Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.

 

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

 It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Loops

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

1. Include comment block on line1 of your code with the following information:

“”

“””

Your Name

Course Name, Section (example: ENTD200 B002 Spr18)

Instructor name

Week #

Date completed

“””

2. Create 2 Python programs based on week 5 flowcharts and requirements. You must use loops, do not use function call

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C# Programming Assignment: Computerization of health records

 

4.15  (computerization of health Records) a health-care issue that has been in the news lately is the computerization of health records. This possibility is being approached cautiously because of sensitive privacy and security concerns, among others. 

Computerizing health records could make it easier for patients to share their health profiles and histories among their various health-care professional. this could improve the quality of health care, help avoid drug conflicts and erroneous drug prescriptions, reduce costs and, in emergencies, could save lives. In this exercise, you’ll design a “starter” Healthprofile class for a person. The class attributes should include the person’s first name, last name, gender, date of birth (consisting of separate attributes for the month,day, and year of birth), height (in inches) and weight (in pounds). Your class should have a constructor that receives this data. For each attribute provide a property with set and get accessors. the class also should include methods that calculate and return the user’s age in years, maximum heart rate and target-heart-rate range (see Exercise 4.14), and body mass index (BMI: see Exercise 3.31). Write an app that prompts for the person’s information, instantiates an object of class Healthprofile for that person and displays the information from that object–including the person’s first name, last name, gender, date of birth, height and weight — then calculates and displays the person’s age in years, BMI, maximum heart rate and target-heart-rate range. It should also display the “BMI values” chart from Exercise 3.31)

Please use C# coding language and submit as a zip file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research project paper.

  

Research Project Description:

We have been looking at the advancement of encryption standards over the years. In today’s locked down world with almost everyone working remotely, new challenges that require encryption and cryptography have arisen. When do companies need to use encryption? What levels of encryption and authentication are needed? 

Pick an industry or company that has had to deal with the challenges. How have they addressed things such as:

Websites

Cloud storage

Threat actors

Vulnerabilities

Security Measures and policies

Email (both encrypted and not),

Hash values to verify documents,

Databases that store

corporate sensitive / proprietary information

employee payroll, health records, etc.

vendor information

credit card information

other items as determined by the type of company

Remote users that must be authenticated

On site users that must be authenticated

What policies need to be in place?

What case studies are there?

What new problems have arisen as a result of the pandemic?

You will need to complete the following: 

What data are you protecting?

What are the biggest challenges faced by companies in the chosen industry when using encryption

How do they verify and authenticate the users both local and remote?

What forms of encryption (symmetric / asymmetric)

What laws and regulations affect the industry?

What are common attacks / threats / vulnerabilities and how would you protect against them?

How have other similar companies dealt with this and with what results?

How would you test the method you choose?

What are the expected outcomes?

What new methods may be on the horizon that will help this industry?

Please note the following criteria:

Research paper:

Research Paper must be in APA Style

Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

Must be at least 12 to 15 double-spaced pages with standard 1 inch margins.

8 – 10 pages of prose

Limit the number of bulleted lists

Prose + charts + figures = 12 to 15 pages

Does not include title page, abstract and references

Paper will be 210 points:

Presentation

This presentation must be supported by the research paper.

Presentation will be 100 points and based on the following:

Completeness of the Topic 

Presentation Delivery

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PROJECT INTEGRATION MANAGEMENT PAPER

Manage Your Health, Inc. (MYH) is a Fortune 500 company that provides a variety of healthcare services across the globe. MYH has more than 20,000 full-time employees and more than 5,000 part-time employees. MYH recently updated its strategic plan; key goals include reducing internal costs, increasing cross-selling of products, and exploiting new Web-based technologies to help employees, customers, and suppliers work together to improve the development and delivery of healthcare products and services. Below are some ideas the IT department has developed for supporting these strategic goals:

1.    Recreation and Wellness Intranet Project: Provide an application on the current intranet to help employees improve their health. A recent study found that MYH, Inc. pays 20 percent more than the industry average for employee healthcare premiums, primarily due to the poor health of its employees. You believe that this application will help improve employee health within one year of its rollout so that you can negotiate lower health insurance premiums, providing net savings of at least $30/employee/year for full-time employees over the next four years. This application would include the following capabilities:

Allow employees to register for company-sponsored recreational programs, such as soccer, softball, bowling, jogging, and walking.

Allow employees to register for company-sponsored classes and programs to help them manage their weight, reduce stress, stop smoking, and manage other health-related issues.

Track data on employee involvement in these recreational and health-management programs.

Offer incentives for people to join the programs and do well in them (e.g., incentives for achieving weight goals, winning sports team competitions, etc.).

2.    Health Coverage Costs Business Model: Develop an application to track employee healthcare expenses and company healthcare costs. Healthcare premiums continue to increase, and the company has changed insurance carriers several times in the past 10 years. This application should allow business modeling of various scenarios as well as tracking and analyzing current and past employee healthcare expenses and company healthcare costs. This application must be secure and run on the current intranet so several managers and analysts can access it and download selected data for further analysis. The new application must also import data from the current systems that track employee expenses submitted to the company and the company’s costs to the insurance provider. You believe that having this data will help you revise policies concerning employee contributions to healthcare premiums and help you negotiate for lower premiums with insurance companies. You estimate that this application would save your company about $20/employee/year for full-time employees over the next four years and cost about $100,000 to develop.

3.    Cross-Selling System: Develop an application to improve cross-selling to current customers. The current sales management system has separate sections for major product and service categories and different sales reps based on those products and services. You see great opportunities to increase sales to current customers by providing discounts when they purchase multiple products and services. You estimate that this system would increase profits by $1 million each year for the next three years and cost about $800,000 each year for development and maintenance.

4.    Web-Enhanced Communications System: Develop a Web-based application to improve development and delivery of products and services. There are currently several incompatible systems related to the development and delivery of products and services to customers. This application would allow customers and suppliers to provide suggestions, enter orders, view the status and history of orders, and use electronic commerce capabilities to purchase and sell their products. You estimate that this system would save your company about $2 million each year for three years after implementation. You estimate that the system will take one year and $3 million to develop and require 20 percent of development costs each year to maintain.

Tasks1.    Summarize each of the proposed projects in the Running Case section using a simple table format suitable for presentation to top management. Include the name of each project, identify how each one supports business strategies, assess the potential financial benefits and other benefits of each project, and provide your initial assessment of the value of each project. Write your results in a one- to two-page memo to top management, including appropriate back-up information and calculations.

2.    Evaluate the four projects in the Running Case section by preparing a weighted scoring model using the template provided on the companion Web site for this text. Develop at least four criteria, assign weights to each criterion, assign scores, and then calculate the weighted scores. Print the spreadsheet and bar chart with the results. Also write a one-page paper that describes this weighted scoring model and the results.

3.    Prepare a business case for the recreation and wellness intranet project. Assume that the project will take six months to complete and cost about $200,000. Use the business case template provided on the companion Web site for this text.

4.    Prepare a project charter for the recreation and wellness intranet project. Assume that the project will take six months to complete and cost about $200,000. Use the project charter template provided in this text and the sample project charter provided in Table 4-1 as guides(SEE ATTACHED).

5.    Prepare a change request for the recreation and wellness intranet project, using the template provided on the companion Web site for this text. Be creative when making up information.

*********Appendix A: Brief Guide to Microsoft Project Professional 2016 (companion website)

https://www.cengage.com/resource_uploads/downloads/1337101354_609952.pdf

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Question CIS navigating digital tools week 8

 

Musician, producer, and record label owner Mannie Fresh uses the Cloud to store his music tracks and other important files to help his business stay organized and get things done quickly and effectively.

Choose one of the ways that you use or would like to use the Cloud below and explain why it’s useful to you.

  1. Reducing the need for one specific home base – your files are available everywhere
  2. Being able to share very large files quickly
  3. Sharing videos and pictures with your family members with ease
  4. Collaborating with someone else on a special project

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MIS 332

Our lead developer was recently certified in Scrum, one of the agile methodologies, and would like to try to manage this project using scrum.

In order for her to do this, she needs us to rewrite the requirements list you previously created as user stories. Just to remind you, a user story looks like this:

As a < type of user >, I want < feature > so that I can < functionality >.

For example: As a taxi driver, I want directions so that I can quickly get to my next customer.

Please rewrite all of your requirements as user stories and I will pass it on to our development team.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IN2009: Language Processors Coursework Part 3

This is the 3 rd and final part of the coursework. In Part 1 you created a parser for the LPL grammar which, given a syntactically correct LPL program as input, builds an AST representation of the program. In Part 3 you develop a compiler that processes the AST to generate IR code

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

To implement a cache simulator (Computer Architecture)

I want someone to finish my final questions and get full points.

Introduction

In this final project you will implement a cache simulator. Your simulator will be configurable and will be able to handle caches with varying capacities, block sizes, levels of associativity, replacement policies, and write policies. The simulator will operate on trace files that indicate memory access properties. All input files to your simulator will follow a specific structure so that you can parse the contents and use the information to set the properties of your simulator.

After execution is finished, your simulator will generate an output file containing information on the number of cache misses, hits, and miss evictions (i.e. the number of block replacements). In addition, the file will also record the total number of (simulated) clock cycles used during the situation. Lastly, the file will indicate how many read and write operations were requested by the CPU.

It is important to note that your simulator is required to make several significant assumptions for the sake of simplicity.

  1. You do not have to simulate the actual data contents. We simply pretend that we copied data from main memory and keep track of the hypothetical time that would have elapsed.
  2. Accessing a sub-portion of a cache block takes the exact same time as it would require to access the entire block. Imagine that you are working with a cache that uses a 32 byte block size and has an access time of 15 clock cycles. Reading a 32 byte block from this cache will require 15 clock cycles. However, the same amount of time is required to read 1 byte from the cache.
  3. In this project assume that main memory RAM is always accessed in units of 8 bytes (i.e. 64 bits at a time).
    When accessing main memory, it’s expensive to access the first unit. However, DDR memory typically includes buffering which means that the RAM can provide access to the successive memory (in 8 byte chunks) with minimal overhead. In this project we assume an overhead of 1 additional clock cycle per contiguous unit.
    For example, suppose that it costs 255 clock cycles to access the first unit from main memory. Based on our assumption, it would only cost 257 clock cycles to access 24 bytes of memory.
  4. Assume that all caches utilize a “fetch-on-write” scheme if a miss occurs on a Store operation. This means that you must always fetch a block (i.e. load it) before you can store to that location (if that block is not already in the cache).

 

L2/L3 Cache Implementation (required for CS/ECE 572 students)

Implement your cache simulator so that it can support up to 3 layers of cache. You can imagine that these caches are connected in a sequence. The CPU will first request information from the L1 cache. If the data is not available, the request will be forwarded to the L2 cache. If the L2 cache cannot fulfill the request, it will be passed to the L3 cache. If the L3 cache cannot fulfill the request, it will be fulfilled by main memory.

It is important that the properties of each cache are read from the provided configuration file. As an example, it is possible to have a direct-mapped L1 cache that operates in cohort with an associative L2 cache. All of these details will be read from the configuration file. As with any programming project, you should be sure to test your code across a wide variety of scenarios to minimize the probability of an undiscovered bug.

 

Graduate Students (CS/ECE 572)

Part 1: Summarize your work in a well-written report. The report should be formatted in a professional format. Use images, charts, diagrams or other visual techniques to help convey your information to the reader.

Explain how you implemented your cache simulator. You should provide enough information that a knowledgeable programmer would be able to draw a reasonably accurate block diagram of your program.

  • What data structures did you use to implement your multi-level cache simulator?
  • What were the primary challenges that you encountered while working on the project?
  • Is there anything you would implement differently if you were to re-implement this project?
  • How do you track the number of clock cycles needed to execute memory access instructions?

Part 2: Using trace files provided by the instructor (see the sample trace files section), how does the miss rate and average memory access time (in cycles) vary when you simulate a machine with various levels of cache? Note that you can compute the average memory access time by considering the total number of read and write operations (requested by the CPU), along with the total number of simulated cycles that it took to fulfill the requests.

Research a real-life CPU (it must contain at least an L2 cache) and simulate the performance with L1, L2, (and L3 caches if present). You can choose the specific model of CPU (be sure to describe your selection in your project documentation). This could be an Intel CPU, an AMD processor, or some other modern product. What is the difference in performance when you remove all caches except the L1 cache?  Be sure to run this comparison with each of the three instructor-provided trace files. Provide written analysis to explain any differences in performance. Also be sure to provide graphs or charts to visually compare the difference in performance.

Part 3: If you chose to implement any extra credit tasks, be sure to include a thorough description of this work in the report.

Submission Guidelines

You will submit both your source code and a PDF file containing the typed report.
Any chart or graphs in your written report must have labels for both the vertical and horizontal axis!

For the source code, you must organize your source code/header files into a logical folder structure and create a tar file that contains the directory structure. Your code must be able to compile on flip.engr.oregonstate.edu. If your code does not compile on the engineering servers you should expect to receive a 0 grade for all implementation portions of the grade.

Your submission must include a Makefile that can be used to compile your project from source code. It is acceptable to adapt the example Makfile from the starter code. If you need a refresher, please see this helpful page (Links to an external site.). If the Makefile is written correctly, the grader should be able to download your TAR file, extract it, and run the “make” command to compile your program. The resulting executable file should be named: “cache_sim”.

 

ECE/CS 572 Extra Credit Opportunities

10 points – Implement and document write-back cache support for a system that contains only an L1 cache.
10 points (additional) – Extend your implementation so that it works with multiple layers of write-back caches. E.g. if a dirty L1 block is evicted, it should be written to the L2 cache and the corresponding L2 block should be marked as dirty. Assuming that the L2 cache has sufficient space, the main memory would not be updated (yet).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now