Description
A presentation based on your paper with the following format and requirements:
- 8-10 slides
- You will have 2 minutes to present it
- Use 6 by 6 format (font size to be 22 or more)
- Use PowerPoint 2016
I have the subject and the website for resources. Subject is Cellphone Privacy
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Super useful! Studypool never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Southern New Hampshire University Develop Visual Hierarchy and Consistency Discussion
CompetencyIn this project, you will demonstrate your mastery of the following competency:Apply user-centered design princi ...
Southern New Hampshire University Develop Visual Hierarchy and Consistency Discussion
CompetencyIn this project, you will demonstrate your mastery of the following competency:Apply user-centered design principles and industry standards in the development of a mobile applicationScenarioCongratulations! Your App Development Proposal has received approval
after being shared with both your client and the mobile application
development team at Mobile2App. It is now time to construct a UI based
on your original proposal. You must supply the client with a complete UI
design that is easy to understand and demonstrates a creative theme and
layout for the finished application.DirectionsOpen the Android Studio Layout Editor to begin creating the UI for
your app. Be sure to use the Install Android Studio resource and the
Build a Simple User Interface resource, both linked in the Supporting
Materials section, to get started with this software. Throughout this
project, continue to reference the App Development Proposal you
completed in Project One while paying particular attention to the
section on UI Design. Also be sure to let the Android Design and Quality
Guidelines document, which is linked in the Supporting Materials
section, guide your decisions.Your completed UI should include all of the screens needed for your
app to operate but the UI will not yet be functional. You will only be
creating the UI components for this project as the supporting code will
be completed in Project Three.Create UI with appropriate design elements to support a user logging in (1 screen). Your UI must include a login screen, that contains the following:
Fields for the user to provide a username and password
Note that the password element should be configured in a way that
obscures any text that is typed into the field. This means the text will
need to be visually converted into dots.
A button for the user to submit their username and passwordA button for the user to create a new login if it is their first time using the application
Note that to simplify the account creation process, you can use the
same login screen for this purpose. Create a button that will add the
username and password into the database if it does not already exist.
Any other fields or elements that are necessary to make your application visually appealing, intuitive, and usable
Create UI with appropriate design elements to display database information as a grid (1 screen). Your UI must include a data display screen, that contains the following:
A grid for displaying dataLogical labels and headers for the data that will be displayedA button for adding data to the gridA button on each row for deleting that row of data from the gridA mechanism that allows a user to change the value associated with
each grid item (e.g. the number of a specific item in an inventory or
the date of an event)Any fields needed to add data to your grid, though this can be on a new screen if you feel the layout is better for your app
Create UI with appropriate design elements to prompt a user
for permission to communicate with the text messaging app and display
information based on permission (1 screen). Your UI will need
to include a button, or alternate mechanism, that would cause the app to
ask a user for permissions so it can communicate with SMS messaging. A
user that grants permission will then receive automated system
notifications based on which option you chose in Project One. These
notifications would be low inventory, an upcoming event, or reaching a
goal weight. If the user denies access to the permissions needed for the
app to interact with SMS, then your app should still continue to
function overall but should not provide any notifications.Develop visual hierarchy and consistency between UI elements on different screens.
The layout for each screen should follow an intuitive visual flow, have
a consistent theme, and be creative but still easy to understand. Ask
yourself the following to help determine if your visual hierarchy is
successful:
Does my focus order match with the steps a user would follow when completing a task?Does my grouping organize content in a way that makes sense for the user?Do my transitions have consistency between screens and tasks?
What to SubmitTo complete this project, you must submit the following:App UI DesignYour final design should be
submitted as a ZIP file including the full contents of your Android
Studio project. Remember to title the file with your name and the app
option you previously selected.
your help is needed
Scenario Marymount University has been the target of focused attacks from a variety of attackers. Your manager, Professor ...
your help is needed
Scenario Marymount University has been the target of focused attacks from a variety of attackers. Your manager, Professor Boyce has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system. Required Resources Access to the Internet Text sheet: Zenmap Intense Scan Results Tasks 1. Analyze the results of the Zenmap scan. Your report must answer the following questions: What are the first five open ports as identified by the Zenmap scan? Include the port number Include the service name nclude a brief description of how each is used 2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850. Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database. Include the name and a brief description of each vulnerability. 3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open. 4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college. Submission Requirements Format: Microsoft Word (or compatible) Font: Times New Roam, size 12, double-space Citation Style: APALength: 2 to 4 pages
CS 340 Southern New Hampshire University Fundamental Operations Lab Report
PromptAfter completing the readings for this module, you will implement the fundamental operations of creating and reading ...
CS 340 Southern New Hampshire University Fundamental Operations Lab Report
PromptAfter completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Note: If you completed the Module Three milestone, you have already completed this step.Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.Develop a CRUD class that, when instantiated, provides the following functionality:A method that inserts a document into a specified MongoDB database and collectionInput -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API callReturn -> “True” if successful insert, else “False”A method that queries for documents from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API callReturn -> result in cursor if successful, else MongoDB returned error messageImportant: Be sure to use find() instead of find_one() when developing your method.As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.Example Python Code to Insert a Document
from pymongo import MongoClient
from bson.objectid import ObjectId
class AnimalShelter(object):
""" CRUD operations for Animal collection in MongoDB """
def __init__(self, username, password):
# Initializing the MongoClient. This helps to
# access the MongoDB databases and collections.
self.client = MongoClient('mongodb://%s:%s@localhost:27017' % (username, password))
self.database = self.client['project']
# Complete this create method to implement the C in CRUD.
def create(self, data):
if data is not None:
self.database.animals.insert(data) # data should be dictionary
else:
raise Exception("Nothing to save, because data parameter is empty")
# Create method to implement the R in CRUD.
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.Begin creating your own README file for the CRUD Python module that you began creating in the Module Four milestone. Use the README template to get started. You must address each of the following:Describe the purpose of the project by completing the About the Project and Motivation sections of the template.Demonstrate the project’s functional operations by completing the Usage section. Be sure to include examples of your code and screenshots that show how your module works.Document the tools used, identifying each tool and including your rationale for using these tools, by completing the Installation section. “Tools” include any software applications as well as any libraries used to complete your work.Create instructions for reproducing the project by completing the Getting Started section. Discuss what the user of this CRUD Python module would need to do to get started. Some points to address are:Briefly describe the database and user authentication that you set up in the Module Three milestone.Briefly describe how you created the C and R portions of your Python module, any challenges you encountered, and how you overcame them.Note: In this assignment, you only need to focus on creating a README for the create and read functionality of your CRUD Python module. You will continue developing the update and delete functionality as a part of Project One, which is due in Module Five. You will also need to update your README file for that assignment.Guidelines for SubmissionFor your submission, you must include the code files for your Python module (PY file) and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
Assess cyber security industry standards, compliance, regulations, and laws.
PurposeRegulatory standards are complex. Doing a deep-dive into one of those standards, Sarbanes-Oxley, will allow the stu ...
Assess cyber security industry standards, compliance, regulations, and laws.
PurposeRegulatory standards are complex. Doing a deep-dive into one of those standards, Sarbanes-Oxley, will allow the student to learn how to read a standard thoroughly and what elements of the standard are important, as well as how to locate those elements within the written standard. Students are also given the opportunity to evaluate the effectiveness of a standard, providing supporting examples.Assignment InstructionsUse the materials from your reading, particularly the material specific to the Sarbanes-Oxley Act. Research the Internet to provide the required responses.Consider the Sarbanes-Oxley Act. Provide an in-depth discussion and analysis of this act that includes:Explain the events that led to this legislation (provide two examples).Explain the goals that the legislation seeks to achieve.Provide an overview on IT’s role in achieving compliance.Explain how audits and assessments help achieve or measure compliance.Elaborate on the consequences of noncompliance for companies to which this legislation applies (provide at least 2 examples).Do you feel that this act is achieving the goal that the legislators sought to accomplish? Why or why not? (Provide examples to support your opinion)What do you perceive as an organization’s biggest challenge in complying with Sarbanes-Oxley?ConclusionAssignment Requirements4-5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)At least 1 credible source cited and referencedNo more than 1 table or figureNo spelling errorsNo grammar errorsNo APA errorsFor more information and examples of APA formatting, visit the Writing Center in the library or APA Style Central under Academic Tools in this course.
Computer science security (attempt question 1) 5-6 pages
Question 1: Attack Surface Modelling (60 marks) The site being audited has a total of 10 full time staff and an unspecifie ...
Computer science security (attempt question 1) 5-6 pages
Question 1: Attack Surface Modelling (60 marks) The site being audited has a total of 10 full time staff and an unspecified number of casual staff. The back-office duties are only undertaken by full time staff, but the staff common areas and offices are not locked or physically separated. Full time staffers handle payroll, HR and scheduling tasks. The front counter/cashier duties are sometimes taken on by full timers but also by casual staff. You have been informed that the turnover of casual staff is quite large, although the reasons for this are unknown. The computer systems in the back office are all networked via a Cisco small business series ADSL router supplied by Telstra. To permit the owner(s) to check on files from home, remote access services are enabled on some but not all of the machines. There is no centralized authentication server and users logon locally to all machines. All machines contain two local user accounts “admin” and “user”. These accounts are shared by staff to ensure that files are always accessible to fellow staff. The server that will be used for hosting the online presence will run on Ubuntu Linux. The server will also be used as print and file server for other Windows 7 PCs which will run office applications (payroll, HR etc.).An image of the server machine has been supplied to you as VirtualBox VM. You can obtain the VM from: http://www.it.murdoch.edu.au/szander/ICT287/assign...You will require your student number to download the VM. You should download your own specific VM as there are multiple different VMs for different people. The network interface of the VM is set to Host-only Adapter and you should leave it that way. For the VM to run, it is necessary to have a Host-only Network configured in VirtualBox. This may already exist, but if it does not exist you can configure it under File->Preferences->Network->Host-only Networks. Make sure you enable the DHCPserver.Your task is to assess the attack surface of this machine. The scope of your analysis is limited to (1) network level attacks and (2) physical attacks. You should NOT logon to the machine and analyse the individual software packages that have been installed. You only need identify and describe any vulnerable services from a network level (using suitable tools) and identify and describe any potential physical attacks given the scenario description above.It is not mandatory, but you may use a vulnerability scanner (e.g. Nessus) for the network-level analysis. However, you are not allowed to simply copy and paste output of these tools. Like in the real world you must synthesise the output of the tools into a form appropriate for the audience and add textual descriptions.Your report should outline possible weaknesses and vulnerabilities in the systems. The report should include a summary of less than 1 page that summarises the most important findings and is understandable by a layperson. The following pages should describe the details and should be presented in a format suitable for a general technical audience – i.e. someone who is proficient in IT in general, but may not be a security expert. Citations should be used where appropriate.Your report should include an overview of the potential vulnerable services and of the physical attack points, reference specific CVE items (with brief explanations) and demonstrate a prioritisation of the most important issues. An exhaustive list of CVEs is not required (there are too many), but you should at least discuss the 10 most critical and these must be relevant to the actual system and services. Based on your findings you should also make some recommendation on how to improve the security.The expected answer length is roughly 5-6 pages, the maximum length is 10 pages.
Cumberland County College Role of the Cloud Computing Questions
Define scalability.
List five to ten potential relationships that align with the Pareto principle, such as how 80 pe ...
Cumberland County College Role of the Cloud Computing Questions
Define scalability.
List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
Compare and contrast vertical and horizontal scaling.
Explain the importance of the database read/write ratio.
Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?
List and describe five ways you think the cloud will change the future of TV.
List and describe five potential uses for intelligent fabric.
List and describe five ways the cloud will influence the mobile application market, or vice versa.
Discuss the importance of HTML 5.
Discuss how the cloud will impact future operating systems.
List and describe three potential location-aware applications.
List and describe five ways intelligent devices may work together.
Similar Content
Kinsasha Hudson Fisher Associates Bring Your Own Device Registration Analysis
In Section 1, you will provide the specifications of your personal BYOD
computing device. In Section 2, you will provide a...
CISS 390 CUNY Lehman College Global Information System Discussion
What are the different kinds of outsourcing currently in use in today’s global economy? Describe them in detail with reg...
Gannon Amazon.com eCommerce Website that Deals with Sale of Variety of Goods Report
1. perform a usability evaluation of an existing e-commerce Website.
Use the following points as guidelines when wri...
JNeed computer science help with a java question about object-oriented design
Programming Assignment 3: Inheritance and ArrayListFor this assignment, we will work with the employee program. See the&nb...
Wireless Network and Wireless Communications Discussion
Describe ways to protect a wireless network and wireless communications.
...
data design sql fiddle
Sales_Order.docx SQL_Fiddle_Instructions.docx Introduction:
For this assessment, you will be creating m...
17947660
The architect should begin the process of analysis once the project has been given by the client, for example, the project...
Na4 Computer Science.edited 1
The Shared Responsibility Model of Security in The Cloud. When we think about cloud solutions, we think of the benefits; e...
System Software.
System Software: Smart Cards and Biometric Identification and Embedded Software System Software: Smart Cards and Biometric...
Related Tags
Book Guides
The Point of it All - A Lifetime of Great Loves and Endeavors
by Charles Krauthammer
Jane Eyre
by Charlotte Brontë
White Fang
by Jack London
The Scarlet Letter
by Nathaniel Hawthorne
The Second Sex
by Simone de Beauvoir
Flowers For Algernon
by Alice Walker
Big Little Lies
by Liane Moriarty
The Unwinding of the Miracle
by Julie Yip-Williams
Invisible Man
by Ralph Ellison
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Southern New Hampshire University Develop Visual Hierarchy and Consistency Discussion
CompetencyIn this project, you will demonstrate your mastery of the following competency:Apply user-centered design princi ...
Southern New Hampshire University Develop Visual Hierarchy and Consistency Discussion
CompetencyIn this project, you will demonstrate your mastery of the following competency:Apply user-centered design principles and industry standards in the development of a mobile applicationScenarioCongratulations! Your App Development Proposal has received approval
after being shared with both your client and the mobile application
development team at Mobile2App. It is now time to construct a UI based
on your original proposal. You must supply the client with a complete UI
design that is easy to understand and demonstrates a creative theme and
layout for the finished application.DirectionsOpen the Android Studio Layout Editor to begin creating the UI for
your app. Be sure to use the Install Android Studio resource and the
Build a Simple User Interface resource, both linked in the Supporting
Materials section, to get started with this software. Throughout this
project, continue to reference the App Development Proposal you
completed in Project One while paying particular attention to the
section on UI Design. Also be sure to let the Android Design and Quality
Guidelines document, which is linked in the Supporting Materials
section, guide your decisions.Your completed UI should include all of the screens needed for your
app to operate but the UI will not yet be functional. You will only be
creating the UI components for this project as the supporting code will
be completed in Project Three.Create UI with appropriate design elements to support a user logging in (1 screen). Your UI must include a login screen, that contains the following:
Fields for the user to provide a username and password
Note that the password element should be configured in a way that
obscures any text that is typed into the field. This means the text will
need to be visually converted into dots.
A button for the user to submit their username and passwordA button for the user to create a new login if it is their first time using the application
Note that to simplify the account creation process, you can use the
same login screen for this purpose. Create a button that will add the
username and password into the database if it does not already exist.
Any other fields or elements that are necessary to make your application visually appealing, intuitive, and usable
Create UI with appropriate design elements to display database information as a grid (1 screen). Your UI must include a data display screen, that contains the following:
A grid for displaying dataLogical labels and headers for the data that will be displayedA button for adding data to the gridA button on each row for deleting that row of data from the gridA mechanism that allows a user to change the value associated with
each grid item (e.g. the number of a specific item in an inventory or
the date of an event)Any fields needed to add data to your grid, though this can be on a new screen if you feel the layout is better for your app
Create UI with appropriate design elements to prompt a user
for permission to communicate with the text messaging app and display
information based on permission (1 screen). Your UI will need
to include a button, or alternate mechanism, that would cause the app to
ask a user for permissions so it can communicate with SMS messaging. A
user that grants permission will then receive automated system
notifications based on which option you chose in Project One. These
notifications would be low inventory, an upcoming event, or reaching a
goal weight. If the user denies access to the permissions needed for the
app to interact with SMS, then your app should still continue to
function overall but should not provide any notifications.Develop visual hierarchy and consistency between UI elements on different screens.
The layout for each screen should follow an intuitive visual flow, have
a consistent theme, and be creative but still easy to understand. Ask
yourself the following to help determine if your visual hierarchy is
successful:
Does my focus order match with the steps a user would follow when completing a task?Does my grouping organize content in a way that makes sense for the user?Do my transitions have consistency between screens and tasks?
What to SubmitTo complete this project, you must submit the following:App UI DesignYour final design should be
submitted as a ZIP file including the full contents of your Android
Studio project. Remember to title the file with your name and the app
option you previously selected.
your help is needed
Scenario Marymount University has been the target of focused attacks from a variety of attackers. Your manager, Professor ...
your help is needed
Scenario Marymount University has been the target of focused attacks from a variety of attackers. Your manager, Professor Boyce has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system. Required Resources Access to the Internet Text sheet: Zenmap Intense Scan Results Tasks 1. Analyze the results of the Zenmap scan. Your report must answer the following questions: What are the first five open ports as identified by the Zenmap scan? Include the port number Include the service name nclude a brief description of how each is used 2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850. Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database. Include the name and a brief description of each vulnerability. 3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open. 4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college. Submission Requirements Format: Microsoft Word (or compatible) Font: Times New Roam, size 12, double-space Citation Style: APALength: 2 to 4 pages
CS 340 Southern New Hampshire University Fundamental Operations Lab Report
PromptAfter completing the readings for this module, you will implement the fundamental operations of creating and reading ...
CS 340 Southern New Hampshire University Fundamental Operations Lab Report
PromptAfter completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Note: If you completed the Module Three milestone, you have already completed this step.Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.Develop a CRUD class that, when instantiated, provides the following functionality:A method that inserts a document into a specified MongoDB database and collectionInput -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API callReturn -> “True” if successful insert, else “False”A method that queries for documents from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API callReturn -> result in cursor if successful, else MongoDB returned error messageImportant: Be sure to use find() instead of find_one() when developing your method.As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.Example Python Code to Insert a Document
from pymongo import MongoClient
from bson.objectid import ObjectId
class AnimalShelter(object):
""" CRUD operations for Animal collection in MongoDB """
def __init__(self, username, password):
# Initializing the MongoClient. This helps to
# access the MongoDB databases and collections.
self.client = MongoClient('mongodb://%s:%s@localhost:27017' % (username, password))
self.database = self.client['project']
# Complete this create method to implement the C in CRUD.
def create(self, data):
if data is not None:
self.database.animals.insert(data) # data should be dictionary
else:
raise Exception("Nothing to save, because data parameter is empty")
# Create method to implement the R in CRUD.
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.Begin creating your own README file for the CRUD Python module that you began creating in the Module Four milestone. Use the README template to get started. You must address each of the following:Describe the purpose of the project by completing the About the Project and Motivation sections of the template.Demonstrate the project’s functional operations by completing the Usage section. Be sure to include examples of your code and screenshots that show how your module works.Document the tools used, identifying each tool and including your rationale for using these tools, by completing the Installation section. “Tools” include any software applications as well as any libraries used to complete your work.Create instructions for reproducing the project by completing the Getting Started section. Discuss what the user of this CRUD Python module would need to do to get started. Some points to address are:Briefly describe the database and user authentication that you set up in the Module Three milestone.Briefly describe how you created the C and R portions of your Python module, any challenges you encountered, and how you overcame them.Note: In this assignment, you only need to focus on creating a README for the create and read functionality of your CRUD Python module. You will continue developing the update and delete functionality as a part of Project One, which is due in Module Five. You will also need to update your README file for that assignment.Guidelines for SubmissionFor your submission, you must include the code files for your Python module (PY file) and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
Assess cyber security industry standards, compliance, regulations, and laws.
PurposeRegulatory standards are complex. Doing a deep-dive into one of those standards, Sarbanes-Oxley, will allow the stu ...
Assess cyber security industry standards, compliance, regulations, and laws.
PurposeRegulatory standards are complex. Doing a deep-dive into one of those standards, Sarbanes-Oxley, will allow the student to learn how to read a standard thoroughly and what elements of the standard are important, as well as how to locate those elements within the written standard. Students are also given the opportunity to evaluate the effectiveness of a standard, providing supporting examples.Assignment InstructionsUse the materials from your reading, particularly the material specific to the Sarbanes-Oxley Act. Research the Internet to provide the required responses.Consider the Sarbanes-Oxley Act. Provide an in-depth discussion and analysis of this act that includes:Explain the events that led to this legislation (provide two examples).Explain the goals that the legislation seeks to achieve.Provide an overview on IT’s role in achieving compliance.Explain how audits and assessments help achieve or measure compliance.Elaborate on the consequences of noncompliance for companies to which this legislation applies (provide at least 2 examples).Do you feel that this act is achieving the goal that the legislators sought to accomplish? Why or why not? (Provide examples to support your opinion)What do you perceive as an organization’s biggest challenge in complying with Sarbanes-Oxley?ConclusionAssignment Requirements4-5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)At least 1 credible source cited and referencedNo more than 1 table or figureNo spelling errorsNo grammar errorsNo APA errorsFor more information and examples of APA formatting, visit the Writing Center in the library or APA Style Central under Academic Tools in this course.
Computer science security (attempt question 1) 5-6 pages
Question 1: Attack Surface Modelling (60 marks) The site being audited has a total of 10 full time staff and an unspecifie ...
Computer science security (attempt question 1) 5-6 pages
Question 1: Attack Surface Modelling (60 marks) The site being audited has a total of 10 full time staff and an unspecified number of casual staff. The back-office duties are only undertaken by full time staff, but the staff common areas and offices are not locked or physically separated. Full time staffers handle payroll, HR and scheduling tasks. The front counter/cashier duties are sometimes taken on by full timers but also by casual staff. You have been informed that the turnover of casual staff is quite large, although the reasons for this are unknown. The computer systems in the back office are all networked via a Cisco small business series ADSL router supplied by Telstra. To permit the owner(s) to check on files from home, remote access services are enabled on some but not all of the machines. There is no centralized authentication server and users logon locally to all machines. All machines contain two local user accounts “admin” and “user”. These accounts are shared by staff to ensure that files are always accessible to fellow staff. The server that will be used for hosting the online presence will run on Ubuntu Linux. The server will also be used as print and file server for other Windows 7 PCs which will run office applications (payroll, HR etc.).An image of the server machine has been supplied to you as VirtualBox VM. You can obtain the VM from: http://www.it.murdoch.edu.au/szander/ICT287/assign...You will require your student number to download the VM. You should download your own specific VM as there are multiple different VMs for different people. The network interface of the VM is set to Host-only Adapter and you should leave it that way. For the VM to run, it is necessary to have a Host-only Network configured in VirtualBox. This may already exist, but if it does not exist you can configure it under File->Preferences->Network->Host-only Networks. Make sure you enable the DHCPserver.Your task is to assess the attack surface of this machine. The scope of your analysis is limited to (1) network level attacks and (2) physical attacks. You should NOT logon to the machine and analyse the individual software packages that have been installed. You only need identify and describe any vulnerable services from a network level (using suitable tools) and identify and describe any potential physical attacks given the scenario description above.It is not mandatory, but you may use a vulnerability scanner (e.g. Nessus) for the network-level analysis. However, you are not allowed to simply copy and paste output of these tools. Like in the real world you must synthesise the output of the tools into a form appropriate for the audience and add textual descriptions.Your report should outline possible weaknesses and vulnerabilities in the systems. The report should include a summary of less than 1 page that summarises the most important findings and is understandable by a layperson. The following pages should describe the details and should be presented in a format suitable for a general technical audience – i.e. someone who is proficient in IT in general, but may not be a security expert. Citations should be used where appropriate.Your report should include an overview of the potential vulnerable services and of the physical attack points, reference specific CVE items (with brief explanations) and demonstrate a prioritisation of the most important issues. An exhaustive list of CVEs is not required (there are too many), but you should at least discuss the 10 most critical and these must be relevant to the actual system and services. Based on your findings you should also make some recommendation on how to improve the security.The expected answer length is roughly 5-6 pages, the maximum length is 10 pages.
Cumberland County College Role of the Cloud Computing Questions
Define scalability.
List five to ten potential relationships that align with the Pareto principle, such as how 80 pe ...
Cumberland County College Role of the Cloud Computing Questions
Define scalability.
List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
Compare and contrast vertical and horizontal scaling.
Explain the importance of the database read/write ratio.
Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?
List and describe five ways you think the cloud will change the future of TV.
List and describe five potential uses for intelligent fabric.
List and describe five ways the cloud will influence the mobile application market, or vice versa.
Discuss the importance of HTML 5.
Discuss how the cloud will impact future operating systems.
List and describe three potential location-aware applications.
List and describe five ways intelligent devices may work together.
Earn money selling
your Study Documents