How are the attacks impacting the applications and the other way around?

Survey on Radio Frequency Identification Security and Attacks

Received a rejection of scientific paper and need to edit it according to the reviewers’ comments:

1.The paper presents a review of the uses of RFID in the healthcare sector. Since it is a review paper,expected to see more related references that guide the reader in understanding the current uses of RFID. Moreover,strongly recommend that the paper be reviewed for English editing and technical writing. Some sections, for example, have very long sentences. Figures are not referred to in the text. Also, were these figures made by the authors? as did not find any reference to them.

2.Find that the paper is not cohesive. Do not see any connections between the systematic review and the attacks. How are the attacks impacting the applications and the other way around?

3.The systematic review must be expanded. First, if it is systematic, it is necessary to describe how the review was conducted and the decisions that were made to select to papers. Also, it seems to me that there should be way more papers describing RFID applications than the ones described here. This is fine, but the authors should make this clear. First, rather than “systematic”,would call it “towards a systematic review”. Second,think it is interesting to provide an idea of how many papers (if any) are estimated to be excluded from this review. Third, the authors should identify the venues that are more interesting.

4. Regarding the attacks, their description is very shallow and do not understand exactly why these attacks are described. Think it is interesting to present the attacks and survey papers that aim to solve/mitigate them,but this is not in the current draft.

5. Survey paper – only 19 references.

This paper needs work to make it a true survey.

Must be expanded.

6. his paper is a survey of RFID(what is RFID and its applications in various domains) and RFID attacks. Survey is acceptable for conferences,but this survey is somewhat weak regarding the discussion on dealing with the attacks.

7. The figures that are supposed to illustrate how the attacks work, but none of the figures was referred to in the text of the paper. Figure 3 is actually a table, but no explanation about the columns and the 5 difference schemes.

8. No discussion on the approaches to prevent these attacks nor to solve problems caused by the attacks after they have occurred. The only place that mentioned attack prevention is a very simple sentence in the Conclusion (i.e. to use encryption) that is for general network security without mentioning anything specially for RFID security.

9. The paper presents a cursory survey on rfid security and possible attacks. There is no novel research contribution. The paper formatting is very strange and suggests little care from the authors’ side.

What are the credentials of the individuals who assembled the website or authored the information?Are the authors credentials pertinent to the content of his/her website?

What are the credentials of the individuals who assembled the website or authored the information?Are the authors credentials pertinent to the content of his/her website? For example if the individual is recommending dietary advice, is he or she a Registered Dietitian (RD)? Can you validate the Credenticals i.e school attendend, education… etc,
Has th e person been published in a peer-reviewed journal? Trying searching Medline, Pub-Med, LexisNexis or other databases by actor name to see if they can be found. This is particularly important if the author claims to have been published.

What is the substance of the information on the website? Does it tend to be consistent with current scientific research? (Give examples) Does the author provide scientific research to back up health claims, (explain what they provide) Do the author(s) make difficult-to-believe claims or voice conspiracy theories as to why their opinion is not taken seriously? (EX: “Drug companies don’t lf want you to know, because they will lose money”..) (Give examples) Are all of the statistics cited? References cited? Look for references to make sure they excist. If none present explain what is the majority of the information provided. Are they trying to sell you something? If products are being sold you should consider the information biased

Does the website look like a business or an individual effort. Explain how you made your conclusion. What kind of webserver? Commercial, non-profit, government, educational… explain how you made your conclusion. Try to find informaiton regarding to reputation of the organization. Search for the name of the organization using a search engine to see what types of results you get. Explain your finding and provided links sources Look for news stories about the organizations in online access to newspapers. Look for both positive stories (awards, grants etc) and for negative ones (lawsuits, federal indictments, etc.) Again explain, and provide link sources to the information found if you couldnt find explain how and what you searched!

Explain regulatory and ethical considerations in creating multimedia content for websites.

Write a paragraph about each of the following :

Explain evidence-based support for improving a site’s index value and rank through 1, SEO, 2, Website Design, 3, Blogging, 4, Title metadata, 5, Title metadata, 6, Keyword Metadata, 7, Website Links and 8, Alt Tags

Explain regulatory and ethical considerations in creating multimedia content for websites, include the following.

Disability Discrimination Act 1995 (DDA) and the related Special Educational Needs and Disability Act 2001 (SENDA)

Web Accessibility Initiative (WAI) from the World Wide Web Consortium (W3C)

How are you going to deliver this product?Is it a smartphone app or website?

Define what product you will build for your final project. In doing so, answer the following questions in as much detail as possible:

1. What is the goal of your product?

2. Who are you building this product for?

3. What specific problem is it going to solve for your users?

4. How are you going to deliver this product?Is it a smartphone app or website?

Feel free to further elaborate on the rationale for your product, but at the very least, these questions should be answered.
The assignment is due on Friday, October 1st by 6:00 pm. Be aware that this assignment will require peer review, as well as my review. In doing your peer review,offer helpful and constructive feedback to your “colleagues”, as the goal is to help others improve their final product.

As always, if you have any questions,do not hesitate to reach out,wish you all the best of luck on this assignment and look forward to your submissions.

Data Dashboard -create a data visualization dashboard by creating a pivot table for your pre-selected data

Overview: Excel dashboards are powerful, easy to design, and a great way to improve your Excel and data visualization skills. Because of its flexibility, you can virtually design any dashboard in Excel. To complete this assignment, you will create a data visualization dashboard by creating a pivot table for your pre-selected data. Review the steps and resources in the assignment to complete this assignment, including the resources for creating a pivot table.

Prompt: You have been asked by your manager to provide a brief report simulating a dashboard view. The report is to show the performance of small/short-term loans that were issued in the past five years. The report should consider information such as how many loans were issued by different categories and how much was issued, repaid, profited, etc. The brief report is to show the executive management audience performance using graphical representations of the data via charts and other visualization methods.

Does it mean your program should not access a memory location it is not supposed to access when executed?

Exception Handling in Python

Programs can handle runtime errors by using Python’s try/except mechanism, answer the following questions in your own words:

1. What does secure programming mean to you?

2. Does it mean that your program can handle all the inputs,including unexpected or unanticipated ones?

3. Does it mean that your program would sometimes terminate abruptly?

4. Does it mean your program should not access a memory location it is not supposed to access when executed?