Unit 1 Discussion: SaaS, PaaS, IaaS, and IDaaS Working Together

SO I NEED A TOTAL 1 POST AND 2 REPLY POST I HAVE SENT THE 2 POST I HAVE TO REPLY TO AND THE INSTRUCTIONS OF THE POST I MUST CREATE.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussions and Assignment

Please read instructions:

1) Discussion  (Security Architecture and Design)

 If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface? 

400 Words – 2 References – APA Format.

2) Assignment (Security Architecture and Design)

    PFA – for assignment requirement

600 Words – 2 References – APA Format – Must include Conclusion

3) Discussion (Emerging threats and Countermeasures)

 

This chapter discusses the relevance of diversity strategy while securing any set of national assets. Diversity in national infrastructure involves the introduction of intentional differences into systems such as vendor source, deployment approach, network connectivity, targeted standards, programming language, operating system, and software version. Two systems are considered diverse if their key attributes differ, and nondiverse otherwise. The requirement for physical diversity in the design of computing infrastructure is perhaps the most familiar of all diversity-related issues. The idea is that any computing or networking asset that serves as an essential component of some critical function must include physical distribution to increase its survivability. A national diversity program should be developed that would call for coordination between companies and governmental agencies in several

Start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats. 

For additional information click the link below:

https://www.resdal.org/Archivo/usa-home-prote.htm

You must do this following:

1) Create a new thread. As indicated above, discuss how the types of threats discussed in the article referenced above could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats.

TextBook:  Amoroso, E. G. (2012). Cyber-attacks: protecting national infrastructure. Elsevier. 

Let me know if you have any questions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

answer jobs vs Cook case

 

ASSIGNMENT: From Chapter 2, page 59; answer Jobs vs. Cook case.

Steve Jobs was a strong, charismatic leader who cofounded Apple and is credited with much of the success of the company. Some believe that Tim Cook, who became CEO in 2011, embraces a more collaborative leadership style. Do research to compare and contrast the leadership styles of the two CEOs. (You may wish to view the 2013 movie JOBS, which portrays the story of Steve Jobs’ ascension from college dropout to Apple CEO.) Which CEO—Jobs or Cook—do you think developed and executed the most effective strategic plan? What evidence can you find to support your opinion?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Sommers, C. F., & Sommers, F. (2013). Vice and virtue in everyday life (9th ed.). Boston, MA: Wadsworth Publishing, Cengage Learning.

 

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 2: Applying Philosophy to Life

Due Week 9 and worth 250 points

Assume that you are interviewing for a position as chair of a newly established ethics oversight committee for one of the following:

  1. Investment firm that offers advice and products to public retirement funds
  2. Hospital
  3. Private university
  4. State legislative body

Analyze three (3) philosophies addressed in the textbook (Chapters 1-7) that you believe should guide decisions. Analyze one (1) philosophy that you believe would be extremely detrimental for the organization to use in making decisions.

Write a four to five (4-5) page paper in which you:

  1. Provide a rationale for selecting this organization, explaining at least two (2) reasons the organization needs ethics oversight.
  2. Analyze the first philosophy, (Chapters 1-7), discussing its proponents and two (2) major principles of the philosophy and how they apply to decisions that will need to be made. 
  3. Analyze the second philosophy, (Chapters 1-7), discussing its proponents and two (2) major principles of the philosophy and how they apply to decisions that will need to be made. 
  4. Analyze the third philosophy, (Chapters 1-7), discussing its proponents and two (2) major principles of the philosophy and how they apply to decisions that will need to be made. 
  5. Analyze a philosophy that would be detrimental, (Chapters 1-7), discussing its proponents and two (2) major principles of the philosophy and how they would be detrimental to decisions that will need to be made. 
  6. Provide at least five (5) credible, external academic references (at least one (1) source for each criterion) to support your view about the need for and use of these philosophies to make ethical decisions for the organization. (Do not use such open sources as Wikipedia, About, Ask.)

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the views of the main philosophers and the primary ethical concepts associated with each of the major ethical theories presented in the course.
  • Recognize basic ethical theories, such as Divine Command Theory, Relativism, Utilitarianism, Kantianism, Social Contract Theory, Egoism, and Virtue Ethics.
  • Demonstrate an understanding of how to examine questions and issues from diverse ethical perspectives and how these different ethical perspectives can be applied to evaluate contemporary ethical dilemmas.
  • Demonstrate recognition of the role and function of moral arguments addressing traditional and contemporary moral issues.
  • Apply ethical reasoning to resolve selected important moral problems in everyday situations.
  • Present complex ethical ideas, theories, and perspectives fairly, objectively, and critically.
  • Use technology and information resources to research issues in ethics.
  • Write clearly and concisely about ethics using proper writing mechanics.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 1 Page

 In chapter 3, the author describes eight core functions of the global financial service sector which blockchain technology will likely change. Create a new thread, choose one of the core functions described in chapter 3, and explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1, 2, or 3. You’re not trying to test each other, but you are trying to start a discussion. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

simulate a Three-State process model (ready, running and blocked) and a simple process control block structure as dis- cussed in Chapter 3. Your program will read input and directives from a le. The input describes a time sequence of events that occur.

CSci 430 Spring 2019

Objectives:

ˆ Explore the Process state models from an implementation point of

view.

ˆ Practice using basic queue data types and implementing in C.

ˆ Use C/C++ data structures to implement a process control block and

round robin scheduling queues.

ˆ Learn about Process switching and multiprogramming concepts.

Description:

In this assignment you will simulate a Three-State process model (ready,

running and blocked) and a simple process control block structure as dis-

cussed in Chapter 3. Your program will read input and directives from a

le. The input describes a time sequence of events that occur. These are the

full set of events you will simulate:

1

Event Description

cpu The processor executes for 1 time step the currently running process

new A new process is created and put at tail of the ready queue

done The currently running process has nished

wait X The currently running process has done an I/O operation and

is waiting on event X

event X Event X has occurred, the process waiting on that event should

be made ready.

The input le will simply be a list of events that occur in the system, in

the order they are to occur. For example:

—– simulation-01.sim ——–

new

cpu

cpu

cpu

new

cpu

cpu

cpu

cpu

wait 1

cpu

cpu

event 1

cpu

cpu

done

cpu

cpu

cpu

cpu

exit

———————————-

Your task is to read in the events, and simulate the creation and execution

of processes in the system as they move through the various three-states of

their process life cycle. You need to:

2

ˆ Dene a simple process control block (PCB) to hold information about

all processes currently running in your system. The PCB can be a

simple C struct or a C++ class. At a minimum you need to have a

eld for the process identier and the process state (Ready, Running or

Blocked). You need to also keep track of the time step that the process

entered the system, and the number of steps the process has been

running. Minimal credit will be given to programs that at least handle

new events and create a process in a simulated PCB. You probably

need a list or an array to hold the current processes that have been

created and are being managed by your simulated system.

ˆ You will need a ready queue of some kind. You should use a C++

Standard Template Library (STL) container to manage your ready

queue.

ˆ You will need to implement a simple dispatcher function. Whenever

a cpu event occurs, and no process is currently running, you should

select the next Ready process from the head of your ready queue and

start it running on the processor.

ˆ You need to also implement a simple time slicing mechanism. The

time slice value to use will be passed into your program when it is

started. At the end of a cpu cycle, you should check if the currently

running process has executed for its full time quantum. In that case,

the currently running process should timeout, and be returned to the

end of the Ready queue.

ˆ new events should cause a new process to be created (including creating

its PCB and lling it in). New processes should be placed on the tail

of the ready queue after being created. You should assign each new

process a process identier. The process identier should be a simple

integer value, and you should start numbering processes from 1.

ˆ For a done event, if a process is currently running it should then be

released. It should be removed from the CPU, and not placed back on

the ready or blocked queue. If a done occurs when the CPU is idle,

then nothing will happen as a result of this event.

ˆ A wait event simulates the currently running process performing some

I/O operation. If a wait occurs, the currently running process should

become blocked and put on the blocked queue. You also need an entry

in the PCB so you know what event the process is waiting for. The

3

wait event is followed by an integer number, which is an indication of

the type of event the process has requested.

ˆ Likewise the event directive simulates the nishing of some I/O oper-

ation. When an event occurs, you should scan your blocked processes

and make any process ready that was waiting on that event. The in-

teger value following an event indicates the type of event that just

occurred.

You have been given some example event sequences (simulation-01.sim,

simulation-02.sim, etc.) along with the expected output for those sequence

of events (simulation-01.res, simulation-02.res, etc.). The output of your

program should be sent to standard output. The correct output for the

simulation-01.sim simulation is:

Time: 1

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 2

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 3

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=3,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 4

CPU (currently running):

4

pid=1, state=RUNNING, start=1, slice=4,

Ready Queue:

pid=2, state=READY, start=4, slice=0,

Blocked Queue:

EMPTY

Time: 5

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=5,

Ready Queue:

pid=2, state=READY, start=4, slice=0,

Blocked Queue:

EMPTY

Time: 6

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=1,

Ready Queue:

pid=1, state=READY, start=1, slice=5,

Blocked Queue:

EMPTY

Time: 7

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=2,

Ready Queue:

pid=1, state=READY, start=1, slice=5,

Blocked Queue:

EMPTY

Time: 8

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

pid=2, state=BLOCKED, start=4, slice=2, event=1

Time: 9

CPU (currently running):

5

pid=1, state=RUNNING, start=1, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

pid=2, state=BLOCKED, start=4, slice=2, event=1

Time: 10

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=3,

Ready Queue:

pid=2, state=READY, start=4, slice=2,

Blocked Queue:

EMPTY

Time: 11

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=4,

Ready Queue:

pid=2, state=READY, start=4, slice=2,

Blocked Queue:

EMPTY

Time: 12

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 13

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 14

CPU (currently running):

6

pid=2, state=RUNNING, start=4, slice=3,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 15

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=4,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Your output to standard out should look exactly the same as this output

(i.e. if I do a di and your program is generating the correct output, then

there will be no dierence between the output your program generates and

the above output format). The output is generated by displaying the system

state after each cpu cycle executes. Basically we print out the system time.

Then we show which process (if any) is currently running on the CPU (or

say it is IDLE if no process is running). Then we display the queue of

processes currently on the Ready and Blocked queues. Note that the queues

are displayed in order. The top of the output corresponds to the head of the

queue. Thus when a new process is dispatched, the next one selected should

be the rst process listed from the ready queue in the previous system cycle.

I have given you some template code (p2-start.cpp) to get you started

The code is meant to be run from the command line, thus from a shell or

dos prompt you would do something like:

$ p2-start simulation-01.sim 5

i.e. the program expects two parameters on the command line, which

should be the name of a le that holds the events to be simulated, and the

value to be used for the time slice quantum. If you need to test your program

and can’t gure out how to invoke running it from the command line, you

can change the line in ‘p2-start.cpp’ to explicitly run a particular simulation

le, like this:

runSimulation(“simulation-01.sim”, time_slice_quantum)

7

However, you need to make sure that your program correctly works using

the command line invocation, as shown in `p2-start.cpp`.

I have given some template code to get you started in the le called

p2-start.cpp. I have already provided you with the code needed in order to

correctly parse the command line parameters for the program, and to open

and read in the simulation le events. Your job is to implement the necessary

actions and data structures to handle the simulated events described. The

runSimulation() in ‘p2-start.cpp holds example code and indicates locations

where you need to write your own functions to implement the simulation.

You can use this as a starting point to implement your solution.

Assignment Submission and Requirements

All source les you create for you solution (.c or .cpp/.c++ and .h header

les) should be uploaded to the MyLeo Online submission folder created for

this assignment by the deadline. You should not attach any les besides the

source les containing your C/C++ code. But you should make sure you

attach all needed les you create to your submission, so that I can compile

and run your solution.

You are required to write the program in standard C/C++ programming

language. You should use a relatively recent version of the C/C++ compiler

(C90 C++98 is ne, or the more recent C99 C++11 will also be acceptable),

and/or recent IDE that has an up to date compiler. You should only use

standard C/C++ libraries, do not use Microsoft specic or other third-party

developed external libraries. This page http://en.cppreference.com/w/

provides a good up to date reference of the libraries in the standard C++ and

C languages. You may use the C++ standard template library containers

(like the list and queue items) to implement the ready queue you need. We

will go over a simple implementation of a queue using pointers and/or arrays

in class, if you would like an example implementation in plain C that might

be simpler to use than learning the STL.

8

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Operating System Project 2

Developing a Linux-like command shell with C/C++ language

 your implementation of the “builtin commands”:
a. cd <directory> – Change the current default directory to
<directory>. If the <directory> argument is not present, report the current directory. If the directory does not exist an appropriate error should be reported. This command should also change the PWD environment variable.
b. clr – Clear the screen.
c. dir <directory> – List the contents of directory <directory>.
d. environ – List all the environment strings.
e. echo <comment> – Display <comment> on the display followed by a new line (multiple spaces/tabs may be reduced to a single space).
f. help – Display the user manual using the more filter.
g. pause – Pause operation of the shell until ‘Enter’ is pressed.
h. quit – Quit the shell.
i. The shell environment should contain shell=<pathname>/myshell where <pathname>/myshell is the full path for the shell executable(not a hardwired path back to your directory, but the one from which it was executed). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ncr responses – w6

 Please find the attached document and write down the response for each article in 150 words. There are 4 articles in the attachment.

Needs to write 150 words, APA format, no plagarism, provide references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

FTK Homework help

    

1. What user has the SID which ends with 1003?

2. On page 8 of the document “Daniel Ocean Bio.doc” is a reference to an MD5.  What is the name of the file which matches that MD5?

3. What software was used to edit the picture, f_000631?

4. Using the Prefetch file for the executable, Windirstat.exe; What was the last date and time it was run?

1. Which British news source is within the Typed URL’s for Daniel’s user?

2. Of the identified encrypted files, how many of them are “actual files?”

3. On the Explore Tab, Quickpick only the ACE Image content.  How many of the listed files are Alternate Data Streams?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Essay Based on Case Study

 Essay that fulfills the following criteria and guidelines below using the attached document. 

A.  Address ethical issues for cybersecurity by doing the following:

1.  Discuss the ethical guidelines or standards relating to information security that should apply to the case study.

a.  Justify your reasoning and cite examples of relevant ethical guidelines used by other organizations.

2.  Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices. 

3.  Discuss what factors at TechFite led to lax ethical behavior.

B.  Describe ways to mitigate problems and build security awareness by doing the following:

1.  Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property. 

2.  Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.

a.  Explain how the SATE program will be communicated to TechFite employees.

b.  Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.

– The discussion logically addresses the ethical guidelines or standards relating to information security that should apply to the case study. 

– The justification logically addresses the reasoning of the ethical considerations or guidelines, and the examples of relevant ethical guidelines used by other organizations are logical and clear. 

– The identification of the unethical behavior of individuals or groups is accurate. 

– The discussion of the factors at TechFite that led to lax ethical behavior is clear and logical. 

– The description contains 2 information security policies, specific to the case study that may have minimized the criminal activity, negligent acts, and threats to intellectual property. 

– The description of key components of a SATE program that could be implemented at TechFite is relevant and applicable to the case study. 

– The explanation of how the SATE program will be communicated to TechFite employees is logical. 

– The justification of the SATE program’s relevance to mitigating the undesirable behaviors at TechFite is logical. 

– The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. Or the candidate does not use sources. 

– Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now