Week 8

Introduction

The “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” (1) is one of the most comprehensive studies on the applicability of international law to cyberspace conflict, and thus cyber operations. In this study, multiple legal experts derived 154 rules from existing law. Several opinions on these rules were divided, so interpretation of the rules remains open for discussion.

In this assignment, you will examine two of these rules, consider the ethical and legal aspects of these rules, and offer your perspective on each.

The specific course learning outcome associated with this assignment is:

Review the legal and ethical aspects of cyber operations.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you evaluate Rules 4 and 9.

Rule 4

Rule 4 states that, according to international law, a state must not conduct cyberspace operations that violate the sovereignty of another state. A large part of cyber operations includes performing the collection of detailed intelligence on another state. This reconnaissance and access is often done “without causing physical damage or loss in functionality” at the targeted state. (1)

Describe the laws and rules that govern sovereignty, citing specific, credible sources that support your assertions and conclusions.

Explain why a state would want to collect intelligence, why it might be required ethically, and whether cyber operations that collect detailed intelligence on another state violate its sovereignty.

Provide a thorough, researched rationale for your perspective.

Rule 9

Rule 9 states that a state may exercise territorial jurisdiction over cyberspace infrastructure and persons engaged in cyberspace activities within its territory; cyberspace activities originating in, or completed within, its territory; or cyberspace activities having a substantial effect within its territory. A large part of cyber operations includes transmitting data – usually encrypted – which, because of network routing, may transit through the territorial cyberspace architecture of another state. (1)

Describe the laws and rules that govern territorial jurisdiction, citing specific, credible sources.

Explain whether cyber operations that collect detailed intelligence on another state may exercise jurisdiction over data that traverses its territory, citing specific, credible sources that support your assertions and conclusions.

Provide a thorough, researched rationale for your perspective.

Source Citations and Writing

Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.

Cite each source listed on your references page at least one time within your assignment.

For help with research, writing, and citation, access the library or review library guides.

Write clearly and concisely in a manner that is well-organized, grammatically correct, and free of spelling, typographical, formatting, and/or punctuation errors.

Use section headers in your paper to clearly delineate your main topics.

Sources

Michael N. Schmitt. (Ed.). 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. https://www.cambridge.org/us/academic/subjects/law/humanitarian-law/tallinn-manual-20-international-law-applicable-cyber-operations-2nd-edition?format=PB

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 8 Discussion

For this discussion, imagine yourself as the CIO of an engineering and software development company that has federal, military, and civilian customers. You must ensure that all your company’s information, as well as data exchanged with your customers, is properly encrypted using known, accepted standards.

Select the encryption component from a major standard, such as NIST, ANSI, IEEE, IETF, or ISO, for your company.

Describe the encryption component of the standard, its pros and cons, and justify your selection.

Discuss whether you would communicate with your customers using an asymmetric or symmetric algorithm, and why, and rationalize the type of algorithm you would use, such as RSA or DES.

After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:

Discuss what you learned.

Ask probing questions or seek clarification.

Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.

Suggest research strategies or specific resources on the topic.

Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 9 discussion

 

When designing a new application or software product that entails access control, security should be embedded throughout its development.

  • Compare the software development life cycle to the security development life cycle and describe how each is used to enable testing and how they differ from each other.
  • Search the Internet and find and describe at least two tools to assist with the software development and security life cycles and discuss the pros and cons of each tool.

After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:

  • Discuss what you learned.
  • Ask probing questions or seek clarification.
  • Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
  • Suggest research strategies or specific resources on the topic.

Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 7

With so many employees having to work remotely, companies are turning to technologies like virtual private networks (VPNs) to keep their communications secure. VPN use has grown significantly but there are viable alternatives.

Select three alternatives or VPN add-on platforms/solutions for an enterprise organization.

Describe the pros and cons of each alternative, including VPNs.

Describe an actual organization for which each of your selections, and a VPN, would be the best solution and justify why.

After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:

Discuss what you learned.

Ask probing questions or seek clarification.

Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.

Suggest research strategies or specific resources on the topic.

Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 6 Discussion

 

Physical security attacks can come in many forms. One relatively new attack method comes through the use of drones. Swarms of drones have been seen flying over our military bases, such as over Langley Air Force Base (Joint Base Langley-Eustis) in Virginia.

Respond to the following:

  • Describe the physical security breach, focusing primarily on IT systems, including what might have happened and the scope of what could have been breached.
  • Explain what actions could have been taken immediately to minimize or mitigate the effects of this breach.
  • Discuss long-term best practices that should be put in place to mitigate this type of event in the future.

After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:

  • Discuss what you learned.
  • Ask probing questions or seek clarification.
  • Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
  • Suggest research strategies or specific resources on the topic.

Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 3

 

Open and review the 2020 IBM X-Force Threat Intelligence Index [PDF] Download 2020 IBM X-Force Threat Intelligence Index [PDF].

  • Describe the purpose of this report and how this information would be useful to a business.
  • Provide insightful reasoning on why:
    • Phishing decreased from nearly half of the total incidents in 2018 to less than a third by 2019, while scanning and exploitation of vulnerabilities increased to nearly a third of the incidents up from only eight percent in 2018.
    • Ransomware and building out botnets have returned significantly to the malware landscape.

After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:

  • Discuss what you learned.
  • Ask probing questions or seek clarification.
  • Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
  • Suggest research strategies or specific resources on the topic.

Be sure to respond to at least one of your classmates’ postings. Join the discussion early and post often.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science assignment prompt

Assignment Prompts:

What are the differences between job involvement, organizational commitment, and job satisfaction? Are all three influenced by the same factors?

What are the major reasons for job satisfaction? What are the primary consequences of dissatisfaction? Explain

Why is it important for managers to understand individual differences at work?

Why is it important for managers to understand ethical standards in the workplace? How do ethics affect our behavior at work?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Bibliography References

Please see the attach instructions to create a bibliography from the references in the attachment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper on Pascal language

 The primary focus should be on the major milestones in the development of that programming paradigm, highlighting how and why it evolved, key contributors, and significant languages that embody the paradigm. 

 

Your research should cover the history and evolution of the language by addressing the following: 

  • Early developments: What were the early languages in the chosen paradigm? Why did they emerge? 
  • Milestones: What were the major changes or advancements in the paradigm? 
  • Notable Contributors: Who were the key figures in the development of these languages? For example, Dennis Ritchie for C. 
  • Theoretical Contributions: How did advancements in computer science theory influence the evolution of the paradigm (e.g., lambda calculus in functional programming). 
  • Modern Adaptations: How has the paradigm evolved in modern programming languages?

 Your paper should be approximately 8 – 12 pages double-spaced. You should use a minimum of 5 credible sources (journals, textbooks, and reputable online publications). If you find you are having trouble meeting the page requirement, then you most likely don’t have enough sources. The paper should conform to APA v7 guidelines, including a title page, in-text citations, a reference page, and proper headings and subheadings. Here are some resources for APA v7.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a python code on the anaconda navigator

Resource Information

In this assignment, you should work with books.csv file. This file contains the detailed information about books scraped via the Goodreads . The dataset is downloaded from Kaggle website: https://www.kaggle.com/jealousleopard/goodreadsbooks/downloads/goodreadsbooks.zip/6

Each row in the file includes ten columns. Detailed description for each column is provided in the following:

  1. bookID: A unique Identification number for each book.
  2. title: The name under which the book was published.
  3. authors: Names of the authors of the book. Multiple authors are delimited with -.
  4. average_rating: The average rating of the book received in total.
  5. isbn: Another unique number to identify the book, the International Standard Book Number.
  6. isbn13: A 13-digit ISBN to identify the book, instead of the standard 11-digit ISBN.
  7. language_code: Helps understand what is the primary language of the book. 
  8. num_pages: Number of pages the book contains.
  9. ratings_count: Total number of ratings the book received.
  10. text_reviews_count: Total number of written text reviews the book received.

Task

  1. Write the following codes:
    1. Use pandas to read the file as a dataframe (named as books). bookIDcolumn should be the index of the dataframe.
    2. Use books.head() to see the first 5 rows of the dataframe.
    3. Use book.shape to find the number of rows and columns in the dataframe.
    4. Use books.describe() to summarize the data.
    5. Use books[‘authors’].describe() to find about number of unique authors in the dataset and also most frequent author.
    6. Use OLS regression to test if average rating of a book is dependent to number of pages, number of ratings, and total number of written text reviews the book received.
  2. Summarize your findings in a Word file.

Instructions

Please follow these directions carefully.

  1. Please type your codes in a Jupyter Network file and your summary in a word document named as follows:
    HW6YourFirstNameYourLastName.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now