Assignments .pdf
أحتاج إلى دعم في الطب. العنوان المقترح: Assignments .pdf. تم إرفاق ملف: assignments .pdf.
large The University of Bisha College of Computing and Information Technology Exercise 2 — Cybersecurity Log Analysis Exercise Question: [5 Marks] Realistic Scenario: A company reports unusual login attempts on its internal authentication server. The security team receives the following suspicious log entry: USER=admin|ACTION=LOGIN_ATTEMPT|RESULT=FAILED|IP=.94|TIME= 08:33:22 Tasks: 1. Split the log entry into components using the split() method. 2. Extract and print the following fields: Username Action Result IP address Timestamp 3. Detect suspicious behavior: If IP equals ".94", print "Suspicious login attempt detected." 4. Use XOR operation: Extract the last number from the IP address (94 from .94). Encrypt it using: encrypted_value = number ^ 0xAA Print the encrypted value. 5. Write a…

