EXERCISE 1For this project, you will write a report that details threat assessments for three different organizations. Submit this report as a PDF file on Canvas.OrganizationsColonial Pipeline....

1 answer below »
EXERCISE 1



For this project, you will write a report that details threat assessments for three different organizations. Submit this report as a PDF file on Canvas.








Organizations







  1. Colonial Pipeline. You should consider both their corporate network and their operational resources. Reading about the Colonial pipeline attack may help you in this exercise.Colonial Pipeline ransomware attack - WikipediaLinks to an external site.





    .



  2. Oak Ridge National Laboratories. Consider what they do and who their customers are.Oak Ridge National Laboratory - WikipediaLinks to an external site.





    .



  3. An organization of your choosing.










Report details




For each organization's threat assessment, you will need to detail the following information:







  • Who are the actors?



    • What are the organization's users? What are their tasks? What are their goals?



    • Who are the defenders? What are their goals?



    • Who are the adversaries? What are their goals









  • What are the organizational assets?



    • How are they protected?









  • What attacks will the adversaries use?



    • Use the STRIDE model. Be specific with how these attacks will impact the organization's assets, users, and/or defenders.









  • What is the risk for the five most relevant threats?






    • Use the DREAD model. Give justifications for your ratings.








































EXERCICE 2 FIND THE ATTACHED FILES








datalab.dvi COSC 466/566, Spring 2022 Data Project Due: Saturday, Feb. 12, 11:59PM EDT 1 Introduction The purpose of this assignment is to become more familiar with bit-level representations of integers and floating point numbers. You’ll do this by solving a series of programming “puzzles.” Many of these puzzles are quite artificial, but you’ll find yourself thinking much more about bits in working your way through them. 2 Logistics This is an individual project. All handins are electronic. Clarifications and corrections will be posted on the course Web page. 3 Handout Instructions Start by copying datalab-handout.tar to a (protected) directory on a Linux machine in which you plan to do your work. Then give the command unix> tar xvf datalab-handout.tar. This will cause a number of files to be unpacked in the directory. The only file you will be modifying and turning in is bits.c. The bits.c file contains a skeleton for each of the 17 programming puzzles. Your assignment is to complete each function skeleton using only straightline code for the integer puzzles (i.e., no loops or con- ditionals) and a limited number of C arithmetic and logical operators. Specifically, you are only allowed to use the following eight operators: ! ˜ & ˆ | + <>> 1 A few of the functions further restrict this list. Also, you are not allowed to use any constants longer than 8 bits. See the comments in bits.c for detailed rules and a discussion of the desired coding style. values, and it will decipher their bit structure. 4 Evaluation Your score will be computed out of a maximum of 76 points based on the following distribution: 41 Correctness points. 34 Performance points. 5 Style points. Correctness points. The 17 puzzles you must solve have been given a difficulty rating between 1 and 4, such that their weighted sum totals to 41. We will evaluate your functions using the btest program, which is described in the next section. You will get full credit for a puzzle if it passes all of the tests performed by btest, and no credit otherwise. Performance points. Our main concern at this point in the course is that you can get the right answer. However, we want to instill in you a sense of keeping things as short and simple as you can. Furthermore, some of the puzzles can be solved by brute force, but we want you to be more clever. Thus, for each function we’ve established a maximum number of operators that you are allowed to use for each function. This limit is very generous and is designed only to catch egregiously inefficient solutions. You will receive two points for each correct function that satisfies the operator limit. Style points. Finally, we’ve reserved 5 points for a subjective evaluation of the style of your solutions and your commenting. Your solutions should be as clean and straightforward as possible. Your comments should be informative, but they need not be extensive. Autograding your work We have included some autograding tools in the handout directory — btest, dlc, and driver.pl — to help you check the correctness of your work. • btest: This program checks the functional correctness of the functions in bits.c. To build and use it, type the following two commands: unix> make unix> ./btest Notice that you must rebuild btest each time you modify your bits.c file. You’ll find it helpful to work through the functions one at a time, testing each one as you go. You can use the -f flag to instruct btest to test only a single function: 2 unix> ./btest -f bitAnd You can feed it specific function arguments using the option flags -1, -2, and -3: unix> ./btest -f bitAnd -1 7 -2 0xf Check the file README for documentation on running the btest program. • dlc: This is a modified version of an ANSI C compiler from the MIT CILK group that you can use to check for compliance with the coding rules for each puzzle. The typical usage is: unix> ./dlc bits.c The program runs silently unless it detects a problem, such as an illegal operator, too many operators, or non-straightline code in the integer puzzles. Running with the -e switch: unix> ./dlc -e bits.c causes dlc to print counts of the number of operators used by each function. Type ./dlc -help for a list of command line options. • driver.pl: This is a driver program that uses btest and dlc to compute the correctness and performance points for your solution. It takes no arguments: unix> ./driver.pl Your instructors will use driver.pl to evaluate your solution. 5 Handin Instructions Submit bits.c solution file on canvas. 6 Advice • Don’t include the header file in your bits.c file, as it confuses dlc and results in some non-intuitive error messages. You will still be able to use printf in your bits.c file for debugging without including the header, although gcc will print a warning that you can ignore. • The dlc program enforces a stricter form of C declarations than is the case for C++ or that is enforced by gcc. In particular, any declaration must appear in a block (what you enclose in curly braces) before any statement that is not a declaration. For example, it will complain about the following code: 3 int foo(int x) { int a = x; a *= 3; /* Statement that is not a declaration */ int b = a; /* ERROR: Declaration not allowed here */ } 7 The “Beat the Prof” Contest For fun, we’re offering an optional “Beat the Prof” contest that allows you to compete with other students and the instructor to develop the most efficient puzzles. The goal is to solve each Data Lab puzzle using the fewest number of operators. Students who match or beat the instructor’s operator count for each puzzle are winners! To submit your entry to the contest, type: unix> ./driver.pl -u ‘‘Your Nickname’’ Nicknames are limited to 35 characters and can contain alphanumerics, apostrophes, commas, periods, dashes, underscores, and ampersands. You can submit as often as you like. Your most recent submission will appear on a real-time scoreboard, identified only by your nickname. You can view the scoreboard by pointing your browser at https://userlab.utk.edu/courses/cosc466/datalab 4
Answered 28 days AfterFeb 02, 2023

Answer To: EXERCISE 1For this project, you will write a report that details threat assessments for three...

Deepak answered on Feb 05 2023
35 Votes
If you have any doubt kindly ask in comments !!!!!!
Solution:
/*
* bitAnd - x&y using only ~ and |
* Example: bitAnd(6, 5) = 4
* Legal ops: ~ |
* Max ops: 8
* Rating: 1
*/
int bitAnd(int x, int y) {
return ~(~x|~y);
}
/*

* getByte - Extract byte n from word x
* Bytes numbered from 0 (LSB) to 3 (MSB)
* Examples: getByte(0x12345678,1) = 0x56
* Legal ops: ! ~ & ^ | + << >>
* Max ops: 6
* Rating: 2
*/

int getByte(int x, int n) {
return (x >> (n << 3)) & 0xff;
}
/*
* logicalShift - shift x to the right by n, using a logical shift
* Can assume that 0 <= n <= 31
* Examples: logicalShift(0x87654321,4) = 0x08765432
* Legal ops: ! ~ & ^ | + << >>
* Max ops: 20
* Rating: 3
*/

int logicalShift(int x, int n) {
int n_equals_zero = ~(!n + ~0);
int y = ((x >> 1) & ~(1 << 31)) >> (n + ~0);

return (n_equals_zero & x) | (~n_equals_zero & y);
}
/*
* bitCount - returns count of number of 1"s in word
* Examples: bitCount(5) = 2, bitCount(7) = 3
* Legal ops: ! ~ & ^ | + << >>
* Max ops: 40
* Rating: 4
*/

int bitCount(int x) {
int mask = 1 + (1 << 8) + (1 << 16) + (1 << 24);
int sums = ((x >> 0) & mask) +
((x >> 1) & mask) +
((x >> 2) & mask) +
((x >> 3) & mask) +
((x >> 4) & mask) +
((x >> 5) & mask) +
((x >> 6) & mask) +
((x >> 7) & mask);

return ((sums >> 0) & 0xff) +
((sums >> 8) & 0xff) +
((sums >> 16) & 0xff) +
((sums >> 24) & 0xff);
}
/*
* bang - Compute !x without using !
* Examples: bang(3) = 0, bang(0) = 1
* Legal ops: ~ & ^ | + << >>
* Max ops: 12
* Rating: 4
*/
int bang(int x) {
int minus_x = ~x + 1;
int x_msb = (x >> 31) & 1;
int minus_x_msb = (minus_x >> 31) & 1;
int x_is_not_zero = x_msb | minus_x_msb;

return ~x_is_not_zero & 1;
}
/*
* tmin - return minimum two"s complement integer
* Legal ops: ! ~ & ^ | + << >>
* Max ops: 4
* Rating: 1
*/
int tmin(void) {
return (1 << 31);
}
/*
* fitsBits - return 1 if x can be represented as an
* n-bit, two"s complement integer.
* 1 <= n <= 32
* Examples: fitsBits(5,3) = 0, fitsBits(-4,3) = 1
* Legal ops: ! ~ & ^ | + << >>
* Max ops: 15
* Rating: 2
*/
int fitsBits(int x, int n) {
int minus_1 = ~0;
int n_equals_32 = !(n ^ 32);
int x_equals_zero_or_minus_one;

x = x >> (n + minus_1);
x_equals_zero_or_minus_one = !((x + 1)^(!x));

return n_equals_32 |...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here