Description
Debated the topic and post a stance (with at least 2 citations).
is sharing security data is the best way to deter cyber criminals?
i would like it to be about 350 words its like a half page.
no copyrights PLEASE.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
OSU Python Project
Part 1
Create and Read in Python
Overview
As you have learned, CRUD functionality is essential for interacting with databa ...
OSU Python Project
Part 1
Create and Read in Python
Overview
As you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice using CRUD commands within the mongo shell. In order to develop a web application that connects a client-side user interface (such as a dashboard) to a database, it will help to develop a portable Python module that enables CRUD functionality for this data connection. In this milestone, you will begin creating a Python module that enables create and read functionality. You will finish developing the update and delete functionality for your Project One submission. This Python module will eventually be used to connect the user interface component to the database component of your dashboard in Project Two.
Note: This milestone requires you to use the “aacuser” account and password that you set up back in the Module Three milestone. If you did not successfully complete that milestone, follow the steps in Part II of the Module Three milestone to set up the “aacuser” account before beginning this milestone.
Prompt
After completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.
Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshotsof both the import command and its execution.
Note: If you completed the Module Three milestone, you have already completed this step.
Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.
Develop a CRUD class that, when instantiated, provides the following functionality:
A method that inserts a document into a specified MongoDB database and collection
Input -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API call
Return -> “True” if successful insert, else “False”
A method that queries for documents from a specified MongoDB database and specified collection
Input -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call
Return -> result in cursor if successful, else MongoDB returned error message
Important: Be sure to use find() instead of find_one() when developing your method.
As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.
TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.<code><strong>Example Python Code to Insert a Document</strong> from pymongo import MongoClient from bson.objectid import ObjectId class AnimalShelter(object): """ CRUD operations for Animal collection in MongoDB """ def __init__(self): # Initializing the MongoClient. This helps to # access the MongoDB databases and collections. self.client = MongoClient('mongodb://%s:%s@localhost:YOUR_PORT_NUMBER' % (username, password)) self.database = self.client['project'] # Complete this create method to implement the C in CRUD. def create(self, data): if data is not None: self.database.animals.insert(data) # data should be dictionary else: raise Exception("Nothing to save, because data parameter is empty") # Create method to implement the R in CRUD. </code>
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.
Guidelines for Submission
For your submission, you must include the code files for your Python module (PY file)and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
part 2:
Anatomy of a README
Overview
README files are one way of documenting a development project. READMEs play an especially important role in open-source software, as they give the reader valuable information about the code you created. There is no standard README format. Much of the format depends on the scope of the software or project, so it’s really up to the developer what information should be included or provided. However, there are several elements that are part of good README files:
A description of the purpose of the project
A demonstration of how it works (its functional operations)
An identification of the tools used and a rationale for why those tools were chosen
An explanation of how to reproduce the project
In this assignment, you will explore and implement best practices for creating README files. This will help prepare you for the README files that you will need to create in Projects One and Two.
Prompt
This assignment provides you with some sample README files to explore and a README template. After you have reviewed the required documentation for creating a README file, you will learn about and implement best practices for creating your own README files.
Explore the following example README files: Zircon, BigFoot Dash App, and Plotly Dash. These READMEs come from a variety of different software projects and have different strengths and weaknesses. As you read, consider the following:
How clearly did each README file describe the purpose of their project?
What information did the README files include about the functionality of their project? What was helpful about this information? What could be improved?
What information did the README files include about the tools (software and libraries) that they used or how the user could reproduce the project?
Note: You do not need to submit anything related to this step. These are examples to guide your work in the next step.
After exploring the sample README files, begin creating your own README file for the CRUD Python module that you began creating in the Module Four milestone. Use the README template Word Document to get started. You must address each of the following:
Describe the purpose of the project by completing the About the Project and Motivation sections of the template.
Demonstrate the project’s functional operations by completing the Usage section. Be sure to include examples of your code and screenshots that show how your module works.
Document the tools used, identifying each tool and including your rationale for using these tools, by completing the Installation section. “Tools” include any software applications as well as any libraries used to complete your work.
Create instructions for reproducing the project by completing the Getting Started section. Discuss what the user of this CRUD Python module would need to do to get started. Some points to address are:
Briefly describe the database and user authentication that you set up in the Module Three milestone.
Briefly describe how you created the C and R portions of your Python module, any challenges you encountered, and how you overcame them.
Note: In this assignment, you only need to focus on creating a README for the create and read functionality of your CRUD Python module. You will continue developing the update and delete functionality as a part of Project One, which is due in Module Five. You will also need to update your README file for that assignment.
Assessing Information System Vulnerabilities and Risk Paper
The security posture of the information systems infrastructure of an organization should be regularly monitored and assess ...
Assessing Information System Vulnerabilities and Risk Paper
The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies. The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits. The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:
Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.
BSA 425 University of Phoenix Project Methodologies Discussion
Respond to the following in a minimum of 175 words: The project methodology you choose for a given project—and how well ...
BSA 425 University of Phoenix Project Methodologies Discussion
Respond to the following in a minimum of 175 words: The project methodology you choose for a given project—and how well your project team applies it—can make the difference between project success and failure. Knowing that, executives considering your project proposal will want to know the project methodology you've chosen and why you think it is the best option for your particular project.Read about project methodologies in "What's the Difference? Agile vs. Scrum vs. Waterfall vs. Kanban" from Smartsheet.Then discuss the project methodology you are considering, or have already chosen, for your project proposal.What specific characteristics of your project's context and/or objectives led you to choose this particular methodology?What aspects of the methodology do you consider the most relevant for your particular project, and why?
Texas A & M University Kingsville Leadership and Bullying Discussion
Answer the below question with 300 words and two replies with 150 words each. You should have a total of 3 posts.Discuss w ...
Texas A & M University Kingsville Leadership and Bullying Discussion
Answer the below question with 300 words and two replies with 150 words each. You should have a total of 3 posts.Discuss what power in the context of leadership is and how it relates to bullying within organizations. Also note how this impacts productivity.Discuss what organizational culture is and how it impacts work productivity. Also, note how organizational culture impacts the success of innovation implementation.How does culture impact leadership? Can culture be seen as a constraint on leadership?please refer below links and attachmentJournal Article 2.1: Learmonth, M. and Morrell, K. (2017) ‘Is critical leadership studies ‘critical’?’ Leadership, 13(3): 257–271.Journal Article 2.2: Spector, B.A. (2016) ‘Carlyle, Freud, and the great man theory more fully considered’, Leadership, 12(2): 250–260.
9 pages
Transmission Control Protocol Internet Protocol
Just like individuals in their normal environments, computers also have a common approach to ensure that they communicate ...
Transmission Control Protocol Internet Protocol
Just like individuals in their normal environments, computers also have a common approach to ensure that they communicate with each other. Most of ...
3 pages
Chapter 14 Business Intelligence Discussion Exercise Answer
Some say that analytics in general can dehumanize managerial activities, it can be true. Many people are hesitant to use c ...
Chapter 14 Business Intelligence Discussion Exercise Answer
Some say that analytics in general can dehumanize managerial activities, it can be true. Many people are hesitant to use computerized systems because ...
Similar Content
Disaster Recovery Plan
Disaster Recovery PlanThis assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP anal...
Pace University Detecting Malware and Unauthorized Devices Lab Report
LAB REPORT PRESENTATION
CS XXX
Department of Computer Sciences
PACE UNIVERSITY
LAB REPORT
⚫
⚫
⚫
⚫
⚫
⚫
⚫...
Campbellsville University Analyzing & Visualizing Data Demographic Survey Discussion
Complete part 1 of your Survey Project. Post your survey in the discussion to get feedback and guidance from your classma...
Walden University Network Security Essay
Assignment 1
Plush Packet is worried that a Trojan virus infecting one of its internal machines may steal
proprietary sou...
Assignment.........MM
Assume that you are a news reporter writing twenty years from today in the year 2039. Please discuss the changes in ...
University of The Cumberlands Security Breach Evaluation Discussion
Discussion: Security Breach Evaluation
Learning Objectives and Outcomes
Analyze the given case study on security breach...
D182 History Of Cryptography From Its Origin00 1
Cryptography refers to the art or science where messages are concealed to introduce secrecy in information security. Moreo...
C++ Zodiac Sign
Determine the zodiac sign for the date entered. Keep asking until the user enters zero for the month. for your convenience...
Application Sercurity.
A secure connection is the one that is coded in one or more secure channels for the purpose of confirming the security of ...
Related Tags
Book Guides
The Secret Life of Bees
by Sue Monk Kidd
Robinson Crusoe
by Daniel Defoe
Harry Potter and the Sorcerers Stone
by J. K. Rowling
The Dispossessed
by Ursula Kroeber Le Guin
The Prince
by Niccolò Machiavelli
Death on the Nile
by Agatha Christie
Breakfast at Tiffanys
by Truman Capote
Dracula
by Bram Stoker
How to Win at the Sport of Business
by Mark Cuban
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
OSU Python Project
Part 1
Create and Read in Python
Overview
As you have learned, CRUD functionality is essential for interacting with databa ...
OSU Python Project
Part 1
Create and Read in Python
Overview
As you have learned, CRUD functionality is essential for interacting with databases. In Module Two, you gained practice using CRUD commands within the mongo shell. In order to develop a web application that connects a client-side user interface (such as a dashboard) to a database, it will help to develop a portable Python module that enables CRUD functionality for this data connection. In this milestone, you will begin creating a Python module that enables create and read functionality. You will finish developing the update and delete functionality for your Project One submission. This Python module will eventually be used to connect the user interface component to the database component of your dashboard in Project Two.
Note: This milestone requires you to use the “aacuser” account and password that you set up back in the Module Three milestone. If you did not successfully complete that milestone, follow the steps in Part II of the Module Three milestone to set up the “aacuser” account before beginning this milestone.
Prompt
After completing the readings for this module, you will implement the fundamental operations of creating and reading documents (the C and R of CRUD) in Python. You will use the PyMongo driver to create CRUD functional access to your document collection.
Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. This file is in the /usr/local/datasets/ directory in Apporto and the filename is “aac_shelter_outcomes.csv”. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshotsof both the import command and its execution.
Note: If you completed the Module Three milestone, you have already completed this step.
Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable create and read functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.
Develop a CRUD class that, when instantiated, provides the following functionality:
A method that inserts a document into a specified MongoDB database and collection
Input -> argument to function will be set of key/value pairs in the data type acceptable to the MongoDB driver insert API call
Return -> “True” if successful insert, else “False”
A method that queries for documents from a specified MongoDB database and specified collection
Input -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call
Return -> result in cursor if successful, else MongoDB returned error message
Important: Be sure to use find() instead of find_one() when developing your method.
As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects.
TIP: Use the following sample code to get started. Note that the authentication to MongoDB is in the initialization method for the CRUD class.<code><strong>Example Python Code to Insert a Document</strong> from pymongo import MongoClient from bson.objectid import ObjectId class AnimalShelter(object): """ CRUD operations for Animal collection in MongoDB """ def __init__(self): # Initializing the MongoClient. This helps to # access the MongoDB databases and collections. self.client = MongoClient('mongodb://%s:%s@localhost:YOUR_PORT_NUMBER' % (username, password)) self.database = self.client['project'] # Complete this create method to implement the C in CRUD. def create(self, data): if data is not None: self.database.animals.insert(data) # data should be dictionary else: raise Exception("Nothing to save, because data parameter is empty") # Create method to implement the R in CRUD. </code>
Finally, create a Python testing script that imports your CRUD Python module to call and test the create and read instances of CRUD functionality. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. This script should be created in a separate Jupyter Notebook IPYNB file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution.
Guidelines for Submission
For your submission, you must include the code files for your Python module (PY file)and your Python testing script (IPYNB file). You must also submit a Microsoft Word document with your screenshots from Step 3.
part 2:
Anatomy of a README
Overview
README files are one way of documenting a development project. READMEs play an especially important role in open-source software, as they give the reader valuable information about the code you created. There is no standard README format. Much of the format depends on the scope of the software or project, so it’s really up to the developer what information should be included or provided. However, there are several elements that are part of good README files:
A description of the purpose of the project
A demonstration of how it works (its functional operations)
An identification of the tools used and a rationale for why those tools were chosen
An explanation of how to reproduce the project
In this assignment, you will explore and implement best practices for creating README files. This will help prepare you for the README files that you will need to create in Projects One and Two.
Prompt
This assignment provides you with some sample README files to explore and a README template. After you have reviewed the required documentation for creating a README file, you will learn about and implement best practices for creating your own README files.
Explore the following example README files: Zircon, BigFoot Dash App, and Plotly Dash. These READMEs come from a variety of different software projects and have different strengths and weaknesses. As you read, consider the following:
How clearly did each README file describe the purpose of their project?
What information did the README files include about the functionality of their project? What was helpful about this information? What could be improved?
What information did the README files include about the tools (software and libraries) that they used or how the user could reproduce the project?
Note: You do not need to submit anything related to this step. These are examples to guide your work in the next step.
After exploring the sample README files, begin creating your own README file for the CRUD Python module that you began creating in the Module Four milestone. Use the README template Word Document to get started. You must address each of the following:
Describe the purpose of the project by completing the About the Project and Motivation sections of the template.
Demonstrate the project’s functional operations by completing the Usage section. Be sure to include examples of your code and screenshots that show how your module works.
Document the tools used, identifying each tool and including your rationale for using these tools, by completing the Installation section. “Tools” include any software applications as well as any libraries used to complete your work.
Create instructions for reproducing the project by completing the Getting Started section. Discuss what the user of this CRUD Python module would need to do to get started. Some points to address are:
Briefly describe the database and user authentication that you set up in the Module Three milestone.
Briefly describe how you created the C and R portions of your Python module, any challenges you encountered, and how you overcame them.
Note: In this assignment, you only need to focus on creating a README for the create and read functionality of your CRUD Python module. You will continue developing the update and delete functionality as a part of Project One, which is due in Module Five. You will also need to update your README file for that assignment.
Assessing Information System Vulnerabilities and Risk Paper
The security posture of the information systems infrastructure of an organization should be regularly monitored and assess ...
Assessing Information System Vulnerabilities and Risk Paper
The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies. The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General's (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits. The breach ultimately resulted in removal of OPM's top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.There are nine steps that will help you create your final deliverables. The deliverables for this project are as follows:
Security Assessment Report (SAR): This should be an 8-10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Risk Assessment Report (RAR): This report should be a 5-6 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.
BSA 425 University of Phoenix Project Methodologies Discussion
Respond to the following in a minimum of 175 words: The project methodology you choose for a given project—and how well ...
BSA 425 University of Phoenix Project Methodologies Discussion
Respond to the following in a minimum of 175 words: The project methodology you choose for a given project—and how well your project team applies it—can make the difference between project success and failure. Knowing that, executives considering your project proposal will want to know the project methodology you've chosen and why you think it is the best option for your particular project.Read about project methodologies in "What's the Difference? Agile vs. Scrum vs. Waterfall vs. Kanban" from Smartsheet.Then discuss the project methodology you are considering, or have already chosen, for your project proposal.What specific characteristics of your project's context and/or objectives led you to choose this particular methodology?What aspects of the methodology do you consider the most relevant for your particular project, and why?
Texas A & M University Kingsville Leadership and Bullying Discussion
Answer the below question with 300 words and two replies with 150 words each. You should have a total of 3 posts.Discuss w ...
Texas A & M University Kingsville Leadership and Bullying Discussion
Answer the below question with 300 words and two replies with 150 words each. You should have a total of 3 posts.Discuss what power in the context of leadership is and how it relates to bullying within organizations. Also note how this impacts productivity.Discuss what organizational culture is and how it impacts work productivity. Also, note how organizational culture impacts the success of innovation implementation.How does culture impact leadership? Can culture be seen as a constraint on leadership?please refer below links and attachmentJournal Article 2.1: Learmonth, M. and Morrell, K. (2017) ‘Is critical leadership studies ‘critical’?’ Leadership, 13(3): 257–271.Journal Article 2.2: Spector, B.A. (2016) ‘Carlyle, Freud, and the great man theory more fully considered’, Leadership, 12(2): 250–260.
9 pages
Transmission Control Protocol Internet Protocol
Just like individuals in their normal environments, computers also have a common approach to ensure that they communicate ...
Transmission Control Protocol Internet Protocol
Just like individuals in their normal environments, computers also have a common approach to ensure that they communicate with each other. Most of ...
3 pages
Chapter 14 Business Intelligence Discussion Exercise Answer
Some say that analytics in general can dehumanize managerial activities, it can be true. Many people are hesitant to use c ...
Chapter 14 Business Intelligence Discussion Exercise Answer
Some say that analytics in general can dehumanize managerial activities, it can be true. Many people are hesitant to use computerized systems because ...
Earn money selling
your Study Documents