W8D-M

 What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W10NS

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

soft wore system engineering process week 1 and 2

 

Project Background

Throughout this course, you will be working on several aspects of software development process improvement that will result in a complete Software Development Process Improvement Plan for a hypothetical organization of your choosing. You will not be developing any software, but you will work extensively with the concepts of good software development processes.

Project Selection

The first step will be to select a hypothetical organization and software category for your Software Development Process Improvement Plan. Examples would be a company that develops its own software for internal use, a company that develops software for external sale, or a company that provides contractual software development. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

  • Nontrivial: The selected organization should be large enough to allow reasonable exercise of the software development processes you will identify.
  • Domain knowledge: You should be familiar with the organization or software category to allow focus on the software development processes without significant time required for domain education.
  • Accessibility: You should have good access to the people and other information related to the organization or software category because this will be an important part of the process improvement.

Select an organization and software category that fits these requirements, and then submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

The proposal should be a document of approximately half a page, with enough detail to explain the hypothetical organization and software category that you have chosen.

Assignment Description
For the assignments in this course, you will not be implementing the actual project, but rather, you will be developing a comprehensive Software Development Process Improvement Plan document. Your first task in this process will be to select a company and software category to use as the basis of your design. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery.

The project deliverables for Week 1 are as follows:

  • Proposal for company and software category to instructor for approval (1/2 page)
  • Software Development Process Improvement Plan shell (document detailed below)
    • Title page: Should include course name and number, project name, student name, and date
    • Table of contents: Auto-generated, in a separate page and should be updated in each phase
    • Section headings (create each heading on a new page with TBD as content except for sections listed under “New content” below)
      • Project Outline (Week 1)
      • Process Improvement Background (Week 1)
  • New content (needs to be filled in for phase 1)
    • Project outline (1 page)
      • Identify the company and category of software developed.
      • List process improvement goals.
      • Material can be taken from the approved proposal submitted to instructor.
      • Be sure this project is approved by the instructor.
    • Process improvement background (2–4 pages)
      • Research current industry-accepted software development process improvement methods.
      • Choose the methods that you will use to guide your process improvement plan and justify your selection
      • Describe background material from your choice of industry-accepted software development process improvement methods.
  • Be sure to update your table of contents before submission.
  • Document needs to be formatted according to APA guidelines.
  • Name the document “yourname_CS671_IP1.doc.”
  • Submit the document for grading

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

week 2 

 

One of the major applications of process improvement is in the overall software development process. This section of the process improvement plan will focus on the areas that need improvements within the process, and the best practices that can be used to improve those areas. Starting with the goals established for the process improvement plan, examine your hypothetical company’s current development processes, identify its areas of improvement, and identify the best practices that can be applied as part of the improvement plan.

During this phase, you need to do the following:

  • Update the Software Development Process Improvement Plan document title page with a new date.
  • Update the previously completed sections based on the instructor’s feedback.
  • New Content:
    • Work within the subsection titled Best Software Practices for Process Improvement.
      • Identify the problem.
        • Identify the areas that need improvements within the organization, the process, or the team.
      • Identify the solution.
        • Identify at least 3 best software practices that fit the organization that you selected to improve.
        • Provide brief descriptions of each of those practices.
      • Justify the solution.
        • Make sure that you justify your selection for each practice and how it will improve the process.
      • Implement and communicate the solution.
        • Provide a plan to implement and communicate those improvements, and analyze the potential benefits that these improvements will have on the organization and its processes.
  • Be sure to update your Table of Contents before submission.
  • The document needs to be formatted according to APA guidelines.
  • Name the document “yourname_CS671_IP2.doc.”
  • Submit the document for grading.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

 Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. 

 

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/
https://www.onlinesecurity.com/news--publications-page
http://www.esecurityplanet.com/views
http://netsecurity.about.com/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assianment 1

 

What are the benefits of doing a pilot program before a full scale rollout of a new analytical methodology? Discuss this in the context of the mini case study.

Please NOTE:

1. Ph.D. quality submissions

2. Your ideas & your own words 

3. Provide all the citations

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ERM at Intuit

 Chapter 12 presented the approach Intuit uses to measure the effectiveness of their ERM, and chapter 15 presented the process the City of Edmonton employed to develop and deploy their ERM. You are an ERM consultant, retained by Intuit to re-implement their ERM. They have decided to start over and develop a new ERM for their current organization. Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other. You must use at least 2 paragraphs (of you own words) to justify your answer. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud computing to become multi jurisdictional

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

 It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Features/Mechanisms/Architectures

 

As mentioned in the lectures, the architectures aligns with mechanisms and mechanisms create the features/business drivers of the Cloud.  View the attached matrix.  A third column architecture has been added that is blank.  For this assignment, complete the third column by adding the different architectures.    

Next complete the weekly reflection below. 

WEEKLY JOURNAL:- 

 Use this journal to reflect on what you have learned and what is not clear. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SETUP

Setup a Virtual Machine (VM) using Oracle VirtualBox and use Kali Linux as the Operating System (OS). See https://www.youtube.com/watch?v=AAsaZarnKxY Once you have Kali up and running running spend approximately two hours exploring this environment. Once complete post two paragraphs about your experience. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Submit a Microsoft Word document with Answers for below questions

 

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now