Assingment on Protecting Security of Assets CISSP

PII, PHI and Sanitize SSDs -Written Lab review pg 356

Read Chapter 5

Foreword: NIST recommends that drivers are wiped several times to ensure that deleted data cannot be recovered hence the term “sanitize”

Research a drive sanitization software program that is compliant with NIST 800-88 regarding media sanitation 

https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final

Do not use this one find another one –>For starters Sledge Hammer 

http://www.datadev.com/sledge.html

Task:

Find a program that sanitizes media 

Write a brief description of the features, (advantages and disadvantages)

The answer: Is it the program compliant with NIST 800-88?

(Optional) If there is a free trial or open source use it and provide screenshots in your review. 

Must be in APA

Minimum 2 pages (Body)

Paper length: Title page

Abstract,

Body (2 pages),

Conclusion

References

 Note: Surround the 2-page body with the title page, abstract, and references 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Core Solutions of SharePoint Server 2013 and Policy

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how to write policy statements that reflect a code of ethics. The director of IT has asked for your help by providing an example of a policy statement that reflects work you do in IT administration.

Reflect on the cultural and global political considerations for the use of a sharing service as presented in the lab and the data which could be hosted and made available via the Internet. Reflect on the idea that some issues, such as keeping data unalterable, could transcend cultures, while other IT choices could depend on your cultural perspective.

Consider the following:

  • How cultural perspective could impact the security decisions of an administrator setting up SharePoint® Server 2013 citing choices that were made in the labs
  • Global political issues, such as corruption, human rights, and rights to privacy in the U.S. and Key Nations, based on your readings and discussions this week

Write a 1- to 2-page example of a policy statement using Microsoft® Word. Include the following:

  • A brief description of the types of data that are hosted and made available via the Internet using SharePoint® Server 2013. Include at least two types.
  • At least two cultural or global political considerations for sharing services (e.g., privacy rights)
  • Your opinion regarding any IT choices that seem to transcend culture
  • At least one example of choices you have when administering SharePoint® Server 2013 that could depend on your ethical stance
  • A brief policy statement for configuring SharePoint® Server 2013 that aligns with your ethical stance on data integrity (e.g., “The organization will seek to protect confidential and proprietary information when configuring SharePoint® Server 2013.”)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COP 1000c Lab Assignment 6

For the following program: 

• Create an algorithm. 

• Code the program as grades.py. 

• Upload your algorithm and your program (grades.py). 

Grades 

a) Write a program that reads in the names and test grades of 5 students from the data file “grades.txt”. Use the split function to separate the names and test scores and convert the test scores to numeric values.

 

b) Calculate the average of the test scores.  

c) Display the names, test scores and the average on the screen as follows: 

Name Grade 

——————— 

Mickey Mouse 90.0 

Jane Doe 50.0 

Minnie Mouse 95.0 

Donald Duck 80.0 

Daffy Duck 70.0 

Average Grade: 77.0 

d) Prompt the user for a new first name, last name and grade. 

e) Append the files “grades.txt” with the new data in the same format as the existing records. 

Grading Rubric: 

Algorithm (6) 

File Reading (6) 

• Variables 

• Split 

• Numeric conversion 

Calculation (2) 

Output to screen (2) 

• Round to 1 decimal place 

File Appending (4)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research and discuss a particular type of Malware and how has it been used in “today’s news” and the respective impact on cybersecurity.

 Research and discuss a particular type of Malware and how has it been used in “today’s news” and the respective impact on cybersecurity. Add to your discussion ways the Malware could have been detected and potentially avoided. 

1. No plag

2. 250-300 words with citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Enterprise Systems and Architecture

Social media and how enterprise needs to react to it.

Discuss the possible impacts of Web 3.0, Web 4.0 and social media (eg: Facebook, Twitter, WhatsApp, Snapchat, etc.) on Enterprise IS: how enterprises need to react to and utilize these phenomena in their operations. Provide justification with suitable real life examples to support the arguments.

Harvard Anglia referencing style, 1000 words  

more on page 8,9 in the document provided.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?

Please a topic from the below list and create a one-page essay answering the question noted below. 

Please use at least one reference and ensure it’s in APA format  (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY  from any source (student or online source), rather rephrase the author’s  work and use in-text citations were necessary.

  • Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  • List and briefly describe the nine-step process in conducting a neural network project.
  • What is the main difference between classification and clustering? Explain using concrete examples.
  • What are the privacy issues with data mining? Do you think they are substantiated? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 3: Remote Access and VPNs

  

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

2. Recommend any other forms of remote access that are relevant and describe how they would be used.

3. Create a draft report detailing all information as supportive documentation.

4. Cite sources, where appropriate.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font:      Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Length of report: 3–4 pages

Self-Assessment Checklist

  • I researched and recommended an appropriate VPN technology.
  • I described the VPN technology and explained why it is the best      choice.
  • I recommended other forms of remote access that are relevant and      described how they would be used.
  • I created a professional, well-developed report with proper      documentation, grammar, spelling, and punctuation.
  • I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science Software Engineering Assignment

Develop a complete use case for software implementing a system for: searching for books on a specific topic using an online bookstore.

> Write a user story for the above software.

> Write a nonfunctional requirement for the application.

Outline your plan addressing these issues and other issues.

Need 6-8 pages APA-formatted paper with minimum of 9 peer-reviewed citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Error Handling

 

The Software Development Company requests you add user error exception handling capabilities to the C# program.

For this week’s assignment, build on the Week Three Individual Assignment, “Branching in C#,” by  storing each  software developer’s information in a C# data structure object record. The C# data structure object record must include the type of employee as either W2 or 1099 using the following requirements: 

  • The 1099 software development employees’ records always have zero tax amounts
  • The program properly handles and informs the user about errors on user input
  • The program allows the user to reenter and input value that was invalid, until the user succeeds in entering a valid value.
  • The program demonstrates in the code the use of ref arguments
  • The program displays on the console all the software developers’ data, monthly pay, monthly taxes, annual gross pay, annual taxes, and net pay

Using Visual Studio® and C# programming concepts, write a program to meet the specifications of the company’s request. The program should have the following characteristics:

  • Compile and Execute without errors
  • Meets specifications by displaying on the console a welcome message along with the following information on three software developers:
    • Software developer name
    • ZIP Code
    • Gross monthly pay
    • Annual gross pay
    • Employee type: W2/1099
    • Monthly and annual taxes determined by employee type
  • Logic flow is clear, concise, and effective; demonstrates exception handling routines and reference types by catching and displaying user data entry errors and implementing reference types as part of the code
  • User inputs and outputs should be clear on screen
  • The program code should laid out with appropriate indentation to show program structureIdentifiers logically describe use
  • Naming conventions are consistent
  • Comments and headers to explain processing that is not obvious

Constraints for assignments in this course: Collect all data and store it as the user enters it. When all the data is collected, display the data and any calculated data on the console. Data displayed on the console must be correctly labelled so that the user will be able to understand what it means. After all data has been displayed, the program will prompt the user to press ENTER to continue, and will allow the program to finish (and the console to close), only after the user has pressed the key to dismiss the program.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

H3 2-2

 

Data/Information/Knowledge

1.  Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.

2.  Why do organization have information deficiency problem? Suggest ways on how to overcome information deficiency problem.

No Plagiarism please. Please do not share my answer with anyone.

Answer should 400-450 words. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now