Cyber Security

Description

Having Trouble Meeting Your Deadline?

Get your assignment on Cyber Security  completed on time. avoid delay and – ORDER NOW

The Python program assigned at this time is to open a file and find the location of the given search keyword. The file is accessed by the user given path expression, which is a fully qualified path expression. The file is converted to a list, which contains list elements. An element in the list is each such a line in the file.

For each line of the file in the line list, another list is generated. This word list contains words, the words in a given line.

For each word of the word list, the given search keyword is compared. If matched, where the word is found is displayed.

Note that print statements are somehow sophisticated to display the match states sensitively and intelligently. See the sample run of how the match states are displayed for several different match cases.

Write a Python code to handle all tasks described above.

Consider the sample file:

This is a sample file demonstrating how this can be read in a Python attack code.

This Python example shows you in many ways a local file can be loaded in your computer and further manipulated.

Hope this helps you guys understand a for loop and a way of dealing files.

A trio of internet giants revealed on Tuesday that they had fought off an unprecedented distributed denial-of-service (DDoS) attack — used to disrupt the availability of systems like websites and services — that registered as the biggest on record, by far.

Cloudflare, Google and Amazon Web Services (AWS) said the attack relied on a previously undisclosed vulnerability in a key piece of internet architecture.

And it was massive.

The DDoS events AWS detected were a type of HTTP/2 request flood, which occurs when a high volume of illegitimate web requests overwhelms a web server’s ability to respond to legitimate client requests, Tom Scholl, vice president and distinguished engineer at the company, and Mark Ryland, AWS’s director of the office of chief information security officer, wrote in a blog post.

Because the attack abuses an underlying weakness in the HTTP/2 protocol, we believe any vendor that has implemented HTTP/2 will be subject to the attack,” Cloudflare engineers Lucas Pardue and Julian Desgats wrote. “This included every modern web server.

The novel nature of the attack vulnerability allowed for some interesting attack numbers. Cloudflare said it was three and a half times bigger than its previous biggest attack on record, while Google said it was seven and half times larger attack than the previous attack record.

A sample run:

>>> (executing cell “” (line 107 of “hw4.py”))

Enter the fully qualified path expression to the file name: /Users/jyoon/Johns-Backup/Mercy/505foundaCSEC/inClass/f23/sample1.data

Enter the word to search: attack

======= Summary: ‘attack’ is found 9 times: =======

In line# 1, ‘attack’ is the 15th word in [This is a sample file demonstrating how this can be read in a Python attack code.]

In line# 4, ‘attack’ is the 19th word in [A trio of internet giants revealed on Tuesday that they had fought off an unprecedented distributed denial-of-service (DDoS) attack — used to disrupt the availability of systems like websites and services — that registered as the biggest on record, by far.]

In line# 5, ‘attack’ is the 10th word in [Cloudflare, Google and Amazon Web Services (AWS) said the attack relied on a previously undisclosed vulnerability in a key piece of internet architecture.]

In line# 8, ‘attack’ is the 3th word in [Because the attack abuses an underlying weakness in the HTTP/2 protocol, we believe any vendor that has implemented HTTP/2 will be subject to the attack,” Cloudflare engineers Lucas Pardue and Julian Desgats wrote. “This included every modern web server.]

In line# 9, ‘attack’ is the 6th and the 12th and the 28th and the 41th and the 45th word in [The novel nature of the attack vulnerability allowed for some interesting attack numbers. Cloudflare said it was three and a half times bigger than its previous biggest attack on record, while Google said it was seven and half times larger attack than the previous attack record.]

Submission:

python code; no data file is needed.

Explanation & Answer

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Similar Posts