Module 6 Assignment Wendy E. Atkinson Saint Leo University Abstract This paper identifies several topics such as the type of protocols and cryptosystems used to complete online financial transactions, the development and implementation of Advanced Encryption Standard (AES), a fire control system in an automated server room, factors considered when converting general office space to a server room, and power systems in server rooms. Research indicates the use of secure hypertext transfer protocols and digital certificates for the use of online financial transactions. Additionally, AES provides:____. A fire control system requires_____. When converting general office space to a server room_____. Power options for server rooms __________. Chapter 8 Exercise 1 I chose to create an e-commerce transaction on the Victoria’s Secret web page. After adding an item to my cart, I proceeded to the payment section. I right clicked on the credit card and selected the …show more content…
“Properties” option. I discovered that the site uses a Hypertext Transfer Protocol with Privacy (HTTP) for completing e-commerce transactions. The connection type is TLS 1.2 AES with 256 bit encryptions (high); RSA with 2048-bit exchange. Upon clicking on the payment section, I also noticed a digital certificate listed in the address bar which reflects that the certificate was issued to Victoria’s Secret by COMODO RSA Extended Validation Secure Server CA. A secure Hypertext Transfer Protocol (S-HTTP) is an important element in the e-commerce world as it is a secure virtual connection that establishes authentication, data integrity, and confidentiality. The process involves a client and a web server with compatible cryptosystems. The S-HTTP client creates a session and sends a public key to the server. The server creates an encrypted session key which contains the client’s public key. This information is returned to the S-HTTP client. Once the client decrypts the session key both the client and the web server can send encrypted messages back and forth. This process allows for secure financial transactions by preventing others from being able to decode a message. A digital certificate also allows the secure exchange of information over the internet using public key infrastructure (PKI). It provides identifying information such as the certificate holder’s name, a serial number, expiration dates, the certificate holder’s public key, and the digital signature of the certificate-issuing authority (CA) (search security). Chapter 8 Exercise 4 The Advanced Encryption Standard (AES) is a computer security standard of cryptography that uses a cryptographic algorithm to protect electronic data. The development of AES began in January 1997 when the National Institute of Standards and Technology (NIST) announced their desire to adopt an AES standard. NIST required that an AES standard must “specify an unclassified publicly disclosed encryption algorithm(s), available royalty-free, worldwide” and “the algorithm must implement symmetric key cryptography as a block cipher and support block sizes of 128-bits and key sizes of 128-, 192-and 256-bits” (nist). Participants from all over the world submitted their algorithms to NIST. After three AES Candidate Conferences were held to narrow down the submissions, NIST finally announced the selection of the Rijndael algorithm to propose for the AES. The selection was then submitted to Federal Information Processing Standards (FIPS) for final approval. The process of implementation of the AES standard soon followed. In November 2001, FIPS released Publication 197 announcing the AES Standard. Implementation of the standard was outlined. Implementation was scheduled to start May 26, 2002. Per Publication 197, the application of this standard can be implemented in software, firmware, hardware, or a combination of those. It can depend on several factors such as the application, environment, technology uses. It should be used in conjunction with a FIPS approved NIST recommended mode of operation. Additionally, implementations required testing by an accredited laboratory in order to be considered in compliance with the AES Standard. Chapter 9 Exercise 1: Fire Control System in an Automated Server Room It is documented that fires “account for more property damage, personal injury, and death than any other threat to physical security” (Whitman, 2012).
Therefore, fire security and safety is vital to the physical environment of an automated server room. When implementing a fire control system in a server room, there are several key measures that must be considered. First, a fire suppression system must be considered. Specific devices would need to be installed to detect and response to fire, potential fire, or combustion danger (Whitman, pg. 480). These suppression systems work by eliminating environmental elements (temperature, oxygen, and fuel) that are needed for fire to burn. Therefore, the system should include a water mist system to reduce temperature, a CO2 system to remove oxygen and a soda acid system to prevent fuel to a fire. Secondly, a fire detection system must be implemented. Chapter 9 Exercise
2 Assume you have converted an area of general office space into a server room. Describe the factors you would consider for each of the following components: a. Walls and doors b. Access control c. Fire detection d. Fire suppression e. Heating, ventilating, and air conditioning f. Power quality and distribution Chapter 9 Exercise 3 Assume you have been asked to review the power needs of a stand-alone computer system that processes important but noncritical data. Although the system does not have to be online at all times, it stores valuable data that could be corrupted if the power system were suddenly interrupted. Which UPS features are most important to such a system? Which type of UPS do you recommend for it? Rouse, M. (n.d.). What is digital certificate? - Definition from WhatIs.com. Retrieved November 27, 2016, from http://searchsecurity.techtarget.com/definition/digital-certificate NIST. (2001, November 26). Federal Information Processing Standards Publication 197 (United States, Department of Commerce, National Institute of Standards and Technology). Retrieved November 26, 2016, from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf Overview of the AES Development Effort [Brochure]. (2001). Retrieved November 27, 2016, from http://csrc.nist.gov/archive/aes/index2.html Whitman, M. E., & Mattord, H. J. (2016). Principles of information security. Boston, MA: Cengage Learning.
At 2215 hrs, on November 28, 1942, Fire Alarm Headquarters from Box 1514, situated at Stuart and Carver streets, received an alarm. When the responding apparatus arrived they found a small car fire at the corner of Stuart Street and Broadway. After the fire was extinguished the firefighters were about to return to quarters when their attention was called to smoke emanating from the Cocoanut Grove Nightclub a few doors away. Upon their arrival at the entrance of the Broadway lounge on Broadway they encountered numerous people leaving the premises admidst the cries of “fire”. The chief in charge immediately ordered that a third alarm be sounded from Alarm Box 1521 which the alarm was received by fire alarm headquarters at 2223 hrs. A civilian sent an alarm that was received at 2220 by fire alarm headquarters. As soon as the chief in charge realized that the immediate problem was one of rescue he ordered that a fourth alarm (received at 2224) and a fifth alarm (received at 1102) be sent. The apparatus responding was comprised of 25 engine companies, 5 ladder companies, 1 water tower company, 1 rescue company and various other apparatus. 18 hose steams for cooling purposes and three ladders were utilized (located at Piedmont, Broadway, and Shawmut for venting operations).
Application Virtualization: Application virtualization conveys an application that is facilitated on a solitary machine to a substantial number of clients. The application can be arranged in the cloud on high-review virtual machines be that as it may, in light of the fact that a substantial number of clients get to it, its expenses are some common by those clients.
"NFPA 1710: Standard for the Organization and Deployment of Fire Suppression Operations, Emergency Medical Operations, and Special Operations to the Public by Career Fire Departments, 2010 Edition." National Fire Protection Association. N.p., 1 Jan. 2010. Web. .
There seems to be some confusion based on Mr. Cohn email, please allow me to clarify.
"NFPA 1710: Standard for the Organization and Deployment of Fire Suppression Operations, Emergency Medical Operations, and Special Operations to the Public by Career Fire Departments, 2010 Edition." National Fire Protection Association. N.p., 1 Jan. 2010. Web. 25 Mar. 2014. .
The stimulation we had to do for class focused on a piece of land in Cleveland OH that once belonged to a nuclear factory. This land consisted of 4 acres in the north-central section of Ward 12, and adjacent to ward 3. The allotment is positioned closely to many low-income segments of the South Broadway neighborhood. The goal was to come up with an idea on what should replace the decommissioned factory and create the biggest benefit for the community.
As a certified medical coder (CCA 11/2012), I have contributed to the HIMS department by helping code inpatient encounters from patients in the Residential Rehab Unit as well as outpatient encounters from the other clinics at this VA applying the official coding conventions outlined in the International Classification of Diseases 9th revision handbook as well as in the VHA’s Official Coding Guidelines, V11.0 dated August 10, 2011. Having coded many encounters over the past 3 years, I can easily determine the main condition after study that is chiefly responsible for a patient’s admission to the hospital. ICD-9-CM defines this as the primary diagnosis code and I find that it is most important to list this code first in your documentation
NMBW Staff (2005, July) Eclipse introduces new chemical fire-suppression system. Retrieved November 6, 2013 from http://www.bizjournals.com/albuquerque/stories/2005/07/25/daily10.html?jst=b ln hl
In 1973, one of the most influential reports to ever come out of the fire service was created. This report would change the fire service forever and still to this day have a great impact on the way things are done in the fire service. One of the most impacted sectors within the fire service is the way firefighters perceive and implement fire prevention strategies and techniques. This report was called “America Burning” and was published by the National Commission on Fire Prevention and Control. The report was sent directly to the president of the United States of America, who at the current time was Richard
The teacher will review with the whole class that living things must be able to move, grow, and reproduce and nonliving things cannot. She will then ask if any students still have questions and answer any questions they may have. The students will take a computerized multiplication test to assess their mastery (McCarty, Living nonliving assessment, 2015).
It's important to gather information that is understandable by your students. The procces of gathering evendce in childrens learning can make a huge difference. there are many different kinds of assesments that help you as a teacher better educate your students. your lessons plans and what you teacer is very important to what they understand and how they learn.
Thousands of fires occur on a yearly basis throughout the United States. Whether it is forest fires, house fires, or any other event that involves uncontrollable flames, the outcome will always be the same; high amounts of destruction and physical damage. When fire emergencies occur, responding to the incident may not be much of a complication as apposed to determining the source from where the fire started or what triggered its behavior, which is truly the challenge. In order to do so, a fire investigator has to be present at the scene of the fire after it has been eliminated. The investigator, after reviewing any possible marks or behavior trails, will conclude if the incident was indeed an accident or intentional, thus making it an act of arson. According to the U.S. Fire Administration Topical Fire Research Series, “Arson is the leading cause of fires (267,000 annually) in the United States” (usfa.fema.gov). Arson cases are very complex due to the fact that it can be committed virtually anywhere and by anyone, including fire responders as well. The motives behind arson incidents can also be a very complex issue because it may have been used as a cry for help or simply as a mode of cognitive escape. Gathered reports indicate that the main reasons for arsons committed by firefighter personnel are to be viewed as a heroic figure, an escape from personal stress, financial gain purposes, excitement, or even revenge against the fire company and others.
All chemicals storage areas will also be equipped with these latches. Power receptacles near a source of water will be Ground Fault Circuit Interruptible (GFCI), and electrical devices will never be connected to a receptacle when not in use, unless the device is permanent, and the power supply is not easily accessible. All rooms are equipped with a combination fire, carbon monoxide, and radon gas detection device, and are checked and serviced monthly. Multipurpose fire extinguishers are located under all sinks, and in the utility room for use in small class A, B, or C fires. In addition to fire extinguishers, first aid kits are also located in these locations. Emergency contact numbers for the emergency dispatch and poison control are located on the information board, which is located in the kitchen. The home is equipped with a home security system, which monitors all detection devices, windows, and doors. In the event that a persistent threat arises, such as prolonged civil unrest, major criminal or terroristic threat, or any situation that renders
“Frequently Asked Questions About Carbon Monoxide Detectors.” H. Brandon Guest and Hamel Volunteer Fire Department 1995. Online. Internet. 24 May 2001.
Creating the awareness among the students helps them on the various ways to avoid fires. If possible students are advised to ensure that all the fire alarms and extinguishers are in working conditions at all times. They should also be careful and alert when using any appliance that is likely to cause a fire and avoid using anything that is prohibited in the rooms.