Discussion and Assignment – Security Architecture and Design.

1) Discussion:

 Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it? 

   Requirements:

  1. APA Format
  2. 2 References
  3. 400 Words Minimum

2)  Assignment:

Attached Document with Requirements. (Need Conclusion too.)

Let me know if you have any questions.

Text Book:

  

Schoenfield, Brook S.E. – Securing Systems: Applied Security Architecture and Threat Models, CRC Press,  2014 ISBN: 978-1-4822-3397-1

3) Discussion (Emerging Threats and CounterMeasures) 

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

Requirements:

APA Format

2 References

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data Classification and Handling Policies and Risk Management Policies

 

Data sustains an organizations business processes and enables it to deliver products and services.  Stop the flow of data and for many companies, business comes quickly to a halt.  Data drives the economy, and if the loss of data lasts long enough, the viability of an organization to survive may come into question.

1. What is the relationship between QA/QC and risk management?

2. What is the significant difference between quality assurance & quality control?

3. Why are policies needed to govern data both in transit and at rest (not being used – accessed)?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need Help with an Exam on Current and Emerging Technologies

    

This option provides the less engaged student with the opportunity and challenges of creating a proper Q/A sequence derived from the specific domain under study. If selected, this option will also allow entries to be added to the question pool in subsequent terms. If proper format is followed, insertion into the question pool can easily be accommodated by the Learning House folks.

Option 2 is a Question / Answer Bank 

This option asks the student to thoroughly review the assigned course materials (xx chapters of the assigned textbook, PPTs, and Discussion Forums). If this option is selected, the student is to create a final exam derived from the materials previously under study and as specifically outlined below. Questions posted in the textbook, textbook website, or derived from Chegg or related websites will result in a final grade of zero for the Final Exam. The question / answers must be in the student’s own words as each submission should be checked for plagiarism by Turnitin. 

Create at least 5 questions per assigned textbook chapters (xx). The total number of questions / answers is 70. Four Q/A and one Essay for each Chapter. The Q/A may only be in the following formats: 1) Multiple Choice “MC”; 2) Fill-in “FI”; 3) Multiple Answers “MA”. Highlight the correct answer as indicated below.

1. Questions must identify the Chapter “Ch” and page number “P” (if derived from the assigned textbook(s)), or Slide number “S” indicating where the Q/A sequence was derived. Please note the highlighting of the correct answer.

2.  

The format of the question/answer are as follows:

o Sample MC

1. Ch1 P11 – Software Engineering includes:

a. Functional Requirements Gathering 

b. Non-Functional Requirements Gathering

c. Both Functional and Non-Functional Requirements Gathering 

d. None of the above

o Sample MC

2. Ch1 S14 – Software Engineering does not include:

a. Functional Requirements Gathering 

b. Non-Functional Requirements Gathering

c. GUI

d. None of the above

o Sample FI

1. Ch1 P24 – ______ testing dictates the Q/A person has access to the source code:

a. White-Box

o Sample MA

1. Ch1 P12 – Software Engineering includes the following:

a. Requirements

b. Project Management

c. Configuration Management

d. Server Administration

e. Engineering Economics

f. Network Administration

2. Additionally, create one Essay question and suggested answer derived from the assigned course materials

o Sample Essay 

1. Ch1 P15 – Identify each of the dimensions of Software Engineering:

This first chapter begins with a 10,000 foot view of software engineering knowledge areas. Specifically: Requirements, Design, Construction, Testing, Maintenance, Configuration Management, Engineering Management, Engineering Process, Engineering Models and Methods, Quality, Engineering Professional Practice, and Engineering Economics 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Identifying and Interpreting Descriptive Statistics

 

Examine the survey results downloadable from the link below. Choose one of the items, determine the descriptive statistic that is reported, and indicate what it means. For example, “What is the highest level of education of this group?” (Please do not repeat the same topic as your classmates.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Rubik’s Cube Simulator using JAVA

  

Rubik’s Cube Simulator

In this project, you will be creating a Rubik’s Cube simulator. 

Setup

Before beginning the lab you will need to do the following things:

1. Create a folder within your class folder and name it Rubik. All of your files for this project must be saved in this CIS36A/Rubik directory.

2. Download the following files into your CIS36A/Rubik directory:

o RubikRunner.java Download RubikRunner.java

o RubikCube.java Download RubikCube.java

o RubikFace.java Download RubikFace.java 

3. Always compile and run RubikRunner.java class. It will automatically compile the other supporting classes. 

Submission

Submit all of your final source files

Submit sample console runs for all of the parts below. 

Part 1 – Create a Cube

You will be given the main program class (RubikRunner). You will not need to change RubikRunner.

You will also be given the skeleton to the Rubik’s Cube class (RubikCube) and a placeholder class describing the face of a Rubik’s Cube (RubikFace).  You will not have to change RubikFace.

Your assignment is to:

1) Implement the RubikCube constructor.  The constructor takes no arguments and creates and populates an array of RubikFace objects.  Each RubikFace should have its own color (ex: full color name: “White”).

2) Implement the toString() method of RubikCube.  The output of the method should be the net of the cube, with the front face in the center, as shown below.

Sample Run

    W
B O G
   Y
   R

 

Colors:

W: White

O: Orange

B: Blue

Y: Yellow

R: Red

You must use the faces array in your toString method to receive full credit.

Part 2 – Rotate the entire Cube

In this part, you will write code to rotate the cube.  You will need to implement a loop asking the user what direction to rotate in RubikRunner, and implement left(), right(), up() and down() methods in RubikCube that will rotate the cube in the given direction.  For example, if the cube looks like:

    W
B O G
   Y
   R

and you rotated left, the cube would now look like:

     W
O G R
    Y
    B

Your assignment is to:

1) RubikCube.java – Implement the 4 commands as void methods – left(), right(), up(), down()

2) RubikRunner.java – add a command loop that asks the user for which direction to turn the cube, including the option to exit the program.  After each turn is executed, print out the cube.

3) RubikFace.java – still nothing to do on this one, yet.

Sample Run

    W
B O G
   Y
  R
 

What direction? q to quit
What direction [right, left, up, down]: left
    W
O G R
   Y
   B
 

What direction? q to quit
What direction [right, left, up, down]: right
   W
B O G
   Y
   R
 

What direction? q to quit
What direction [right, left, up, down]: up
   O
B Y G
   R
   W
 

What direction? q to quit

 What direction [right, left, up, down]: down

   W
B O G
   Y
   R
 

What direction? q to quit
What direction [right, left, up, down]: q

 Part 3 – Nine-facet version of each face

In this part, you will be working mostly with the RubikFace class.  

Your assignment is to:

1) RubikFace – Add a 3×3 array to RubikFace that will hold the colors for each of the 9 facets on the face.  For now, set each of the facets to be the same color as the face.  You will also have to modify the toString method to return a 3×3 grid of colors.  If, for example, the color of the face was Red, your toString method should return:

 R R R
R R R
R R R

2) Update any methods in RubikRunner or RubikCube that require updating as a result of this change.

Starting with this activity, you need to comment on your code. 

Sample Run

       W W W
      W W W
      W W W
B B B O O O G G G
B B B O O O G G G
B B B O O O G G G
      Y Y Y
      Y Y Y
      Y Y Y
      R R R
      R R R
      R R R
 

What direction? q to quit
What direction [right, left, up, down]: left
      W W W
      W W W
      W W W
O O O G G G R R R
O O O G G G R R R
O O O G G G R R R
      Y Y Y
      Y Y Y
      Y Y Y
      B B B
      B B B
      B B B
 

What direction? q to quit
What direction [right, left, up, down]: up
      G G G
      G G G
      G G G
O O O Y Y Y R R R
O O O Y Y Y R R R
O O O Y Y Y R R R
      B B B
      B B B
      B B B
      W W W
      W W W
      W W W
 

What direction? q to quit
What direction [right, left, up, down]: down

      W W W
      W W W
      W W W
O O O G G G R R R
O O O G G G R R R
O O O G G G R R R
      Y Y Y
      Y Y Y
      Y Y Y
      B B B
      B B B
      B B B
 

What direction? q to quit
What direction [right, left, up, down]: right
      W W W
      W W W
      W W W
B B B O O O G G G
B B B O O O G G G
B B B O O O G G G
      Y Y Y
      Y Y Y
      Y Y Y
      R R R
      R R R
      R R R

 Part 4 – Shuffled Cube

In this part, you will write the first step of code to rotate one face of the Rubik’s Cube.  When you rotate an actual Rubik’s Cube, the front rows on the sides move with the face you’re rotating – we’re not doing that.  yet …

You will be working mostly with RubikFace in this exercise. 

Your assignment is to:

1) Modify the constructor for RubikFace. RubikFace will need to have randomly generated colors in each of the cells, except the center cell which will remain the color that is passed through to the constructor.

2) Modify RubikRunner to accept 2 new commands: cw (for clockwise) and ccw (for counter clockwise).  Each of those commands will call the corresponding new RubikCube methods that you will create.  Those new RubikCube methods (ccw() and cw()) will call the corresponding new methods in RubikFace. Note that the rotated face is always the front face (face 2).

The RubikFace methods will rotate the face 90 degrees in the indicated direction.

Note: if you did not get your faces to print out correctly in Part 3, substitute printing just the front face in your toString for RubikCube.

Sample Run

        G Y Y
      G W W
      Y O B
Y W R G Y R B W O
B B Y R O G G G G
R W B R B W G B R
      B O R
      O Y Y
      Y O R
      W W R
      B R B
      Y B O
 

What direction? q to quit
What direction [right, left, up, down]: cw
      G Y Y
      G W W
      Y O B
Y W R R R G B W O
B B Y B O Y G G G
R W B W G R G B R
      B O R
      O Y Y
      Y O R
      W W R
      B R B
      Y B O
 

What direction? q to quit
What direction [right, left, up, down]: cw  
      G Y Y
      G W W
      Y O B
Y W R W B R B W O
B B Y G O R G G G
R W B R Y G G B R
      B O R
      O Y Y
      Y O R
      W W R
      B R B
      Y B O
 

What direction? q to quit
What direction [right, left, up, down]: ccw
      G Y Y
      G W W
      Y O B
Y W R R R G B W O
B B Y B O Y G G G
R W B W G R G B R
      B O R
      O Y Y
      Y O R
      W W R
      B R B
      Y B O

Part 5

Finally – your simulator will be complete! This assignment will complete the ability to fully rotate your cube.

The basic methods you need for this are in place – the cw() and ccw() in RubikCube. You will need to modify cw() and ccw() in RubikCube to rotate the matching columns or rows of the top, left, right and bottom faces when the front face is rotated. You may need to create other methods in either RubikCube or RubikFace to support your efforts.

Sample Run

        Y G G
      G W B
      O B R
G Y Y B W W B W R
G B W R O R W G G
G B B G R O W G B
      G W W
      G Y B
      B G B
      O B O
      B R O
      W R G
 

What direction? q to quit
What direction [right, left, up, down]: cw
      Y G G
      G W B
      B W Y
G Y G G R B O W R
G B W R O W B G G
G B W O R W R G B
      W W B
      G Y B
      B G B
      O B O
      B R O
      W R G
 

What direction? q to quit
What direction [right, left, up, down]: ccw
      Y G G
      G W B
      O B R
G Y Y B W W B W R
G B W R O R W G G
G B B G R O W G B
      G W W
      G Y B
      B G B
      O B O
      B R O
      W R G

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 8- Executing the project

Simulation Experiental Exercise – SEE-3

Purpose
To prepare a project audit report. {Using the Simulation Project Team}

Instructions
Use the project team in the simulation to complete this exercise. Using the guidelines in the attached document, prepare a project audit report. Be sure to include project classification, analysis of information gathered, recommendations, and lessons learned. You may also include an appendix of appropriate documentation.

Deliverable
Final project report discussing all phases of the project.

NOTE:  The “Project Audit Report” should be submitted as a MS Word document in APA 7 Format

This section of the simulation provides the current standings of all of the Player Teams. The standings are listed from first to last place. Scoring is presented, not on an absolute value basis, but on a percentile basis. After the simulation calculates the score of each Team, the Team in first place is assigned a score of 100%. The Team in last place is assigned a score of 0%. Scores for all other Teams are prorated.

Scoring is displayed for the four categories of Time, Cost, Functionality, and Stakeholder Satisfaction. Additionally, the Overall standing for each Team is displayed.

The weighted percentage for each scoring category (Time, Cost, Functionality, and Stakeholder Satisfaction), as defined by the Instructor when the scenario was created, is also displayed. Players may access this screen at any Time after they have registered and have been assigned to a Team. During Configuration and Pre-Play, all Teams are displayed with scores of 100%. Once Period Play begins and the Instructor has processed for the first period, percentile rankings are displayed. All Player Teams are able to view this summary of scoring. However, Teams are only able to access the details of their own Team scoring. (SEE ATTACHED PDF) (MY TEAM IS T4- TEAM/ GROUP 4)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lab 1

 

Complete the Practice Lab titled “Inventory Assets on Network and Identify Vulnerabilities.”

Capture screenshots and place in a Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 1- to 2-page response at the end of your Microsoft® Word document: 

  • Write a brief description of a vulnerability found in the scan, including the operating system on which it was found, its risk factor, and its CVSS scores.
  • Are the results of default scans different than the credentialed scan? 
  • Why might that be? 
  • What types of vulnerabilities might an attacker without any credentials be able to identify and exploit?
  • This was a simple three computer LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be with regard to vulnerability management in the cloud?

Submit your assignment using the Assignment Files tab.

 Please use the following link to launch the content: External Content Launch 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 3

This chapter’s opening scenario illustrates a specific type of incident/disaster. Using a Web browser, search for information related to preparing an organization against terrorist attacks. Look up information on (a) anthrax or another biological attack (like smallpox), (b) sarin or another toxic gas, (c) low-level radiological contamination attacks.
2. Using a Web browser, search for available commercial applications that use various forms of RAID technologies, such as RAID 0 through RAID 5. What is the most common implementation? What is the most expensive?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write at least 300-400 words fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.

 

Write at least 500 words fractional ownership and it’s relation to cloud computing. Use at lesat one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

System Restoration Procedure Guide

Scenario

One of the security improvements at Always Fresh is setting up a system recovery procedure for each

type of computer. These procedures will guide administrators in recovering a failed computer to a

condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.

You have already implemented the following backup strategies for workstation computers:

▪ All desktop workstations were originally installed from a single image for Always Fresh standard

workstations. The base image is updated with all patches and new software installed on live

workstations.

▪ Desktop workstation computers execute a cloud backup every night at 1:00 a.m.

Consider the following for a computer that encounters a disk drive failure or some other error that requires

restoration:

1. How much data has been modified between the last backup and the time of failure?

2. What images are necessary to recover the workstation?

3. What are the steps necessary to fix the problem that cause the data loss?

4. What steps should Always Fresh take to avoid a reoccurrence of this issue in the future?

Tasks

Create a procedure guide that describes the necessary steps for recovering a desktop workstation

computer. Fill in details for each of the following steps:

1. Describe the processes of:

a. Fixing the problem that caused the failure in the first place. Keep the description of this

process general. Just address the problem and ensure the recovery process starts with a

functional computer.

b. Restoring the newly repaired computer to a base workstation.

c. Restoring local data for the specific workstation that failed.

2. Provide the steps to follow for each of the restore operations. Assume you will be using the

Windows Backup and Restore utility.

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 2 to 4 pages

Self-Assessment Checklist

▪ I created a procedure guide that provides clear instructions that anyone with a basic technical

knowledge base can follow.

▪ I created a well-developed and formatted procedure guide with proper grammar, spelling, and

punctuation.

▪ I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now