week 10 AM

INSTRUCTIONS!!

 Share some of your ideas and reflections from your reflective journal with your colleagues. You may wish to reflect on the goals you set for yourself at the beginning of the term. Did you meet them? It is not necessary to share the entire journal. Do not share any reflections that you wish to remain private. 

IN THE FILE BELOW YOU WILL FIND!!

WEEK 2 and WEEK 7  Discussion questions, you can come up with some goals that were set to help me reach the things that were described in these entries

Below was a statement that i made in my journal that I had to compose for the most valuable learning experience i learned from week 2 &7 assignment this can be utilized

week 2 Information that my peers noted in their discussion questions regarding how monitoring and managing projects are important.

week 7 This can hinder anyone not just individuals in higer ranked roles, I state this because individuals sometimes assume only people in higher power have to deal with this.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science week 10 assignment JA

 Instructions!!

WEEK 10 TEMPLATE IS IN THE FILE THAT IS HOW THE PAPER SHOULD BE SET UP!1

Week 4 assignment along with Week 8 assignment are in the file they are needed to complete the work!!

  • Present the research topic you identified in the Week 4 assignment.
  • Identify the first selected methodological approach you identified in the Week 8 assignment, as well as the research question that aligns with that approach.
    • Present a 2–3-paragraph rationale that describes the purpose of the research.
    • Describe in 2–3 paragraphs how data would be collected and analyzed using this approach.
    • Include potential ethical issues as well.
  • Identify the second methodological approach you identified in the Week 8 assignment, as well as the research question that aligns with that approach.
    • Present a 2–3 paragraph rationale that describes the purpose of the research.
    • Describe in 2–3 paragraphs how data would be collected and analyzed using this approach.
    • Include potential ethical issues as well.
  • Support your assignment with appropriate academic sources and include both citations and references in current APA format. Use 5–7 scholarly resources published with the past three years by recognized academic sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber security questions

1. Calculate the timing of password-guessing attacks:

(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?

(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?

(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password.

  2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.

• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)

• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)

• access control matrix

• capability

3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.

4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections?

  5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

  6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.

  7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver.

  8. Humans are said to be the weakest link in any security system. Give an example for each of the following:

(a) a situation in which human failure could lead to a compromise of encrypted data

(b) a situation in which human failure could lead to a compromise of identification and authentication

(c) a situation in which human failure could lead to a compromise of access control.

 9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value? 

10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 3 – Apply: Case Study: Appliance Warehouse – Application Design

  

Assignment Content

  1.     Continue your work to support the development and implementation of the new Service Department for Appliance Warehouse.

    For this week’s assignment, be sure to refer to Appliance Warehouse Resources: Survey results, Pre-packaged software features, as well as, chapter 7 Development Strategies, and chapter 8 User Interface Design.

    Directions
    In MindTap, review the Appliance Warehouse Case, and do the following:

    • Read the Before You Begin Message and the Module 8-10 Appliance Warehouse Webmail Client Emails. Read the messages to help determine the tasks you must complete.
    • Review and analyze the weekly Appliance Warehouse case study content and resources.
    • Create an 8- to 10-slide presentation with speaker notes (to submit in Blackboard) for senior management with the following:
    • Service Department Software Design: To build a logical model for the new information system, a system analyst must decide on whether to use a SaaS or use an in-house customized software. For this section, ensure you:
    • Research service-based business applications that allow for appointment setting and service provider scheduling.
    • Prepare a list of 4 pros and 4 cons for each of the following:
    • SaaS
    • An in-house customized software
    • Recommend SaaS or in-house software and state your reasoning.
    • Software Requirements: Identify 7-10 requirements the software must do to support the Services Department.
    • Develop a Communication Plan: Explain how stakeholders and managers will be kept informed regarding project process. Your plan should include the form of communication (status reports,meetings, etc.), frequency, and specific project milestones that will aid in determining where the implementation stands.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SDM Wk3

Chapter 5: Strategies in Action
Chapter 6: Strategy Analysis and Choice

Q1.  Reflect on what you have read in the textbook from chapter 5 and 6 and then type a one and half page paper concerning the topics that you believed where worth your reading and understanding.  What was the most valuable thing that you learned and why? 

Q2. Go to the end of Chapter 5 and do Exercise 5B “Should Coca-Cola, Build, Borrow, or Buy in2020 -2021?” Steps 1, 2, and 3  (one and half page assignment).  (When accessing Coca-Cola’s website, you’ll have to click on “Press Center,”.)  

Q3. Then go to the end of Chapter 6 and do Exercise 6A “Perform a SWOT Analysis for Coca-Cola” as an individual, one page assignment. 

Textbook attached.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DS Wk3

2 pages or 550 words

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Pass A Value To A Function That Makes A Decision

 

Instructions

You will write a flowchart, and C code for a program that does the following:

  1. Within main(), it asks for the user’s annual income.
  2. Within main(), it calls a function called printIt() and passes the income value to printIt().  
  3. The printIt() function evaluates the income, and if the number is  over 90000, prints a congratulatory message.  If the income is not over  90000, it prints a message of encouragement, like “You WILL make  $50,000, if you keep going.”

Here is what the output looks like.

Submission Instructions

Upload your Flowgorithm file, your .c file, and a screenshot of your code output saved in a Word document 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Physical asset controls vary depending on where they reside. Research physical asset controls in the space, maritime (oceans, seas, bays, estuaries, islands, and coastal areas), and physical domains.

 Discuss how we rely on physical security controls around our data centers to make sure our equipment, and more importantly, our data is not stolen the old fashion way. We’ve all had at least some exposure to physical security be it at a bank, airport or even a store. What do you think are some important physical security controls and practices we can put on our data centers and in your experience or opinion, where do you think companies mess this up (stories welcome if you’ve seen a physical security failure)? 

175 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber Questions

  

Question 1 see attachment

Question 2: List the different WiFi frequency bands and their associated names/standards. Explain how to increase WiFi coverage using different technologies and what security solutions exist to ensure confidentiality.

Question 3: Your operator has delivered you a binary software image, viewed with a hex editor, coming from a CPU you are not familiar with. She states that it was from a RISC 32-bit architecture that is commonly used in many devices. What steps would you take to identify the image? Be as specific as possible. What follow on questions would you ask to facilitate your analysis?

Question 4: see attachment

Question 5: Given the following bash script, explain what the script is doing (Hint: This is on a linux machine)

(for addr in {1..254};

do for port in {20..23} 80; 

do 

nc -nvzw 1 10.25.0.$addr $port 2>&1; 

done& 

done) | grep ‘open’

Question 6: Given the network 192.168.2.0/23, an IT department needs three variable-length subnets. For the first subnets, the IT department needs 100, 75, 32 hosts, respectively. Based on the information given, compute the variable-length subnets needed to satisfy the IT department’s needs. 

Hosts Needed  | Hosts Given | Network ID | SN Mask | 1st Available IP | Last  Available IP | Broadcast IP

Question 7: Describe a corporate network infrastructure design with which you’re familiar and define the critical areas that need to be secured. What vulnerabilities exist and what are methods for mitigation? Prioritize what needs to be secured and what the potential impacts would be if not secured properly.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Linux Implementation Proposal: Migration Proposal Presentation

Instructions

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux. The company is specifically interested in seeing the following information:

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Which would Go2Linux recommend, and why?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.
  • What steps will be required to migrate the systems from Windows to Linux?
  • What tools are available on Linux for the servers to provide file sharing, web servers, and email servers?

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation. For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; inclusion of at least one image that supports the content and adds value to the proposal is required. You must cite at least two quality sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now