WEEK 9 DISCUSSION DUE 6/2

 PICK AN INDUSTRY

  • Distinguish between incident detection precursors and incident detection indicators.
  • For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.

 

Note:

  • Support your response with examples based on your experience or through research you conduct.
  • Remember to cite any sources you use

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RESPONSE DUE 6/2

RESPOND WITH YOU OPINION OF THE POST BELOW AND COME UP WITH THREE QUESTIONS.

A precursor is a sign or signal that an event may occur in the future. An indicator is a sign or signal that an incident is occurring or has already occurred. In the healthcare industry, there are some challenges that comes from incident detection precursors and indicators. It’s rare that a precursor will tell you if something is actually going to happen. You can increase your protection to critical systems just in case something were to happen. You can also pay closer attention to indicators and warning systems. Adding mobile devices to a network can create challenges with indicators. Not only do you have to handle incidents or events with an office network, you also have to deal with the mobile devices that are put into the hands of people who might not understand threats. It’s important to find out if an incident actually happened. During the detection phase, you should look for the indicators of compromise. These are signs that tell you an incident has occurred. You can also check information that is publicly available, such as updated vulnerabilities. 

Incident Response: How to Make Cyber Incidents Less Chaotic. 2021.  https://www.g2.com/articles/incident-response

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

GRCA JUNE 1

Please use the same EXCEL sheet that you used to input HOW and WHAT in the blue sections,

ADD the who, where, when, and why in the salmon sections

Submit the sheet with both the blue and salmon sections filled in.

Please create an APA-7-compliant References page with all 3 or 4 references you found. 

(the title page and references page must be one document, with numbered pages 1 and 2)

PLEASE use the resources in your manual pages 19-20 and page 28also attached hereAND the template below. Remember, there are VERY specific rules about capitalization and italics. You have a “ways to get help” document in your content folder. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Security and Interactive Methods

Q1. Read Chapter 9, which identified the advantages and disadvantages of using a cloud-based provider. 

Textbook: Cloud Computing by Dr. Kris Jamsa, 2nd ED

Write a research paper that defends the following statements and provide one real-world example for each statement: 

· A difficult security threat to mitigate is a malicious employee.

· A cloud provider’s data center is still at risk from natural disasters such as floods, fires, and earthquakes.  

The paper should be approximately five pages long, not including the title and reference pages. Please follow APA 7 Guidelines for in-text citations and references. A minimum of two scholarly journal articles (besides textbook) are required.

Q2. Read Chapter 4 in Textbook: Systems Analysis and Design by Kenneth E. Kendall and Julie E Kendall, 10th ED. 

Research a scholarly paper or professional video on “Gathering Requirements” and reflect on the following:

  • “Interactive Methods”: Which of the following is more beneficial: interviewing, questionnaires, sampling, document analysis, observation, or text analytics?

The paper must be between 250-300 words. Provide at least two APA references for your resource and corresponding in-text citations. You must provide the referenced resource URL/DOI in the APA reference. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

GRCA EXCEL new topic

1).What have researchers learned about the relationship between higher education and employment? 

2). Rising costs of information technology

Found 3 or 4 RESEARCH ARTICLES using the method taught in the video in this week’s folder

For this assignment, follow the directions CAREFULLY: 

Step 1: Download the EXCEL document below 

HOW, WHAT, who, when, where, why

Step 2: Fill in ONLY the BLUE portions
(If you have answers for how and what, your article IS a research article; if not, please go back to find one)
Submit the complete form here.

Part 2 

Please use the same EXCEL sheet that you used to input HOW and WHAT in the blue sections,

ADD the who, where, when, and why in the salmon sections

Submit the sheet with both the blue and salmon sections filled in.

Please create an APA-7-compliant References page with all 3 or 4 references you found. 

(the title page and references page must be one document, with numbered pages 1 and 2)

PLEASE use the resources in your manual pages 19-20 and page 28also attached hereAND the template below. Remember, there are VERY specific rules about capitalization and italics. You have a “ways to get help” document in your content folder. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion board

 

  • What are the implications of vehicle hacking for autonomous vehicles? Today’s vehicles have complex computer code and autonomous vehicles will have even more complex code. Do you think we will ever have widespread use of safe autonomous vehicles? Why or why not?
  • One of the suggestions to improve vehicle security is for car manufacturers to release their code open source to allow for public scrutiny. Do you think this would help improve vehicle security? Why or why not? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ITS-630: Organ Leader & Decision Making – Week 4 Research Paper

Reading Resources:

  • LE BA PHONG, LEI HUI, & THAN THANH SON. (2018). How Leadership and Trust in Leaders Foster Employees’ Behavior toward Knowledge Sharing. Social Behavior & Personality: An International Journal, 46(5), 705–720. https://doi.org/10.2224/sbp.6711http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=129468910&site=eds-live&custid=s8501869&groupid=main&profile=eds_new
  • CHANHOO SONG, KWANGSEO RYAN PARK, & SEUNG-WAN KANG. (2015). Servant Leadership and Team Performance: The Mediating Role of Knowledge-Sharing Climate. Social Behavior & Personality: An International Journal, 43(10), 1749–1760. https://doi.org/10.2224/sbp.2015.43.10.1749http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=111059573&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Research Paper:

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization; please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Google Scholar is a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3+ pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

data management

 

Background

In March of 2000, a local mountain-biking club (Mountain-Bikers for Life) was organized for recreational purposes in West Virginia. Through the years the club had many members come and go, but the club continued to grow in popularity. As some members moved to other parts of the country, they began to form their own “Mountain-Bikes for Life” Club. The various clubs would even have events once or twice a year with one another. This sport has become so popular that, The Extreme Mountain Bike Racing League (EMBRL) was birthed.  The headquarter for the EMBRL is in West Virginia, but they have racing locations in Colorado, Maui, New England, Tennessee, Wisconsin, and Minnesota.

You went to college with the Mike “Mountain Man” Miller, who is the founder and CEO of the EMBRL. He has contacted you to see if you would be interested in creating a database application for his newly formed league. You have been doing contract work for an IT consultant form and have recently left to start your own business and this may just be the opportunity that you have been looking for to jumpstart your business.

After jumping at the opportunity, you scheduled a meeting with Mike to discuss his data needs.  After your initial interview with Mike and after having subsequent meetings, Mike has provided you with the Logical Design Criteria listed below.

Logical Design Criteria

The logical and relational requirements for the database that you are designing for the EMBRL are as follows:

  1. The database must keep track of all of the riders who are part of the league. They need to have easy access to their personal address information, contact information, the date they joined the EMBRL and who their agent is.
     
  2. Each rider is part of a given team. Each team consist of 4 riders. We need to keep track of the team name, the riders on that team.
     
  3. Many riders have pushed the limit of their bikes by tinkering with them by adding to and/or taking away from the original design of the bikes.  This often gives some riders an unfair advantage over the other riders. It is important that the database keeps track of the approved mountain bikes, along with their name, description, weight and a picture. Also, it is important to know which bike a rider is using in a given race.
     
  4. Since the potential is there for the riders to now get paid quite a bit of money for winning races and even participating in races or outside engagements, the riders thought it necessary that each of them have their own agent. Often, a single agent will represent one or more riders. We need to know the agent’s name, address information, contact info and which riders they represent.
     
  5. The EMBRL even has corporate sponsors. These sponsors give financial support to the various events (which consist of 1 or more races) and even directly sponsor individual riders. A rider may have 0, 1  or many sponsors and a company may also sponsor 1 or more events.  We need to know the name of the sponsor, address information, contact information, which riders they sponsor (if any) and which events (if any) they sponsor. Also, a given company can very well sponsor riders, or events or both, but they will sponsor at least one of them. You cannot be a sponsor and not sponsor anybody.
     
  6. All advertising is first done at the Event level.  The Events may consist of 1 or more races. The races that make up a given event may be in the same location or different locations or even different levels of rider expertise.  The event information that we need to track is the name of the event, event location, address information, the beginning and ending dates and who the corporate sponsor of that event is.  Again, each Event may consist of one or more races. For example, you may have 4 races spread out over a given weekend that makes up one particular Event.  The race(s) that make up a given event keeps track of information about the location of the particular race, the rider’s level of experience, the date of the race, the distance of the race and the start and ending times of the race in question.
     
  7. Each rider can participate in one or more races. We need to know which riders are riding in which races and what approved bike they are using for that particular race.  Lastly, we will need to keep track which place the rider finished in the respective race that they are riding in. We will track all riders placements at the end of each race.  Each of these places has bearing on which team wins the overall season’s title and prizes will be dispersed accordingly based on which team has the lowest points of the season.
     

 

Deliverables and Grading Rubrics

  1. Entity Relationship Logical Data Model: A visual model which represents each table (entity) and the relationships between the tables.  Refer to the Power Point Presentations that cover “Entity Relationship Diagrams” – on the Canvas Schedule page. This diagram can be completed with MS. Word, Visio, Smartdraw, lucid charts or some other graphics program of your choice. However, copy and paste your diagram back into Word along with the other two deliverables or submit it in a PDF format.
     
  2. Field List: Shows the fields (attributes) for each table (entity) and identify the primary key (by underlining it). Identify any Alternate Keys, Secondary Keys and all Foreign Keys. The field list should include all fields which are found in the problem. We will use the Relational Database Shorthand from the Power Power Point Presentation “Database Design – Using ER Diagrams”   on the Canvas Schedule Page.
     
  3. Technical Summary: The technical summary provides verbal support for the relational data model. The technical summary should answer the question, “Why this logical data design and not some other?”  or “Why are these relationships one-to-many or many-to-many?” This is the portion where you get to talk the database language and explain/support your Entity Relationship Logical Data Model. At Least 1 page 12 pt font double-spaced.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CS 210 Project 3

I need help with this assignment. I am completely lost.  

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Utilize various programming languages to develop secure, efficient code

Scenario

You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality.

The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day:

  1. Produce a list of all items purchased in a given day along with the number of times each item was purchased.
  2. Produce a number representing how many times a specific item was purchased in a given day.
  3. Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased.

As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality.

Directions

One of Python’s strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program.

Grocery Tracking Program
Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work.

As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.

  1. Use C++ to develop a menu display that asks users what they would like to do. Include options for each of the three requirements outlined in the scenario and number them 1, 2, and 3. You should also include an option 4 to exit the program. All of your code needs to effectively validate user input.
  2. Create code to determine the number of times each individual item appears. Here you will be addressing the first requirement from the scenario to produce a list of all items purchased in a given day along with the number of times each item was purchased. Note that each grocery item is represented by a word in the input file. Reference the following to help guide how you can break down the coding work.
    • Write C++ code for when a user selects option 1 from the menu. Select and apply a C++ function to call the appropriate Python function, which will display the number of times each item (or word) appears.
    • Write Python code to calculate the frequency of every word that appears from the input file. It is recommended that you build off the code you have already been given for this work.
    • Use Python to display the final result of items and their corresponding numeric value on the screen.
  3. Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
    1. Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
    2. Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
    3. Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.
  4. Create code to graphically display a data file as a text-based histogram. Here you will be addressing the third requirement from the scenario: to produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. Reference the following to help guide how you can break down the coding work:
    1. Use C++ to validate user input for option 3 in the menu. Then have C++ prompt Python to execute its relevant function.
    2. Write a Python function that reads an input file (CS210_Project_Three_Input_File, which is linked in the Supporting Materials section) and then creates a file, which contains the words and their frequencies. The file that you create should be named frequency.dat, which needs to be specified in your C++ code and in your Python code. Note that you may wish to refer to work you completed in a previous assignment where you practiced reading and writing to a file. Some of your code from that work may be useful to reuse or manipulate here. The frequency.dat file should include every item (represented by a word) paired with the number of times that item appears in the input file. For example, the file might read as follows:
      • Potatoes 4
      • Pumpkins 5
      • Onions 3
    3. Write C++ code to read the frequency.dat file and display a histogram. Loop through the newly created file and read the name and frequency on each row. Then print the name, followed by asterisks or another special character to represent the numeric amount. The number of asterisks should equal the frequency read from the file. For example, if the file includes 4 potatoes, 5 pumpkins, and 3 onions then your text-based histogram may appear as represented below. However, you can alter the appearance or color of the histogram in any way you choose.
      • Potatoes ****
      • Pumpkins *****
      • Onions ***
  5. Apply industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability and maintainability. Remember that you must demonstrate industry standard best practices in all your code to ensure clarity, consistency, and efficiency. This includes the following:
    1. Using input validation and error handling to anticipate, detect, and respond to run-time and user errors (for example, make sure you have option 4 on your menu so users can exit the program)
    2. Inserting in-line comments to denote your changes and briefly describe the functionality of the code
    3. Using appropriate variable, parameter, and other naming conventions throughout your code

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Troubleshooting and Tool Report

 

Select one of the seven network problems and develop a troubleshooting and tool report that details the solution.

  1. On Day 2 of full operational capability (FOC), our connection to the internet was becoming intermittent. We could establish connections to our globally hosted servers some of the time. The connection would drop at seemingly random periods and we don’t know why. We have experienced this day and night, and it has been consistent for the past three days.
  2. When our connection to the internet is working, we seemingly cannot reach out to our globally dispersed servers from our hosts. We use the globally dispersed servers for command and control and must be able to connect to them. We need a method to determine where the packets are going and why they are not reaching their destination. Because these servers are globally distributed, we can’t just pick up and deploy to them.
  3. Our internal network servers are also spotty. Sometimes they are up, and sometimes they are down. For example, the DHCP server appears to provide IP addresses to hosts that are turned on sometimes, but other times when the host is turned on, it receives an Automatic Private IP Address (APIPA). These hosts can communicate with our networked hosts locally, but they can’t reach out to our global servers. These hosts enable our persistent engagement capability, so they must be functional, and we need to determine the problem ASAP!
  4. We have a team that can troubleshoot from afar, but the members are located 25 miles west of this location. We have one of the tech support personnel deployed on site, but there are just too many issues for one person. The support team that is 25 miles west is centrally located to support multiple operational outfits. That team has a virtual private network (VPN) and secure access to our internal servers. At times, support team members need to determine which of our hosts are functioning. We use both Microsoft Windows and Linux operating systems, but we don’t know what tool will help determine host functionality from afar.
  5. This next part is classified, but I need your help, and I need it fast. Bottom line, we believe there may be an insider threat. At times, we have reason to believe a nonapproved device is connecting to the network and reaching out to the internet. We need a method to determine what devices exist on the same subnet of our network. What can help us do that?
  6. When we begin operations in 72 hours, it will be of utmost importance for us to know what device name is associated with what IP address. This will allow us to know what exists internally and what we need to defend should the adversary begin operations against us. We need to understand what options exist to achieve this task.
  7. When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

Your report should be about a page in length and address the following:

  • Choose and restate one of the problems identified as you understand it and explain why it is a problem.
  • Describe how you would apply the steps in the Network+ troubleshooting model to this problem.
  • Name and provide a brief overview of the tool that could solve this problem (refer to Lesson 17 in uCertify).
  • Describe how the tool can be used to solve similar problems in the future.
  • Provide a detailed overview of the tool’s functionality and options.
  • Include a screenshot of your selected tool from the appropriate uCertify lab.

The SITREP (Situation Report) Sample Report is provided so that you can understand what Cyber Command is expecting in your report. Your report will vary depending on the problem and tool selected.

How Will My Work Be Evaluated?

Troubleshooting refers to the process of identifying problems with a network through a rigorous and repeatable process and then solving those problems using testable methods. An important part of your duties in the networking field will be to troubleshoot and solve problems. In fact, most of your time will be spent with this focus to include optimizing performance. Networks are dynamic in implementation and are built to be resilient, but problems arise due to many unforeseen reasons. Developing the knowledge, skills, and experience to successfully troubleshoot and recommend solutions will show you are value-added to the organization.

For this assignment, you are asked to review a scenario, understand the problems, apply your knowledge and skills gained in this class, and propose a solution. Use the template provided and complete the assignment. An example solution is provided for you.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
  • 1.3.5: Adhere to required attribution and citation standards.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 13.1.1: Create documentation appropriate to the stakeholder.

If you haven’t already done so last week, download the Troubleshooting and Tools Report Template and use it to record your work.

When you are finished, delete the instructional text from the template before you submit. Click “add a file” to upload your work, then click the Submit button.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now