Security Controls

Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.Answer the following question(s):

  • Would an organization need to apply security controls to allow safe use of those applications? Why or why not?

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable, be sure to include three questions in your thread 

500 words

APA format with references needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Smart Kitchen System Proposal using IoT

Refer Google Docs link

https://docs.google.com/document/d/1VKPykvWI5Ka9bmmz_5DroMl-W3J54AfkM1ds_1P9Vkw/edit?usp=sharing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Policy

 Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

1000 words 

APA format with references needed

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Global Marketing

 

What do you see as some of the challenges that we will face in global marketing in the years to come?

After reviewing this week’s resources and your research, in your own words identify and explain two challenges facing global marketing leaders. Explain the impact and provide at least one strategy to address and tackle each challenge identified.  Discuss the impact of the pandemic on global marketing. 

 Your initial response to the discussion question should be 250-300 words. You must have at least one course (our text) and one non-course scholarly/peer reviewed source in your initial posting.  Sources require in-text citations and must be incorporated into the body of the post in addition to a full APA citation at the end of the post.  

References:

https://www.wordstream.com/blog/ws/2020/10/27/post-pandemic-marketing-strategies

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sociogram

It is a user-friendly web application which helps users to explore the social world with just a single sign up. It is flexible enough for users to create/edit/manage their own individual accounts. User can find friends based on similar interests, which means that the user gets to update/edit their interests/hobbies in their profile information such that they can connect to other users with similar diversion. This helps users to widen their social circle and will help them explore people from different cultures as well.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week-15

 Discuss  a situation at work where you felt you had to consider the ethics of something you were being asked to do. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity, computer

You have been hired to perform digital investigations and forensics analysis for a company . You find that no policies, processes, or procedures are correctly in place. Do an internet search to find information, and then create a policy and processes document to provide the structure necessary for your Lab environment. Be sure to cite your online sources.

TWO PAGES WITH SO MANY REFERENCES FROM ONLINE AND ELSEWHERE BUT NO PLAGIARISM.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

excel help

                

Write a single Excel formula that runs a quick VLOOKUP, and generate the difference of Two position – Client Position, Vendor postion.

Keep in mind the identifier format between Vendor and client sheet are slightly different so you will have to compensate for it in your formula to get the identifiers to match-up. Other Excel lookup functions are acceptable as well as long as it gets the job done.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CSE about AI

 

This assignment is based primarily on the material covered in lecture “Minimax”.

We will work with “Tic-Tac-Toe” as a simple game to help us work through various algorithms.

Part 1: (Multi-agent) State Spaces

1.1) [1pt] Similar to Homework 1, we will first need to create a starting state for you to work from. Starting from the beginning of the game is too much work to do by hand, so we will have you work from a game in progress.

So, to start play a game of tic-tac-toe with yourself. Make sure you don’t win (or lose), forcing the game to a draw will make the rest of the homework assignment much easier (fewer states to consider).

Now, roll the game back to the 3rd-to-last move (last move->next-to-last move->2nd-to-last move->3rd-to-last move). This will be the initial state you use for the rest of the assignment. (Equivalently, choose as your initial state the game board that had 4 blank spaces.)

Note, this means that you (the agent/Max) will be playing “O” and the opponent (Min) will be playing “X”.

1.2) [2pts] Now draw out the search tree starting from the initial state you created in (1.1). Draw out the full search (which should be fairly small since we are starting from near the end of the game).

When considering successor states (i.e., possible game moves), evaluate moves starting with the top-left, then left-to-right and finally top-down. That is, use the following order:

#1#2#3#4#5#6#7#8#9

Draw the states in your tree from left to right when following the above order.

Hint: Make sure to leave some space in your diagram, you will be adding information to it in the following sections. In fact, I recommend reading the rest of the assignment first, so you know what you need to leave space for.

Hint 2: It may be a good idea to clearly mark which level of the tree represents states Max is considering and which Min is considering. Just as on the slides, you would start with Max on the root level of the tree.

Part 2: Minimax

Now we move on to some actual algorithms.

2.1) [2pts] Now, go back to your search tree in Part one and add utility scores to all the terminal states (those with no children, i.e., where the game ended). Rather than simple win lose, we will use a more complicated utility function (to help avoid ties). This utility function is positive for wins, negative for losses, and closer to zero the longer a game took to finish. Specifically:

Number of moves playedNumber of moves leftScore if O (agent, Max) wonScore if X (opponent, Min) wonScore if draw545-5634-4723-3812-2901-10

2.2) [5pts] Now, perform the minimax algorithm to determine “Minimax scores” for each of the states in the tree all the way back to the root (initial state).

Using these scores, which move would Max choose to make?

Part 3: Alpha-Beta Pruning

3.1) [6pts] Now go back and repeat the search from part 2, only this time perform alpha-beta pruning as well. Make sure to show what alpha and beta values are considered (and how they change) for each state in the search tree. Use alpha > beta as the pruning check (do not use greater than or equal to). Also be sure to clearly mark which parts of the tree would be pruned off.

Hint: Remember, at the root of the tree (initial state) alpha, beta start off as: alpha=-infinity and beta=infinity.

Part 4: Extra Credit

4.1) [+1pts] 

Go back and redo 3.1, only this time use alpha >= beta as the pruning check. Remember you will have to be careful about what you do with tie in this case. To resolve this use a pruning flag to indicate a branch that higher levels should ignore (e.g., if you decide a branch should be pruned, set it’s minimax value to “X” instead of a number).

Discuss the differences that you see. (Warning, both the new search results/tree and discussion are required to receive credit.)

 You may work electronically (word processor, etc) and submit a final pdf of your work. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 2_database

250 words+

1. Please describe the concept of (1) Schema, (2) Primary Key and Foreign Key used for database system.

2. Except the listed 6 algebra operations such as select, join/intersection, project, … is there any potential algebra operand may/can be used for database management processing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now