition (Luger 1994). Finally, with AI tools for stochastic analysis, including the Bayesian belief network (BBN) and its current extensions to first-order Turing-complete systems for stochastic modeling, associational theories have found a sound mathematical basis and mature expressive power. Bayesian tools are important for research including diagnostics, machine learning, and natural language understanding (see Chapters 5 and 13).

Immanuel Kant, a German philosopher trained in the rationalist tradition, was strongly influenced by the writing of Hume. As a result, he began the modern synthesis of these two traditions. Knowledge for Kant contains two collaborating energies, an a priori component coming from the subject’s reason along with an a posteriori component com- ing from active experience. Experience is meaningful only through the contribution of the subject. Without an active organizing form proposed by the subject, the world would be nothing more than passing transitory sensations. Finally, at the level of judgement, Kant claims, passing images or representations are bound together by the active subject and taken as the diverse appearances of an identity, of an “object”. Kant’s realism began the modern enterprise of psychologists such as Bartlett, Brunner, and Piaget. Kant’s work influences the modern AI enterprise of machine learning (Section IV) as well as the con- tinuing development of a constructivist epistemology (see Chapter 16).

1.1.3 The Development of Formal Logic

Once thinking had come to be regarded as a form of computation, its formalization and eventual mechanization were obvious next steps. As noted in Section 1.1.1,

 

 

10 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

Gottfried Wilhelm von Leibniz, with his Calculus Philosophicus, introduced the first sys- tem of formal logic as well as proposed a machine for automating its tasks (Leibniz 1887). Furthermore, the steps and stages of this mechanical solution can be represented as move- ment through the states of a tree or graph. Leonhard Euler, in the eighteenth century, with his analysis of the “connectedness” of the bridges joining the riverbanks and islands of the city of Königsberg (see the introduction to Chapter 3), introduced the study of representa- tions that can abstractly capture the structure of relationships in the world as well as the discrete steps within a computation about these relationships (Euler 1735).

The formalization of graph theory also afforded the possibility of state space search, a major conceptual tool of artificial intelligence. We can use graphs to model the deeper structure of a problem. The nodes of a state space graph represent possible stages of a problem solution; the arcs of the graph represent inferences, moves in a game, or other steps in a problem solution. Solving the problem is a process of searching the state space graph for a path to a solution (Introduction to II and Chapter 3). By describing the entire space of problem solutions, state space graphs provide a powerful tool for measuring the structure and complexity of problems and analyzing the efficiency, correctness, and gener- ality of solution strategies.

As one of the originators of the science of operations research, as well as the designer of the first programmable mechanical computing machines, Charles Babbage, a nine- teenth century mathematician, may also be considered an early practitioner of artificial intelligence (Morrison and Morrison 1961). Babbage’s difference engine was a special- purpose machine for computing the values of certain polynomial functions and was the forerunner of his analytical engine. The analytical engine, designed but not successfully constructed during his lifetime, was a general-purpose programmable computing machine that presaged many of the architectural assumptions underlying the modern computer.

In describing the analytical engine, Ada Lovelace (1961), Babbage’s friend, sup- porter, and collaborator, said:

We may say most aptly that the Analytical Engine weaves algebraical patterns just as the Jac- quard loom weaves flowers and leaves. Here, it seems to us, resides much more of originality than the difference engine can be fairly entitled to claim.

Babbage’s inspiration was his desire to apply the technology of his day to liberate humans from the drudgery of making arithmetic calculations. In this sentiment, as well as with his conception of computers as mechanical devices, Babbage was thinking in purely nineteenth century terms. His analytical engine, however, also included many modern notions, such as the separation of memory and processor, the store and the mill in Bab- bage’s terms, the concept of a digital rather than analog machine, and programmability based on the execution of a series of operations encoded on punched pasteboard cards. The most striking feature of Ada Lovelace’s description, and of Babbage’s work in gen- eral, is its treatment of the “patterns” of algebraic relationships as entities that may be studied, characterized, and finally implemented and manipulated mechanically without concern for the particular values that are finally passed through the mill of the calculating machine. This is an example implementation of the “abstraction and manipulation of form” first described by Aristotle and Liebniz.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 11

The goal of creating a formal language for thought also appears in the work of George Boole, another nineteenth-century mathematician whose work must be included in any discussion of the roots of artificial intelligence (Boole 1847, 1854). Although he made contributions to a number of areas of mathematics, his best known work was in the mathematical formalization of the laws of logic, an accomplishment that forms the very heart of modern computer science. Though the role of Boolean algebra in the design of logic circuitry is well known, Boole’s own goals in developing his system seem closer to those of contemporary AI researchers. In the first chapter of An Investigation of the Laws of Thought, on which are founded the Mathematical Theories of Logic and Probabilities, Boole (1854) described his goals as

to investigate the fundamental laws of those operations of the mind by which reasoning is performed: to give expression to them in the symbolical language of a Calculus, and upon this foundation to establish the science of logic and instruct its method; …and finally to collect from the various elements of truth brought to view in the course of these inquiries some proba- ble intimations concerning the nature and constitution of the human mind.

The importance of Boole’s accomplishment is in the extraordinary power and sim- plicity of the system he devised: three operations, “AND” (denoted by

 

∗ or

 

∧), “OR” (denoted by

 

+ or

 

∨), and “NOT” (denoted by

 

¬), formed the heart of his logical calculus. These operations have remained the basis for all subsequent developments in formal logic, including the design of modern computers. While keeping the meaning of these symbols nearly identical to the corresponding algebraic operations, Boole noted that “the Symbols of logic are further subject to a special law, to which the symbols of quantity, as such, are not subject”. This law states that for any X, an element in the algebra, X

 

∗X

 

=X (or that once something is known to be true, repetition cannot augment that knowledge). This led to the characteristic restriction of Boolean values to the only two numbers that may satisfy this equation: 1 and 0. The standard definitions of Boolean multiplication (AND) and addition (OR) follow from this insight.

Boole’s system not only provided the basis of binary arithmetic but also demonstrated that an extremely simple formal system was adequate to capture the full power of logic. This assumption and the system Boole developed to demonstrate it form the basis of all modern efforts to formalize logic, from Russell and Whitehead’s Principia Mathematica (Whitehead and Russell 1950), through the work of Turing and Gödel, up to modern auto- mated reasoning systems.

Gottlob Frege, in his Foundations of Arithmetic (Frege 1879, 1884), created a mathematical specification language for describing the basis of arithmetic in a clear and precise fashion. With this language Frege formalized many of the issues first addressed by Aristotle’s Logic. Frege’s language, now called the first-order predicate calculus, offers a tool for describing the propositions and truth value assignments that make up the elements of mathematical reasoning and describes the axiomatic basis of “meaning” for these expressions. The formal system of the predicate calculus, which includes predicate sym- bols, a theory of functions, and quantified variables, was intended to be a language for describing mathematics and its philosophical foundations. It also plays a fundamental role in creating a theory of representation for artificial intelligence (Chapter 2). The first-order

 

 

12 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

predicate calculus offers the tools necessary for automating reasoning: a language for expressions, a theory for assumptions related to the meaning of expressions, and a logi- cally sound calculus for inferring new true expressions.

Whitehead and Russell’s (1950) work is particularly important to the foundations of AI, in that their stated goal was to derive the whole of mathematics through formal opera- tions on a collection of axioms. Although many mathematical systems have been con- structed from basic axioms, what is interesting is Russell and Whitehead’s commitment to mathematics as a purely formal system. This meant that axioms and theorems would be treated solely as strings of characters: proofs would proceed solely through the application of well-defined rules for manipulating these strings. There would be no reliance on intu- ition or the meaning of theorems as a basis for proofs. Every step of a proof followed from the strict application of formal (syntactic) rules to either axioms or previously proven the- orems, even where traditional proofs might regard such a step as “obvious”. What “mean- ing” the theorems and axioms of the system might have in relation to the world would be independent of their logical derivations. This treatment of mathematical reasoning in purely formal (and hence mechanical) terms provided an essential basis for its automation on physical computers. The logical syntax and formal rules of inference developed by Russell and Whitehead are still a basis for automatic theorem-proving systems, presented in Chapter 14, as well as for the theoretical foundations of artificial intelligence.

Alfred Tarski is another mathematician whose work is essential to the foundations of AI. Tarski created a theory of reference wherein the well-formed formulae of Frege or Russell and Whitehead can be said to refer, in a precise fashion, to the physical world (Tarski 1944, 1956; see Chapter 2). This insight underlies most theories of formal seman- tics. In his paper The Semantic Conception of Truth and the Foundation of Semantics, Tar- ski describes his theory of reference and truth value relationships. Modern computer scientists, especially Scott, Strachey, Burstall (Burstall and Darlington 1977), and Plotkin have related this theory to programming languages and other specifications for computing.

Although in the eighteenth, nineteenth, and early twentieth centuries the formaliza- tion of science and mathematics created the intellectual prerequisite for the study of artifi- cial intelligence, it was not until the twentieth century and the introduction of the digital computer that AI became a viable scientific discipline. By the end of the 1940s electronic digital computers had demonstrated their potential to provide the memory and processing power required by intelligent programs. It was now possible to implement formal reason- ing systems on a computer and empirically test their sufficiency for exhibiting intelli- gence. An essential component of the science of artificial intelligence is this commitment to digital computers as the vehicle of choice for creating and testing theories of intelligence.

Digital computers are not merely a vehicle for testing theories of intelligence. Their architecture also suggests a specific paradigm for such theories: intelligence is a form of information processing. The notion of search as a problem-solving methodology, for example, owes more to the sequential nature of computer operation than it does to any biological model of intelligence. Most AI programs represent knowledge in some formal language that is then manipulated by algorithms, honoring the separation of data and program fundamental to the von Neumann style of computing. Formal logic has emerged as an important representational tool for AI research, just as graph theory plays an indis-

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 13

pensable role in the analysis of problem spaces as well as providing a basis for semantic networks and similar models of semantic meaning. These techniques and formalisms are discussed in detail throughout the body of this text; we mention them here to emphasize the symbiotic relationship between the digital computer and the theoretical underpinnings of artificial intelligence.

We often forget that the tools we create for our own purposes tend to shape our conception of the world through their structure and limitations. Although seemingly restrictive, this interaction is an essential aspect of the evolution of human knowledge: a tool (and scientific theories are ultimately only tools) is developed to solve a particular problem. As it is used and refined, the tool itself seems to suggest other applications, leading to new questions and, ultimately, the development of new tools.

1.1.4 The Turing Test

One of the earliest papers to address the question of machine intelligence specifically in relation to the modern digital computer was written in 1950 by the British mathematician Alan Turing. Computing Machinery and Intelligence (Turing 1950) remains timely in both its assessment of the arguments against the possibility of creating an intelligent computing machine and its answers to those arguments. Turing, known mainly for his contributions to the theory of computability, considered the question of whether or not a machine could actually be made to think. Noting that the fundamental ambiguities in the question itself (what is thinking? what is a machine?) precluded any rational answer, he proposed that the question of intelligence be replaced by a more clearly defined empirical test.

The Turing test measures the performance of an allegedly intelligent machine against that of a human being, arguably the best and only standard for intelligent behavior. The test, which Turing called the imitation game, places the machine and a human counterpart in rooms apart from a second human being, referred to as the interrogator (Figure 1.1). The interrogator is not able to see or speak directly to either of them, does not know which entity is actually the machine, and may communicate with them solely by use of a textual device such as a terminal. The interrogator is asked to distinguish the computer from the human being solely on the basis of their answers to questions asked over this device. If the interrogator cannot distinguish the machine from the human, then, Turing argues, the machine may be assumed to be intelligent.

By isolating the interrogator from both the machine and the other human participant, the test ensures that the interrogator will not be biased by the appearance of the machine or any mechanical property of its voice. The interrogator is free, however, to ask any questions, no matter how devious or indirect, in an effort to uncover the computer’s identity. For example, the interrogator may ask both subjects to perform a rather involved arithmetic calculation, assuming that the computer will be more likely to get it correct than the human; to counter this strategy, the computer will need to know when it should fail to get a correct answer to such problems in order to seem like a human. To discover the human’s identity on the basis of emotional nature, the interrogator may ask both subjects to respond to a poem or work of art; this strategy will require that the computer have knowledge concerning the emotional makeup of human beings.

 

 

14 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

The important features of Turing’s test are:

1. It attempts to give an objective notion of intelligence, i.e., the behavior of a known intelligent being in response to a particular set of questions. This provides a standard for determining intelligence that avoids the inevitable debates over its “true” nature.

2. It prevents us from being sidetracked by such confusing and currently unanswerable questions as whether or not the computer uses the appropriate internal processes or whether or not the machine is actually conscious of its actions.

3. It eliminates any bias in favor of living organisms by forcing the interrogator to focus solely on the content of the answers to questions.

Because of these advantages, the Turing test provides a basis for many of the schemes actually used to evaluate modern AI programs. A program that has potentially achieved intelligence in some area of expertise may be evaluated by comparing its performance on a given set of problems to that of a human expert. This evaluation technique is just a variation of the Turing test: a group of humans are asked to blindly compare the performance of a computer and a human being on a particular set of problems. As we will see, this methodology has become an essential tool in both the development and verification of modern expert systems.

The Turing test, in spite of its intuitive appeal, is vulnerable to a number of justifiable criticisms. One of the most important of these is aimed at its bias toward purely symbolic problem-solving tasks. It does not test abilities requiring perceptual skill or manual dexterity, even though these are important components of human intelligence. Conversely, it is sometimes suggested that the Turing test needlessly constrains machine intelligence to fit a human mold. Perhaps machine intelligence is simply different from human intelli- gence and trying to evaluate it in human terms is a fundamental mistake. Do we really wish a machine would do mathematics as slowly and inaccurately as a human? Shouldn’t an intelligent machine capitalize on its own assets, such as a large, fast, reliable memory,

THE INTERROGATOR

Figure 1.1 The Turing test.

 

 

CHAPTER 1 / AI: HISTORY AND APPLICATIONS 15

rather than trying to emulate human cognition? In fact, a number of modern AI practitio- ners (e.g., Ford and Hayes 1995) see responding to the full challenge of Turing’s test as a mistake and a major distraction to the more important work at hand: developing general theories to explain the mechanisms of intelligence in humans and machines and applying those theories to the development of tools to solve specific, practical problems. Although we agree with the Ford and Hayes concerns in the large, we still see Turing’s test as an important component in the verification and validation of modern AI software.

Turing also addressed the very feasibility of constructing an intelligent program on a digital computer. By thinking in terms of a specific model of computation (an electronic discrete state computing machine), he made some well-founded conjectures concerning the storage capacity, program complexity, and basic design philosophy required for such a system. Finally, he addressed a number of moral, philosophical, and scientific objections to the possibility of constructing such a program in terms of an actual technology. The reader is referred to Turing’s article for a perceptive and still relevant summary of the debate over the possibility of intelligent machines.

Two of the objections cited by Turing are worth considering further. Lady Lovelace’s Objection, first stated by Ada Lovelace, argues that computers can only do as they are told and consequently cannot perform original (hence, intelligent) actions. This objection has become a reassuring if somewhat dubious part of contemporary technologi- cal folklore. Expert systems (Section 1.2.3 and Chapter 8), especially in the area of diag- nostic reasoning, have reached conclusions unanticipated by their designers. Indeed, a number of researchers feel that human creativity can be expressed in a computer program.

The other related objection, the Argument from Informality of Behavior, asserts the impossibility of creating a set of rules that will tell an individual exactly what to do under every possible set of circumstances. Certainly, the flexibility that enables a biological intelligence to respond to an almost infinite range of situations in a reasonable if not nec- essarily optimal fashion is a hallmark of intelligent behavior. While it is true that the con- trol structure used in most traditional computer programs does not demonstrate great flexibility or originality, it is not true that all programs must be written in this fashion. Indeed, much of the work in AI over the past 25 years has been to develop programming languages and models such as production systems, object-based systems, neural network representations, and others discussed in this book that attempt to overcome this deficiency.

Many modern AI programs consist of a collection of modular components, or rules of behavior, that do not execute in a rigid order but rather are invoked as needed in response to the structure of a particular problem instance. Pattern matchers allow general rules to apply over a range of instances. These systems have an extreme flexibility that enables rel- atively small programs to exhibit a vast range of possible behaviors in response to differ- ing problems and situations.

Whether these systems can ultimately be made to exhibit the flexibility shown by a living organism is still the subject of much debate. Nobel laureate Herbert Simon has argued that much of the originality and variability of behavior shown by living creatures is due to the richness of their environment rather than the complexity of their own internal programs. In The Sciences of the Artificial, Simon (1981) describes an ant progressing circuitously along an uneven and cluttered stretch of ground. Although the ant’s path seems quite complex, Simon argues that the ant’s goal is very simple: to return to its

 

 

16 PART I / ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE

colony as quickly as possible. The twists and turns in its path are caused by the obstacles it encounters on its way. Simon concludes that

An ant, viewed as a behaving system, is quite simple. The apparent complexity of its behavior over time is largely a reflection of the complexity of the environment in which it finds itself.

This idea, if ultimately proved to apply to organisms of higher intelligence as well as to such simple creatures as insects, constitutes a powerful argument that such systems are relatively simple and, consequently, comprehensible. It is interesting to note that if one applies this idea to humans, it becomes a strong argument for the importance of culture in the forming of intelligence. Rather than growing in the dark like mushrooms, intelligence seems to depend on an interaction with a suitably rich environment. Culture is just as important in creating humans as human beings are in creating culture. Rather than deni- grating our intellects, this idea emphasizes the miraculous richness and coherence of the cultures that have formed out of the lives of separate human beings. In fact, the idea that intelligence emerges from the interactions of individual elements of a society is one of the insights supporting the approach to AI technology presented in the next section.

1.1.5 Biological and Social Models of Intelligence: Agents Theories

So far, we have approached the problem of building intelligent machines from the view- point of mathematics, with the implicit belief of logical reasoning as paradigmatic of intel- ligence itself, as well as with a commitment to “objective” foundations for logical reasoning. This way of looking at knowledge, language, and thought reflects the rational- ist tradition of western philosophy, as it evolved through Plato, Galileo, Descartes, Leib- niz, and many of the other philosophers discussed earlier in this chapter. It also reflects the underlying assumptions of the Turing test, particularly its emphasis on symbolic reasoning as a test of intelligence, and the belief that a straightforward comparison with human behavior was adequate to confirming machine intelligence.

The reliance on logic as a way of representing knowledge and on logical inference as the primary mechanism for intelligent reasoning are so dominant in Western philosophy that their “truth” often seems obvious and unassailable. It is no surprise, then, that approaches based on these assumptions have dominated the science of artificial intelligence from its inception almost through to the present day.

The latter half of the twentieth century has, however, seen numerous challenges to rationalist philosophy. Various forms of philosophical relativism question the objective basis of language, science, society, and thought itself. Ludwig Wittgenstein’s later philosophy (Wittgenstein 1953), has forced us to reconsider the basis on meaning in both natural and formal languages. The work of Godel (Nagel and Newman 1958) and Turing has cast doubt on the very foundations of mathematics itself. Post-modern thought has changed our understanding of meaning and value in the arts and society. Artificial intelli- gence has not been immune to these criticisms; indeed, the difficulties that AI has encoun- tered in achieving its goals are often taken as evidence of the failure of the rationalist viewpoint (Winograd and Flores 1986, Lakoff and Johnson 1999, Dennett 2005).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Scrty Strgy & Plcy Exam

· Question 1

2 out of 2 points

   
  One of the processes designed to eradicate maximum possible security risks is to ________________, which limits access credentials to the minimum required to conduct any activity and ensures that access is authenticated to particular individuals.      
 
Selected Answer: Correct

harden

Correct Answer: Correct

harden

 

     

· Question 2

0 out of 2 points

   
  One of seven domains of a typical IT infrastructure is the user domain. Within that domain is a range of user types, and each type has specific and distinct access needs. Which of the following types of users has the responsibility of creating and putting into place a security program within an organization?      
 
Selected Answer: Incorrect

systems administrators

Correct Answer: Correct

security personnel

 

     

· Question 3

2 out of 2 points

   
  Which of the following user types is responsible for audit coordination and response, physical security and building operations, and disaster recovery and contingency planning?      
 
Selected Answer: Correct

security personnel

Correct Answer: Correct

security personnel

 

     

· Question 4

0 out of 2 points

   
  Imagine a scenario in which an employee regularly shirks the organization’s established security policies in favor of convenience. What does this employee’s continued violation suggest about the culture of risk management in the organization?      
 
Selected Answer: Incorrect

that the employee requires further training to gain a deeper knowledge of the policies

Correct Answer: Correct

that the organization lacks a good risk culture wherein employees have “buy in”

 

     

· Question 5

0 out of 2 points

   
  Which of the following user groups has both the business needs of being able to access the systems, network, and application to complete contracted services, and access capability that is limited to particular sections of the systems, network, and application?      
 
Selected Answer: Incorrect

guests and general public

Correct Answer: Correct

vendors

 

     

· Question 6

2 out of 2 points

   
  Security policies that clarify and explain how rights are assigned and approved among employees can ensure that people have only the access needed for their jobs. Which of the following is not accomplished when prior access is removed?      
 
Selected Answer: Correct

minimizes future instances of human error

Correct Answer: Correct

minimizes future instances of human error

 

     

· Question 7

0 out of 2 points

   
  Aside from human user types, there are two other non-human user groups. Known as account types, ________________ are accounts implemented by the system for the purpose of supporting automated service, and ___________________ are accounts that remain non-human until individuals are assigned access and can use them to recover a system following a major outage.      
 
Selected Answer: Incorrect

control partners, system accounts

Correct Answer: Correct

system accounts, contingent IDs

 

     

· Question 8

2 out of 2 points

   
  Which of the following is the most important reason why data needs to be both retrievable and properly stored?      
 
Selected Answer: Correct

Companies need to maintain data or the purpose of keeping an audit trail.

Correct Answer: Correct

Companies need to maintain data or the purpose of keeping an audit trail.

 

     

· Question 9

0 out of 2 points

   
  There are many different types of automated controls that are configured into devices for the purpose of enforcing a security policy. Which of the following is not an automated control?      
 
Selected Answer: Incorrect

network segmentation

Correct Answer: Correct

log reviews

 

     

· Question 10

0 out of 2 points

   
  One of the different manual controls necessary for managing risk is ________________, which is a type of formal management verification. In the process, management confirms that a condition is present and that security controls and policies are in place.      
 
Selected Answer: Incorrect

background checks

Correct Answer: Correct

attestation

 

     

· Question 11

2 out of 2 points

   
  The information security organization performs a significant role in the implementation of solutions that mitigate risk and control solutions. Because the security organization institutes the procedures and policies to be executed, they occupy role of ____________________.      
 
Selected Answer: Correct

subject matter expert (SME)

Correct Answer: Correct

subject matter expert (SME)

 

     

· Question 12

0 out of 2 points

   
  ___________________ are responsible for the monitoring of activities the pre, middle, and post stages of goal implementation, whereas __________________are responsible for the monitoring of activities following the implementation and are called upon to evaluate whether or not the goals have been achieved.      
 
Selected Answer: Incorrect

Project committees, management committees

Correct Answer: Correct

Management committees, government committees

 

     

· Question 13

2 out of 2 points

   
  The executive management has the responsibility of connecting many lines of business to bring resolution to strategy business issues. However, their ultimate responsibility is to ___________________________.      
 
Selected Answer: Correct

enforce policies at the executive and enterprise levels

Correct Answer: Correct

enforce policies at the executive and enterprise levels

 

     

· Question 14

0 out of 2 points

   
  There are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a ____________, which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker.      
 
Selected Answer: Incorrect

threat vector

Correct Answer: Correct

honeypot

 

     

· Question 15

0 out of 2 points

   
  A ______________________ is an apparatus for risk management that enables the organization to comprehend its risks and how those risks might impact the business.      
 
Selected Answer: Incorrect

risk mitigation assess self-assessment (RMASA)

Correct Answer: Correct

risk and control self-assessment (RCSA)

 

     

· Question 16

0 out of 2 points

   
  If an organization is creating a customized data classification scheme, it is important to keep in mind the accepted guidelines. Which of the following is not one these guidelines?      
 
Selected Answer: Incorrect

Connect the classification to particular handling requirements.

Correct Answer: Correct

Make recommendations for how audits can be conducted.

 

     

· Question 17

2 out of 2 points

   
  Of the risk management strategies, _________________ refers to the act of not engaging in actions that lead to risk, whereas ____________________refers to acquiescence in regard to the risks of particular actions as well as their potential results .      
 
Selected Answer: Correct

risk avoidance, risk acceptance

Correct Answer: Correct

risk avoidance, risk acceptance

 

     

· Question 18

0 out of 2 points

   
  Despite the fact that there exists no mandatory scheme of data classification for private industry, there are four classifications used most frequently. Which of the following is not one of the four?      
 
Selected Answer: Incorrect

internal

Correct Answer: Correct

moderately sensitive

 

     

· Question 19

2 out of 2 points

   
  When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements.      
 
Selected Answer: Correct

access

Correct Answer: Correct

access

 

     

· Question 20

0 out of 2 points

   
  The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term ______________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network.      
 
Selected Answer: Incorrect

data in transit, data on record

Correct Answer: Correct

data at rest, data in transit

 

     

· Question 21

0 out of 2 points

   
  Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?      
 
Selected Answer: Incorrect

The company effectively implemented quality control.

Correct Answer: Correct

The company effectively implemented patch management.

 

     

· Question 22

0 out of 2 points

   
  ___________________ is a term that denotes a user’s capability to authenticate once to access the network and then have automatic authentication on different applications and devices afterward.      
 
Selected Answer: Incorrect

Access control

Correct Answer: Correct

Single sign-on

 

     

· Question 23

2 out of 2 points

   
  The ______________________ denotes the application software and technology that concerns a wide range of topics from the data management to the systems that process information.      
 
Selected Answer: Correct

system/application domain

Correct Answer: Correct

system/application domain

 

     

· Question 24

0 out of 2 points

   
  Domain security control requirements are embodied in several different types of documents. One such document is known as _______________________, which uses a hierarchical organizing structure to identify the key terms and their explanations.      
 
Selected Answer: Incorrect

a guidelines document

Correct Answer: Correct

a dictionary

 

     

· Question 25

0 out of 2 points

   
  A procure document should accompany every baseline document. Which of the following is a true statement about the circumstances for when a procedure document needs to be created to support the baseline document?      
 
Selected Answer: Incorrect

Every device configuration requires a specific procedure, so there needs to be a related procedure document.

Correct Answer: Correct

Because many configuration processes reuse the same procedure, there does not need to be a new procedure document for every configuration.

 

     

· Question 26

2 out of 2 points

   
  An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. Which of the following is not an example of a layer of security?      
 
Selected Answer: Correct

a control standard

Correct Answer: Correct

a control standard

 

     

· Question 27

2 out of 2 points

   
  Baseline LAN standards are concerned with network traffic monitoring because no matter how good firewalls and routers can be, they are still not 100% effective. Thus, _________________ offer a wide range of protection because they seek out patterns of attack.      
 
Selected Answer: Correct

intrusion systems

Correct Answer: Correct

intrusion systems

 

     

· Question 28

0 out of 2 points

   
  In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ____________________ explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the ______________________ identifies which controls are vital for use of Web services provided by suppliers and external partnerships.      
 
Selected Answer: Incorrect

WAN router security standard, Domain Name System

Correct Answer: Correct

WAN router security standard, Web services standard

 

     

· Question 29

0 out of 2 points

   
  Which of the following control standards in the system/application domain maintains control of both managing errors and ensuring against potentially damaging code?      
 
Selected Answer: Incorrect

authentication

Correct Answer: Correct

developer-related standards

 

     

· Question 30

0 out of 2 points

   
  In order to form an IRT, an organization is required to create a charter; this document identifies the authority, mission, and goals of a committee or team, and there are a number of different types of IRT models for doing this. Which of the following models permits an IRT to have the complete authority to ensure a breach is contained?      
 
Selected Answer: Incorrect

IRT that acts in a coordination role

Correct Answer: Correct

IRT that provides on-site response

 

     

· Question 31

0 out of 2 points

   
  An organization’s _______________________ is a particular group of differently skilled individuals who are responsible for attending to serious security situations.      
 
Selected Answer: Incorrect

disaster recovery plan team (DRPT)

Correct Answer: Correct

incident response team (IRT)

 

     

· Question 32

2 out of 2 points

   
  There are particular tools and techniques that the IRT utilizes to gather forensic evidence, including ____________________, which articulates the manner used to document and protect evidence.      
 
Selected Answer: Correct

chain of custody

Correct Answer: Correct

chain of custody

 

     

· Question 33

2 out of 2 points

   
  While the amount of data known as mission-critical depends on the organization and industry, such data should only represent less than ____________ percent of the data population.      
 
Selected Answer: Correct

15

Correct Answer: Correct

15

 

     

· Question 34

0 out of 2 points

   
  In general, the IRT is comprised of a team with individuals that have different specialties; one such individual is the ___________________, who offers analytical skills and risk management. This specialist has focused forensic skills necessary for the collection and analysis of evidence.      
 
Selected Answer: Incorrect

information technology subject matter experts

Correct Answer: Correct

information security representative

 

     

· Question 35

2 out of 2 points

   
  To measure the effectiveness of the IRT, which of the following does not need to be evaluated?      
 
Selected Answer: Correct

the tests provided to employees to ensure their response to incidents

Correct Answer: Correct

the tests provided to employees to ensure their response to incidents

 

     

· Question 36

2 out of 2 points

   
  ___________________ are attacks that obtain access by means of remote services, such as vendor networks, employee remote access tools, and point-of sale (POS) devices.      
 
Selected Answer: Correct

Insecure remote access

Correct Answer: Correct

Insecure remote access

 

     

· Question 37

0 out of 2 points

   
  In order to build security policy implementation awareness across the organization, there should be ____________________ who partner with other team and departments to promote IT security through different communication channels.      
 
Selected Answer: Incorrect

several IT department specialists

Correct Answer: Correct

multiple executive supporters

 

     

· Question 38

2 out of 2 points

   
  The department responsible for providing security training to new employees is the _______________.      
 
Selected Answer: Correct

HR

Correct Answer: Correct

HR

 

     

· Question 39

0 out of 2 points

   
  A major defense corporation rolls out a campaign to manage persistent threats to its infrastructure. The corporation decides to institute a ___________________ to identify and evaluate the knowledge gaps that can be addressed through additional training for all employees, even administrators and management.      
 
Selected Answer: Incorrect [None Given]
Correct Answer: Correct

needs assessment

 

     

· Question 40

2 out of 2 points

   
  Training that happens in a classroom has many benefits, but which of the following is the one of the most significant drawbacks concerning the instructors’ abilities?      
 
Selected Answer: Correct

Instructors with sufficient expertise are difficult to find.

Correct Answer: Correct

Instructors with sufficient expertise are difficult to find.

 

     

· Question 41

2 out of 2 points

   
  While there are many ways that policy objectives and goals can be described, some techniques are more effective than others for persuading an organization to implement them. Which of the following is not one of the effective techniques for persuading people to follow policy objectives and goals?      
 
Selected Answer: Correct

explaining the careful process of design and approval that went into creating the polices

Correct Answer: Correct

explaining the careful process of design and approval that went into creating the polices

 

     

· Question 42

2 out of 2 points

   
  The goal of employee awareness and training is to ensure that individuals are equipped with the tools necessary for the implementation of security policies. Which of the following is one of the other benefits of a successfully enacted training and awareness program?      
 
Selected Answer: Correct

instituting chances for employees to gather new skills, which can foster enhanced job satisfaction

Correct Answer: Correct

instituting chances for employees to gather new skills, which can foster enhanced job satisfaction

 

     

· Question 43

2 out of 2 points

   
  A ________________ is a technological term used in security policy to describe a future state in which specific goals and objectives have been achieved and which processes, resources, and tools are needed to achieve those goals and objectives.      
 
Selected Answer: Correct

target state

Correct Answer: Correct

target state

 

     

· Question 44

0 out of 2 points

   
  Microsoft domains offer _______________ in order to enhance security for certain departments or users in an organization. This method allows security gaps to close and security settings to be increased for some computers or users.      
 
Selected Answer: Incorrect

configuration management policies

Correct Answer: Correct

group policy

 

     

· Question 45

0 out of 2 points

   
  In order to assess policy compliance, many organizations will use a report card. The evaluation tools are comprised of criteria based on an organization’s requirements. Which of the following is not one the elements that would be included on a report card?      
 
Selected Answer: Incorrect

security settings

Correct Answer: Correct

number of random audits performed

 

     

· Question 46

2 out of 2 points

   
  The window of ________________ is the time between when an opportunity for risk is identified and when the risk is ultimately eliminated by a patch.      
 
Selected Answer: Correct

vulnerability

Correct Answer: Correct

vulnerability

 

     

· Question 47

0 out of 2 points

   
  There are a number of automated tools created by Microsoft that can be used to verify compliance. Once such tool is the ____________________, which is a free download that locates system vulnerabilities by sending queries. This tool can scan multiple systems in a network and maintain a history of reports for all prior scans.      
 
Selected Answer: Incorrect

Nessus

Correct Answer: Correct

Microsoft Baseline Security Analyzer (MBSA)

 

     

· Question 48

0 out of 2 points

   
  There are several different best practices available for implementation when creating a plan for IT security policy compliance monitoring. One such practice is to design a baseline derived from the security policy, which entails _________________.      
 
Selected Answer: Incorrect

using a security policy document as a blueprint

Correct Answer: Correct

using images when feasible in the implementation of new operating systems

 

     

· Question 49

2 out of 2 points

   
  A __________________________ is a term that refers to the original image that is duplicated for deployment. Using this image saves times by eradicating the need for repeated changes to configuration and tweaks to performance.      
 
Selected Answer: Correct

gold master

Correct Answer: Correct

gold master

 

     

· Question 50

0 out of 2 points

   
  In order to ensure compliance, organizations deploy both new and current technologies. Which of the following is not one these new technologies?      
 
Selected Answer: Incorrect

COSO Internal Compliance Framework

Correct Answer: Correct

Common Platform Enumeration (CPE)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

ENGR 325

FALL 2015

 

 

 

1. (5) What is 5ED4 – 07A4 when these values represent unsigned 16-bit hexadecimal numbers? The

 

result should be written in hexadecimal. Show your work. (P&H 3.1, §3.2)

 

 

 

2. (5) What is 5ED4 – 07A4 when these values represent signed 16-bit hexadecimal numbers stored in

 

sign-magnitude format? The result should be written in hexadecimal. Show your work. (P&H 3.2,

 

§3.2)

 

 

 

3. (5) What is 4365 – 3412 when these values represent unsigned 12-bit octal numbers? The result

 

should be written in octal. Show your work. (P&H 3.4, §3.2)

 

 

 

4. (5) What is 4365 – 3412 when these values represent signed 12-bit octal numbers stored in signmagnitude format? The result should be written in octal. Show your work. (P&H 3.5, §3.2)

 

 

 

5. (5) Assume 185 and 122 are unsigned 8-bit decimal integers. Calculate 185 – 122. Is there

 

overflow, underflow, or neither? (P&H 3.6, §3.2)

 

 

 

6. (5) Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format.

 

Calculate 185 + 122. Is there overflow, underflow, or neither? (P&H 3.7, §3.2)

 

 

 

7. (5) Assume 185 and 122 are signed 8-bit decimal integers stored in sign-magnitude format.

 

Calculate 185 – 122. Is there overflow, underflow, or neither?

 

 

 

8. (5) Assume 151 and 214 are signed 8-bit decimal integers stored in two’s complement format. Calculate 151 + 214 using saturating arithmetic. The result should be written in decimal. Show work

 

 

 

9. (5) Assume 151 and 214 are signed 8-bit decimal integers stored in two’s-complement format.

 

Calculate 151 – 214 using saturating arithmetic. The result should be written in decimal. Show

 

your work. (P&H 3.10, §3.2)

 

 

 

10. (5) Assume 151 and 214 are unsigned 8-bit integers. Calculate 151 + 214 using saturating

 

arithmetic. The result should be written in decimal. Show your work. (P&H 3.11, §3.2)

 

 

 

 

 

11. (5) As discussed in the text, one possible performance enhancement is to do a shift and add instead

 

of an actual multiplication. Since 9 x 6, for example, can be written (2 x 2 x 2 + 1) x 6, we

 

can calculate 9 x 6 by shifting 6 to the left three times and then adding 6 to that result. Show the

 

best way to calculate 0x33 x 0x55 using shifts and adds/subtracts. Assume both inputs are 8-bit

 

unsigned integers. (P&H 3.17, §3.3)

 

 

 

12. (5) What decimal number does the bit pattern 0x0C000000 represent if it is a two’s complement

 

integer? An unsigned integer? (P&H 3.20, §3.5)

 

 

 

13. (5) If the bit pattern 0x0C000000 is placed in the Instruction Register, what MIPS instruction will be

 

executed? (P&H 3.21, §3.5)

 

 

 

14. (5) What decimal number does the bit pattern 0x0C000000 represent if it is a floating point

 

number? Use the IEEE 754 standard. (P&H 3.22, §3.5)

 

 

 

15. (5) Write down the binary representation of the decimal number 63.25 assuming the IEEE 754 single

 

precision format. (P&H 3.23, §3.5)

 

 

 

16. Write down the binary representation of the decimal number 63.25 assuming the IEEE 754 double

 

precision format. (P & H 3.24, 3.5)

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Assignment For Data Mining

APA format with 2 space.

Attached text book also

Introduction <Most>

Questions–

1. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means? (Chapter 8)

2. Compare the membership weights and probabilities of Figures 8.1 (626 page) and 8.4 (635 page), which come, respectively, from applying fuzzy and EM clustering to the same set of data points. What differences do you detect, and how might you explain these differences? (Chapter 8)

3. Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases. (Chapter 9)

Conclusion <Most>

References <minimum 5 >

Note FYI

Chapter#8

Question 1- you can get it from Page No# 704

Question 2- You can get it from page No# 704

Chapter#9

Question 3- You can get it from page No#757

 

I

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Risk Assessment Matrix For The Purchase And Integration Of Six New Web Servers For A Start Up Internet Firm

I need someone to create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm.

 

The assignment must be in APA format with no words that end in “ed”, everything must be in future or present tense. Work must be 100% original and will be checked for plagiarism before the final payment is made.

 

The attached Risk Assessment Matrix (fig. 3.2) must be used as the format for this assignment. Matrix must capture of all the risk associated with the purchase and integration of six new web servers. Assignment must have at least 3 references. Use fig. 35.1 as example of  background information that must be considered when creating risk assessment matrix

 

Assignment:

 

Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Encase Lab

Advanced Computer Forensics

Windows EnCase Forensics Lab

Due date: Please submit your work to Windows EnCase Lab dropbox by July 2nd, 2013.

Lab Setup for using RLES vCloud

This lab is designed to function on the RLES vCloud. The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT . If you did the Linux forensics lab on RLES vCloud, you should have created a vApp with the Linux VMware image. If you did not use the RLES vCloud for your first lab, please follow the instruction described in the Linux Forensics Lab to create a vApp. Now, you will add the vApp template, Windows 7 w/FTK 7 EnCase image, from the Public Catalogs to the same vApp following the instruction of Add Virtual Machines to a vApp (Page 8 in RLES vCloud User Guide) with the following setting:

· Set network to be Net_Network

· Select DHCP to create an IP address (when you use DHCP, fencing option is NOT necessary.)

Note: If you get an error when trying to start a vApp (or a VM within a vApp), try these steps:

1. Open up your vApp and click on the Virtual Machines tab.  Right-click your VM and choose “Properties”.

2. Click on the Hardware tab.  At the bottom of the page, click on the MAC address and choose “Reset”.

3. Click OK.  When it asks if you want to enable guest customization, click No.

4. Give it a minute to update your VM, then try starting it.

Power on the Windows Virtual machine and login to the system with:

Username: Student

Password: student

EnCase 7 is installed on the virtual machine. When you start the EnCase application, you should see “EnCase Forensic (not Acquisition)” on the top of the application.

EnCase 7 Tutorial

· The EnCase Forensics V7 User Guide posted in myCourses under Hands-on Labs.

· EnCase 7 Essentials webinar series at http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx

The following image files will be used for this lab and they are located in the local drive E:\

1) WinLabRaw.img – Raw Image from dd

2) WinLabEnCase.E01 — EnCase evidence file

Note: “WinLabEnCase Image” in this documentation = “Lab5 image” in your EnCase image.

PART I: Familiar with EnCase

Exercise 1: Starting a New Case

Launch EnCase for Windows – make sure that you are in the EnCase forensics mode (on the top of the software, you should see EnCase Forensic Training, NOT acquisition mode.)

Click the “New Case” button under CASE FILE to begin a new case.

Use the #1 Basic Template and name the case “Case 1”

Record the defaults that EnCase gives you for its folders. It is safe to use these defaults in our experiments.

Add a Raw Image to the exist case

You can add a raw disk image, for example, the dd image, to your case.

Click EVIDENCE > Add Evidence, then click Add Raw Image

Enter “WinLabRaw Image” in the “Name” field.

Under “Image Type” choose “Disk” and click “OK”.

Under Component Files, click New, locate and select the “WinLabRaw.img” file from E:\

The image will now be added to your case. Double click on the hyperlink of WinLbRaw Image, you will be able to view the files and folders from the image.

Question 1: What is the file system of this raw Image?

(Hint: 1. Check “report” from the bottom pane OR

2. choose “Disk View…” from the top drop-down disk manual, image1.png

then click the first sector (in red), the volume boot, image2.png

and read the text in the bottom pane.)

Question 2: What is the first character (in Hex) of the filename of a deleted file (check week 6 lecture recording)?

Add the EnCase Image, WinLabEnCase.E01 located at E:\, to the exist case via EnCase’s “Add Evidence” from the top menu, choose Add Evidence File…

Question 3: What type of files can be added using EnCase’s “Add Evidence Files”

Now you have two evidences added into the case. You can view either one by selecting View->Evidence from the top View menu.

Exercise 2: Using Encase

Set the Time Zone

EnCase v7 will utilize the time zone setting of your examiner workstation if no time zone is set for the evidence.

When you acquire a computer as evidence it is important to make note of the computer’s time and time zone, especially if you need to correlate evidence from different time zones (never assume the time or time zone on a computer is correct.)

Question 4: Where does the Time Zone information reside in a Windows system? (Hint: See EnCase 7 User guide, page 122 or watch Processing Evidence Part 1 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx).

Before starting the evidence analysis, you should verify that time zone settings for the evidence are configured properly and modify the time zone setting if necessary.

In our case, since we did not include the complete Windows’ image, let’s assume the computer’s time zone is North American Eastern Time Zone time zone. Verify the time zone setting by opening the WinLabEnCase image and selecting “Device -> Modify Time Zone Settings”.

image3.png

Question 5: How do you modify Time Zone Settings, show a screen shot below.

Now that you have the evidence added and the time zone set, you can analyze the evidence.

Timeline View

The Timeline view gives you a graphical overview of file creation, modification and access times and dates in a calendar view. It allows you to look for patterns.

Green Select the WinLabEnCase Image and click on the Timeline tab in the Views pane.

The timeline view can be zoomed from a yearly view to a minute-by-minute view using Higher Resolution button and Lower Resolution button.

The colored dots represent activity on a particular file. The legend for the colors can be found by clicking “Options” button from the top menu.

Question 6: Why is Timeline View useful for your investigation?

Gallery View

The Gallery view allows you to quickly see all the pictures in the case. Now let’s switch to the WinLabRaw image by View -> Evidence then open the WinLabRaw Image. Green select “WinLab Raw image”, in the Views pane, select the Gallery tab.

You will now see all of the pictures contained in the WinLabRaw Image. The Gallery view displays graphics files based on file extension.

Question 7: In the Raw Image, how many pictures are shown in Gallery View?

Process the Evidence (watch Processing Evidence Part 2 from http://www.encaseondemand.com/EnCasev7Essentials/tabid/2617/index.aspx)

Select Process Evidence… from the Add Evidence menu. Click the Process check box for the evidences that you intend to run through the Evidence Processor. The Evidence Processor Task list is shown at the bottom pane. You have the freedom to enable the tasks to run. For example, you may want to run certain tasks in the beginning, such as file signature and hash analysis, then later add other options, such as parsing compound files. However, you have to run certain tasks at a particular time. For example, you must run Recover Folders in the initial processing step. Tasks you must run in a specific step are marked with a red flag icon.

Note: If a task name is listed in a blue font, click on its task name to configure it. If a task name is listed in a black font, no further configuration is necessary

Select the WinLabRaw Image, enable the top five tasks and run the evidence processor.

image4.png

Recover folders.

Recover Folders will recover all deleted folders.

Note: For this image, you may not see anything interesting.

Question 8: Read the EnCase manual to find out how Recover-Folders recover deleted folders for FAT and NTFS file systems respectively?

File Signature Analysis

A file type (JPEG, Word Document, MP3 file) can be determined by the file’s extension and by a header that precedes the data in the file. If a file’s extension has been changed, then the only way to determine its type is by looking at its header.

Encase has a list of known file extensions and headers that it uses to identify files.

From the “View” menu select “File Types” to see the list of file types.

Question 9: What information is listed for each file type?

Question 10: What can an investigator do if the header of a file is unknown in your current setting of the EnCase?

When EnCase finished the file signature analysis. Select the WinLabRaw Image and take a look at the “Signature Analysis” and “Signature” Columns in the “Table” view.

Question 11: What different terms you see in the Signature Analysis column?

Question 12: Do you find any signature mismatch? List them.

Examine the WinLabRaw image in the gallery view again.

Question 13: Are there any graphics files on the WinLabRaw image whose file extensions have been changed? List them.

Question 14: If a file’s extension has been changed to a non-graphics file type (such as changing jpg to txt), will it be displayed in the Gallery view? If not, what could you do to fix this?

Hash Analysis

A hash is a digital fingerprint of a file or collection of data. EnCase uses the MD5 (and/or SHA1) algorithm to create hash(s) or “digital fingerprint” of a file.

The Evidence Processor’s Hash Analysis that we have run earlier has created the MD5 and SHA-1 hash values for the Raw image.

Check the “WinLabRaw Image” evidence in the table view, and make sure that the hash columns are filled.

Question 15: What are the types of files that will not have a hash generated?

Question 16: What are the three most common uses for hashes analysis?

Compound Files

Compound files are files with multiple layers and/or metadata such as Outlook Express email folders (.dbx), registry files, or OLE files.

In EnCase 7, you have several ways to expand the compound files. You can run the EnCase Evidence Processor on the EnCase image, select Expand compound files to expand all achieves and registry files OR you can expand the individual compound file.

Here we will try the second method by only expanding the individual compound file. Let’s look at the NTUSER.DAT registry file from WinLabEncase image.

View -> Evidence and click on WinLabEncase image,

In the Table view locate the file “Documents and Settings\PSMITH\NTUSER.DAT” and expand the EnCase image to find the “Documents and Settings\PSMITH\NTUSER.DAT” file by right click the file and choose Entries -> View File Structures. (Note: other registry files exist in C:\windows\system32\config folder. They are not included in this image.)

image5.png

Double click on NTUSER.DAT

Question 17: Did anything happen? Do you find any important information? If so, what kind of information you got?

Searching for Email (See Email from the EnCase V7 Essential webinar)

EnCase can search various types of email artifacts including Outlook (2000/2003), Outlook Express, Exchange, Lotus Notes, AOL and Thunderbird’s MBOX.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and ONLY check Find Email (uncheck other tasks).

Double click on “Find Email” and check Search for Additional Lost or Deleted Items box for a search for deleted e-mails. Click OK to run the processor.

The processed e-mail will be found under the Records view.

image6.png

A list of processed e-mail archives will be displayed under the Email Folder. To open an e-mail archive, click on the hyperlink of the name of the archive

Question 18: What interesting information do you see from emails?

EnCase v7 also supports two forms of e-mail threading analysis, Conversations and Related messages.

Double click on Deleted Items.dbx. In the Records tab, from the Find related items menu, click Show related messages button.

image7.png

Question 19: Read EnCase Forenscis V7 User Guide (page 208), briefly describe what are these features.

Question 20: Under the Records view, you should also see Thumbnails under WinLabRaw Image, what are thumbnails? List three of them.

Searching for Internet Artifacts (Processed Evidence Results Part 2)

Internet history contains rich evidences. EnCase will collect Internet-related artifacts, such as browser histories and cached web pages. You also have the option to search unallocated space for the Internet

artifacts.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check Find internet artifacts. Double click the Find internet artifacts hyperlink and choose “search unallocated space for internet artifacts” and run the processor.

The processed internet artifacts will be found under the Records view. Select the Internet folder of Records and then click on the Internet hyperlink.

Question 21: What kind of information do you see in the record for Internet?

Question 22: How does “search unallocated space for internet artifacts” affect your search results in the record?

Searching in EnCase v7

There are three principal methods of searching through evidence in EnCase v7:

· Index searches – Evidence data is indexed prior to searching

· Raw searches – Searches based on non-indexed, raw data

· Tag searches – Searches based on user-defined tags

Generating an index can take time, however, the trade-off in time spent creating the index yields a greater payoff with near instantaneous search times.

Using EnCase indexing search (Viewing Index and Search Results Part 1)

Text indexing allows you to quickly query the transcript of entries. Creating an index builds a list of words from the contents of an evidence file that contain pointers to their occurrence in the file. Two steps are involved in using the index: Generating an index and Searching an Index.

Select Process Evidence… from the Add Evidence menu. Select the WinLabEnCase image from the Evidence Process, and check “Index Text And MetaData” and only set index slack and Unallocated, then click OK to run the processor.

To search an index, first open the search tab by clicking “View” -> Search, then click on Index button.

Type “search” in the index space and hit the run button (a green arrow at the same line of the Index button). The search result is shown in the table view. You can read the file by right-click on the tile and choose Go to file, then view the content at the low pane by choose text, Doc, Transcript or Picture depending on the file type.

Question 23: What are the results? List 2 files that contain the term “search” in their contents.

Searching for Keywords

This option runs a raw keyword search during the processing. You can either use Evidence Process Search for Keywords before analysis or the Raw Keyword search function outside the Evidence Processor during analysis. Let’s try the keyword search outside the Evidence Processor.

Click “View” -> “Evidence”, then click Raw Search All top-down menu and choose New Raw Search All…

image8.png

Use “New” to add a single keyword, “microsoft” (no quotes). Under Search Option, add the Unicode in addition to the default ANSI Latin-1

If you have multiple keywords to add at once, you can use “Add Keyword List” to add them.

Now use “Add Keyword List” to add in the following keywords:

computer

this

Again, under Search Option, add the Unicode in addition to the default ANSI Latin-1

Choose “Search entry slack” from the top checkboxes.

Questions 24: What are the other search options besides “Search entry slack”?

Click “Run…” under Raw Search All

When the search is done, to view the search results, let’s go to the View keywords hits (the yellow key symbol) sub-tab of Search tab. image9.png

In the keywords tree pane, we will see all the keywords we created. To see the result of any keyword, simply click on the keyword.

Question 25: What do you see from Search Hits? List two files from the search hits.

Bookmarks and Tags

Bookmarks allow you to mark folders, files, search results, or parts of a file for later reference and for inclusion in reports.

Bookmarking in Evidence View

Go to the “WinLabRaw Image” evidence, click on the “Gallery”, blue-check the additional images that you identified after “Signature Analysis”. Use the Bookmark drop-down menu to create bookmarks for the selected entry (or entries) by selecting Single item…. Or Selected items… (for multiple entries). Place the evidence bookmarks in the appropriate folder of your case report template or you can create a new folder.

image10.png

To view the bookmarking you created: “view” -> Bookmarks

Action 26: Include a screenshot of the bookmarks you created in the Bookmarks tab.

Tags

The EnCase v7 tagging feature allows you to mark evidence items from Records, Evidence, or Bookmarks for review. You can use the default tags created by EnCase or define your own tags. Tags tab can be found from the Records, Evidence, or Bookmark tabs,

Let’s create a tag and then tag the two files from your keyword search exercise using this tag.

Go to the evidence that contains these two suspicious files. Click “Tags” -> Manage tags…. , then create a tag named Suspicious Files, displayed as “Files” in Red color (right-click the Background Color and choose edit).

Select and blue check these two suspicious files, then use “Tags -> Tag selected items…” to tag them using the “Files” tag. The tag should be shown in the Table view of the “Tag” column.

Action 27: Show the tagged Files in the Table view.

Question 28: What is the “One-click tagging” feature (see EnCase User Guide, page 234)?

Action 29: Finally, go back Process Evidence… from the Add Evidence menu. Selected the WinlabEnCase image, expend Modules, and choose one function from Modules and include your results below.

PAGE

1

Advanced Computer Forensics – EnCase

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!