3.14 LAB: Detecting Network Change (files and lists) Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex algorithmic detections added to software applications that manage this process. This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader() method. The file will contain a list of login_names, followed by login_time separated by commas. Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts Ex: If the input is: input1.csv and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts) bob, 2, paula, 1, nancy, 8, thomas, 23, zach, 22, charlotte, 4 the output is: Anomaly login attempts: nancy: 8 thomas: 23 zach:22 charlotte: 4 Ex: If the input is: input2.csv and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts) the output is: No anomaly login attempts Note: There is a newline at the end of the output, and input1.csv is available to download. 424226.2316138.qx3zqy7
Control structures
Control structures are block of statements that analyze the value of variables and determine the flow of execution based on those values. When a program is running, the CPU executes the code line by line. After sometime, the program reaches the point where it has to make a decision on whether it has to go to another part of the code or repeat execution of certain part of the code. These results affect the flow of the program's code and these are called control structures.
Switch Statement
The switch statement is a key feature that is used by the programmers a lot in the world of programming and coding, as well as in information technology in general. The switch statement is a selection control mechanism that allows the variable value to change the order of the individual statements in the software execution via search.
3.14 LAB: Detecting Network Change (files and lists)
Please help!
Please see pic attached.
Securing a network from attacks means a network administrator is watching traffic and user activity. Change detection (CD) is a method used to track changes in your network. CD can detect files accessed during off hours to more complex
This program is going to manage user login times and attempt to detect any change in a users typical login attempts. It will use an input file to store data and read the file using the csv.reader( ) method. The file will contain a list of login_names, followed by login_time separated by commas.
Write a program that first reads in the name of an input file, reads the information stored in that file and determines if the user login has occurred at off hour times. The company employees work from 9 am to 5 pm so any other time would be an off hour login attempt. If the login attempt is made after hours, store the user name and login time in a dictionary with the user name as the key. Display all anomaly attempts at the end of the program. If there are no questionable login attempts display No anomaly login attempts
Ex: If the input is:
input1.csv
and the contents of input1.csv are: (store time as integers and use military time to simulate am and pm attempts)
bob,2,paula,1,nancy,8,thomas,23,zach,22,charlotte,4
the output is:
Anomaly login attempts:
nancy:8
thomas:23
zach:22
charlotte:4
Ex: If the input is:
input2.csv
and the contents of input2.csv are: (store time as integers and use military time to simulate am and pm attempts)
the output is:
No anomaly login attempts
Note: There is a newline at the end of the output, and input1.csv is available to download.
Trending now
This is a popular solution!
Step by step
Solved in 4 steps with 4 images