CIS 415 Unit 7 DB: Identity Theft

1 page 

Identity theft is one of the most prevalent forms of cybercrime.  Based on your personal experience and this module’s materials explain how cybercriminals can steal your identity and what would you suggest as the most effective steps to protect your identity from cybercriminals.  Initial discussion should be posted no later than Wednesday at 11:59 p.m.  Make sure you articulate sufficiently and possibly support your arguments with some research.
When answering your peers, make sure your response is substantial and don’t be hesitant to have a different opinion.  The topic we are discussing provides for multiple possible outcomes. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C-programming, Bench-marking arrays and linked lists

 

Create a new file named linked_list_tests.c with a corresponding header file. This file should contain three functions:

  1. void linked_list_insert_sequential_start(int num_samples, int sample_size)
  2. void linked_list_insert_sequential_end(int num_samples, int sample_size)
  3. void linked_list_insert_random(int num_samples, int sample_size)

Sequential Insert

The first test should create a new sample of size sample_size. Similar to the testing functions used for arrays, you can simulate this using a void * object and allocating sample_size bytes to it. Insert the new pointer at the beginning of the linked list.

The second test will be almost identical to the first one you created, except you should add each sample to the end of the list. Since you are simulating a standard, singly-linked list, you should expect that this version will perform slower inserting at the beginning of the list.

Random Insert

The third and final test should insert the samples at a random position based on the current number of samples. Reference the random tests in array_tests.c to see how the random values are generated.

After implementing all three functions, include the header file in run_tests.c and create a function named void linked_list_tests(int num_samples, int sample_size). This function should call each individual test you created previously. Use array_tests as a reference to what this should look like.

Running the Tests

The provided Makefile will compile and run the tests automatically. If you implement the functions as requested correctly, this will also work for your new tests. Once you have implemented the new tests, run the test by calling make.

The output should clearly show which test is being performed followed by the time (in ms) that it took to execute the test. Feel free to model your benchmark function after the array tests already provided. If the tests run properly, you’re done!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 4 Discussion – Software Test Plan

 

Software test plans identify specific features that need to be tested, how they need to be tested, and to what extent they need to pass the identified tests.

Respond to the following in a minimum of 175 words:

  • What are the ramifications of stringent testing criteria vs. lax testing criteria?
  • What might happen if insufficient time were left near the end of a project to conduct testing? 
  • What are some situations or features for which testing might not be required at all?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 2- Project Process

Part 1

Strategic Planning:

Case Study Overview:

In conventional business and government megaprojects–such as hydroelectric dams, chemical-processing plants, or big-bang enterprise-resource-planning systems–the standard approach is to build something monolithic and customized. Such projects must be 100% complete before they can deliver benefits: Even when it’s 95% complete, a nuclear reactor is of no use. On the basis of 30 years of research and consulting on megaprojects, the author has found two factors that play a critical role in determining success or failure: replicable modularity in design and speed in iteration. The article examines those factors by looking at well-known megaprojects, both successful ones, and cautionary tales.

Case Study LinkBetter Project Management | Harvard Business Publishing EducationUsing the megaproject case study  answer the following:You have just read an awesome article about megaprojects and how to make them more modular.  You are new to an organization managing their Portfolio Management Office (PMO) and have several projects that you feel meet the criteria of a “megaproject”.  Given what you have learned from this article and your experience managing projects identify the following:

  1. What would be your suggested approach to managing a megaproject?
  2. What are the risks with your approach? 

Part 2Using your knowledge of stakeholders, stakeholder management, and the Megaproject case studies linked above, answer the following: 

  1. Develop a stakeholder matrix for a mega project
  2. Describe stakeholder issues that could arise when managing a megaproject. 
  3. Identify 2-3 stakeholders and their role within a megaproject.  

Text

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java code program

 

Program Specifications Write a SelfPayKiosk class to support basic operations such as scan item, cancel transaction, checkout, and make payment. SelfPayKiosk.java is provided with method stubs. Follow each step to gradually complete all methods.

Note: This program is designed for incremental development. Complete each step and submit for grading before starting the next step. Only a portion of tests pass after each step but confirm progress. The main() method in LabProgram.java includes basic method calls. Add statements in main() as methods are completed to support development mode testing.

Step 0. Declare private fields for number of customers served (int), total sales (double), and current amount due (double). Note the provided final variable for sales tax of 7%.

Step 1 (1 pts). 1) Complete the constructor to initialize all private fields to zero. 2) Complete the accessor methods to return the number of customers served, total sales, and current amount due. Submit for grading to confirm 1 test passes.

Step 2 (2 pt). Complete the scanItem() method. Increase the amount due by parameter price. Do not update amount due if parameter price is negative. Submit for grading to confirm 3 tests pass.

Step 3 (1 pt). Complete the checkOut() method. Multiply amount due by SALES_TAX and add to amount due. Submit for grading to confirm 4 tests pass.

Step 4 (2 pts). Complete the makePayment() method. If parameter payment is enough to pay the amount due, increase total sales by amount due, increment number of customers served, and reset amount due to zero in preparation for the next customer. However, if parameter payment is not enough, update total sales by payment and reduce amount due by payment. Do not make any changes if parameter payment is negative. Submit for grading to confirm 6 tests pass.

Step 5 (1 pt). 1) Complete the resetKiosk() method to reset all private fields to zero. 2) Complete the cancelTransaction() method to reset amount due to zero. Submit for grading to confirm 7 tests pass.

Step 6 (2 pts). Complete the simulateSales() method to perform multiple transactions with increasing prices. Use a loop to simulate parameter numSales transactions. Within the loop, call scanItem() with parameter initialPrice. Call checkOut() and makePayment() to make a payment of $1 more than the amount due. Finally, increase the item price by parameter incrPrice in preparation for the next transaction. Submit for grading to confirm 8 tests pass.

Step 7 (1 pt). Add a boolean private field to indicate if the customer has checked out and is ready to make a payment. Only allow payment after customer has checked out. The cancelTransaction() method should not reset amount due if the customer has checked out. Update the following methods by inserting assignment statements and if statements related to the boolean filed: constructor, checkOut(), makePayment(), and cancelTransaction(). Ex: Set the boolean field to false only after full payment has been made. Submit for grading to confirm all tests pass.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Defining a Process for Gathering Information Pertaining to a HIPAA Compliance Audi

 Questions & Answers

1. What are the four parts of the administrative simplification requirements of HIPAA? 

2. Name three factors used to determine whether you need to comply with HIPAA. 

3. What are the three categories of entities affected by HIPAA Medical Privacy Regulations? 

4. What would business associates of covered entities consist of as it pertains to HIPAA’s regulation?

5. Who/what is covered by the HIPAA Privacy Rule? Give some examples. 

6. What information is protected in HIPAA? 

7. Describe the Basic Principle and Required Disclosures of HIPAA. 

8. Is a health information organization (HIO) covered by the HIPAA Privacy Rule? 

9. Does the HIPAA Privacy Rule inhibit electronic health information exchange across different states or jurisdictions? 

10. How should a covered entity respond to any HIPAA Privacy Rule violation of a health information organization (HIO) acting as its business associate? 

11. True or false: As a patient, your doctor must have you sign a HIPAA Consent and Release Form to share your ePHI or PHI with insurance providers who pay your medical bills. This is part of the HIPAA Privacy Rule. 

12. After the patient provides consent and permission to the medical practice or covered entity, what agreement is needed between the medical practice and its downstream medical insurance claims processor or downstream medical specialist that requires the patient’s ePHI? 

13. Why is security awareness training for all employees within a health care organization a major component of HIPAA compliance?

14. Under the HIPAA Security Rule, it is a requirement for a health care organization to have a security incident response plan and team to handle potential security incidents and breaches. Why is this a requirement? 

15. True or false: It is a requirement for a health care organization to secure the transmission of ePHI through the public Internet.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Disaster Recovery 4

Search “scholar.google.com” or your textbook. Discuss the technical skills required to have a CSIRT response team consisting of employees with other job duties (i.e., not a full-time CSIRT job category)? Why or why not? What factors will influence their decision?

Need 300 plus words plus APA citation and referances

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Technology Selection Study Recommendation Paper

  

For this paper, you will construct a recommendation to study and evaluate a specific technology. To support your recommendation you will use information from either your Technology Review #1 or Technology Review #2. By the time you are finished with your recommendation, you will have performed all four stages of the technology scan.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DR Assignmnt-4

4.1. Using a Web browser, identify at least five sources you would want to use when training a CSIRT.

4.2. Using a Web browser, visit www.mitre.org. What information is provided there, and how would it be useful?

4.3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab?

4.4. Using a Web browser, visit www.cert.org. What information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

 

Need two pages of work around (500 or more words). 

APA format with appropriate references. 

No plagiarism and on time delivery. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 1 Guided Practice 3: Writing a C Program From the Flowchart

Now, we’re going to tie together the prior Guided Practice, where you drew out a program in Flowgorithm with the C Language.  You’re going to write a C Program that translates your flowchart into code, and then compile it.

So, this flowchart:

will produce this output:

We accomplish that by entering code into the compiler.  

Please enter exactly this code into your  Dev C++ compiler.  Then compile and run.

After compiling, you should get the output shown indicated above.

Upload your .c file and your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now