use encryption to reduce the vulnerabilities of data

 how you would advise user to use encryption to reduce the vulnerabilities of  their data at rest, in use, and in transit (or in motion).  Identify at what points you think their data is at the highest risk. Consider where the data is when it at rest, in transit, or in use and the potential vulnerabilities associated with each of those locations.  Cite your sources in-line and at the end. Provide a URL for your citations and describe in 700 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COM-320 Session 10: System Architecture

1. Jesse wants me to recommend a vendor who offers an ERP strategy. I need to review the SAP and Oracle Web sites, and at least two others that offer ERP solutions, and reply to her with the results and the reasons for my recommendations.

2. Visit SCR’s data library to review SCR’s network configuration and then send Jesse a recommendation for the TIMS system architecture. She wants me to suggest an overall client/server design, number of tiers, and network topology. She also asked me to comment on these issues: legacy data, Web-centricity, scalability, security, and batch processing that might be needed. Jesse said it was OK to make reasonable assumptions in my proposal to her.

3. Perform research on the Internet to learn more about TCO, and develop a TCO checklist that includes the five most important elements of TCO, because of their magnitude or potential impact on TIMS.

4. Prepare a design specification as Jesse requested.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber Security

  

I am interested to know how long it took you to complete this lab. You are not required to provide this information, but it would be very helpful for me to understand the burden of labor I’m placing on students with this lab. I assure you that your time-to-complete will not have ANY impact on your grade—even if it took you 4 minutes or 4 hours, I just want an honest understanding of how long it takes. 

Time to complete this lab was:_______ 

Module 8 Lab

1. Advanced HTML Encrypt and Password Protect

After reading the instructions for this lab, please compose a 300-word narrative here about your understanding of AHE&PP. Include a screen shot that shows your protecting as Appendix A below. Your screen shot needs to include the date/time and something in the shot that demonstrates you are using your own computer to complete the lab. You can use any HTML page you want; you can create a page on your own, pull one off the victim website; whatever makes you happy! J

As a reminder, your narrative is not intended to be a book report/article report. No quotation is allowed in your narrative and plagiarism is certainly not allowed. Please note that 300 words is the minimum, therefore, please do not submit work less than 300 words. I don’t like to be a stickler about this but requiring a minimum word count is one way I maintain the minimum expectation for depth of description/understanding of the subject matter. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cyber security risk assessment

 

Review the case study document attached to this section (Case Study 2).

Use the same method – apply it to an information risk assessment at your workplace , home or place of study, and create a similar report using VA to understand the risk presented to information.

Submit your work as an APA-6 report – limit to 5 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

due in 8 hours

 

 c++

Question 1

Calculate the slope and intercept of the first order equation y=mx+b  ->  deg_c = m * deg_f + b

Here is the spreadsheet  https://github.com/ml1150258/2019_Spring_CIS_CSC_17c/tree/master/Hmwk/CurveFitLab (Links to an external site.)Links to an external site. 

Write a program/project in Netbeans using the same concepts as the  spreadsheet.  You can copy the degrees Fahrenheit column and place in a  file.  Then copy the column with error values included for degree  Celsius.  Calculate the slope and intercept for the data using the  formulas in the spreadsheet.

Question 2

Create abstract classes to inherit, show polymorphic behavior and  operator overloading.  I have written the .h and main.cpp files for  you.  Complete by writing the .cpp class files.

https://github.com/ml1150258/2019_Spring_CIS_CSC_17c/tree/master/Hmwk/Review2_CIS17c_Object_Array

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 Discussion: Subnetting and Protocols

For this Discussion, respond to the following:

  • Discuss the purpose of subnetting. What does CIDR stand for and mean?
  • Discuss the use of ARP, TCP, UDP, FTP, HTTP, and Telnet.
  • How does TCP ensure reliable delivery? Name a few TCP protocols. What is TCP’s “counterpart” that does not ensure reliable delivery?  Name a few of these protocols.
  • What is the purpose of subnetting- Subnetting a network resolves network congestion. for example, if all computers on the network are downloading big files the network can overwhelm the network. Subnetting divides the network into two or more networks. What does CIDR stand for and mean? CIDR means Classless Inter-Domain Routing. This allows for you to add a specification on the IP address that allows you to put specifications on the number of bits that make up the networking portion.
  • What is the use of ARP, TCP, UDP, FTP, HTTP, and Telnet? ARP means Address Resolution Protocol, this is a networking layer protocol that turns IP addresses into physical address also known as MAC address. TCP stands for Transmission Control Protocol this allows one computer to talk to another computer through compiling packets of data and sending them to the right location. UDP stands for User Datagram Protocol. This is a connectionless protocol because it doesn’t require a virtual circuit to be established before any data transfer occurs. UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and a checksum capability to verify that the data arrived intact. FTP stands for File Transfer Protocol, this one is self-explanatory this is the standard for transferring files over the internet. HTTP means Hypertext Transfer Protocol, the communications protocol used to connect to Web servers on the Internet or on a local network (intranet). Its primary function is to establish a connection with the server and send HTML pages back to the user’s browser. Telnet is the method that allows connecting to a remote computer over the Internet and using programs and data as if they were on your local machine   
  • How does TCP ensure reliable delivery? Name a few TCP protocols. What is TCP’s “counterpart” that does not ensure reliable delivery?  Name a few of these protocols.

Transmission control protocol ensures correct delivery by using ACKs when the packets are received. This is almost like sonar, a ping is released and when it bounces back it tells you the information on the ocean floor. Examples of TCP are HTTP, FTP,POP3,SMTP,SNMP. UPD does have any type of delivery ensure method. An example of a UPD is DNS (Domain Name Servers).

*******NEED HELP RESPONDING TO THIS POST *******

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

security archetecture

Manage and Address Threats

▪ Discuss and recommend on remediation per threat identified in the Equifax 2017  company(research paper)

I need in 4 pages plagarsim free ,APA style, citations,references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

How to prevent confidential information

 Describe 400 words

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

15

I presented a few ways that artists use video to remix, re-create, and/or reference a variety of original film narratives. In the spirit of the recent reboot trend, you will be editing your own footage to “remake” an existing feature length film. The challenge of this exercise is that your remake cannot be longer than 15 seconds.

Think of this project as mostly a creative challenge with a few technical elements needing to be checked off. A successful project – 6/6 – is one that meets the technical requirements below and attempts to tell a feature-length story with 15 seconds of video. We are not looking for a 15 second trailer, or a 15 second scene from a film – instead, we are looking for an attempt to show the whole story in 15 seconds. We are looking to see what strategies and solutions people come up with – the whole point is that it might not be completely possible.

What we are looking for (for grading):
We will be looking for evidence that your shots have been planned out, that basic elements like framing, settings / subjects and lighting have been considered, and that edits have been made for a reason. We hope to see projects that explore different strategies for communicating narrative information with video in a very short amount of time. If you are using human actors, be sure to read the content rule below which is also discussed on the 7.1 Tutorial Video Page.

What we don’t care about (for grading):
We don’t care about elaborate sets, costumes or FX, nor will we be judging cinematography beyond basic framing (see below). If you choose to include human actors, we do not care about acting abilities.

Camera + Video Editor Guidelines

  1. This exercise is designed to be completed with a smartphone – use whatever you feel most comfortable with – but the footage must be HORIZONTAL, i.e. turn your phone 90 degrees while you are filming.

     

  2. Video dimension needs to be between 2000 pixels wide and 720 pixels wide, and either 16:9 or 4:3 aspect ratio, which will determine the height of the video. Current iPhones (5s and higher) work with a 16:9 aspect ratio, and film at 1080p, which is actually 1920 pixels WIDE x 1080 pixels TALL. This can be confusing, but, as long as you are using an iPhone or Android from the past 4 or 5 years, the default settings are acceptable. Some common 16:9 dimensions are 1920×1080, 1280×720 or 720×480 – these will be slightly different for devices with 4:3 aspect ratio. General rule of thumb – if you don’t know, check the video dimensions after filming a few test shots, and then just set your project dimensions to fit the size of your video.

     

  3. You can use whatever editing program you are most comfortable with as long as you can combine and edit multiple layers of video and audio. iMovie, Premiere, Final Cut Pro etc are all acceptable.

     

Project Requirements

  1. Max 15 seconds long, or 16-secs long with a 1-sec title screen
  2. Video needs to be between 2000 – 720 pixels wide, height will vary based on capture settings.
  3. Video needs to be HORIZONTAL. Please no VERTICAL VIDEO. Turn your phones.
  4. Use of human actors is optional. If you decide to use human actors, you can be an actor in your own film, or you can work with other friends / peers as actors. Puppets, stop-motion, pets, etc, are all options to work with instead of or in addition to human actors.
  5. Use ALL ORIGINAL video footage
  6. Audio can be sampled from other sources
  7. No “End Credits”

ACTORS
Your actors (including yourself) can play any character from the original film you are re-making. Please do not use make-up or other methods to alter your actors’ physical characteristics in order to “look more” or “sound more” like the actors/characters from the original film in regards to their racial, cultural and/or ethnic presentation. This is different from using hair and make-up to achieve effects such as bruising or scars, or using make-up on an actor playing a non-human or fantastical character (such as a zombie, a super-human or an alien). Please email me if you have any questions about this requirement.

FILM SELECTION
Select any feature-length film that was released in theaters and/or a streaming platform (U.S. or international). It can be a feature length animated film. It cannot be a mini-series, TV Episode or series, or documentary. The length can vary, but it cannot be a “short”. Sites like IMDB or Rotten Tomatoes will usually classify films as “shorts” or “features” – so, this can be a good thing to refer to if you are unsure.

A few more possible strategies, tips and hints:

  • Don’t worry about elaborate costumes, backdrops or effects – we are evaluating these in terms of how creative people can get with what they have, as well as the use of different types of shots and flow of action with edits.
  • One possible method could be to re-watch or jump through the original film to try to select 5 – 10 key “beats” of the narrative, either in terms of action, recognizable shots / settings or identifiable character moments. These can be good starting points to develop ideas for what to film, or a few defining moments to build your 15 seconds of video around.
  • When editing, think about how much time each cut of videos needs to be seen / understood by the viewer.
  • Use filmed dialogue very minimally – voice-overs / narration added after the fact can be a lot easier to time and edit than dialogue spoken by actors on-camera.
  • Sound fx or music snippets from the original film can be included in your re-make.
  • Don’t waste time on credits. Every film can have an extra 1 second for the title screen.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need discussion post of 500-700 words in APA format with 4 references and 4 citations

 

According to Kirk (2016), most of your time will be spent work with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now