Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

CSCI 457 Assignment 2 – Hexadecimal Calculator

Implement a hexadecimal calculator for iOS.

Requirements:
  • The calculator should support 4 basic arithmetic
    operations: + – * and /
  • The calculator will operate on hexadecimal numbers, not
        decimal numbers 
  • The calculator only needs to operate on unsigned integers
    (i.e. UInt). You do not need to consider negative numbers
    or fractions.
  • The calculator should support the 16-digit hexadecimal
    numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF.
  • The calculator should handle overflow and underflow gracefully. The app must not crash.
  • The calculator should handle division-by-zero error gracefully. The app must not crash.
  • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay.
    Hint:
  • To convert a string to a hex number, use “radix: 16” as an
    argument. For example:
    var s:String?
    s = “1A”
    var intHex:UInt = 0
    intHex = UInt(s!, radix: 16)! print(intHex) // shows 26
    intHex = 90
    s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A
  • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit.
  • Strings may be concatenated by using + operator. E.g. var s1 = “1234”

var s2 = “5”
print(s1 + s2) // shows 12345
You may want to do string concatenation in the action of each digit button.

  • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label.
  • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *.
  • To support different devices and orientations, use stack view, scroll view, or both.
  • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc.
    The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%.
    When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.
    The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing looking, it should be fine.

Organ leader & Decision making

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3 – 4 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discussion post – Qualitative research methods

 

Primary Task Response: Within the Discussion Board area, write 400–500 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear and use examples to reinforce your ideas.

There are numerous times when the information collected from a real organization will not conform to the requirements of a parametric analysis. That is, a practitioner would not be able to analyze the data with a t-test or F-test (ANOVA).

Presume that a young professional has read about tests—such as the Chi-Square, the Mann-Whitney U test, the Wilcoxon Signed-Rank test, and the Kruskal-Wallis one-way analysis of variance—and wants to know when it is appropriate to use each test, what the test is used for, and why each would be used instead of the t-tests and ANOVA. How would you address this young person’s concerns?

Week 4 Research Paper – Info Tech Import Strat Plan

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

BI

 Discussion (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model? 

Questions: 

1. What is an artificial neural network and for what types of problems can it be used? 

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar? 

3. What are the most common ANN architectures? For what types of problems can they be used? 

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode 

Exercise:
Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding. 

Internet exercise: Go to  neuroshell.com click on the examples and look at the current examples listed.  Comment on the feasibility of achieving the results claimed by the developers of this neural network model.  

Preview the document

Use Cases

  1. Read the narrative on Acme Electric, LLCPreview the document.
  2. Determine all the use cases in the ‘A Job Management System’ section, sub-section #1 only, in the narrative. Create brief summaries for every use case you find.
  3. Your senior architect has determined that “Create a job.” is architecturally significant. Create a fully dressed or detailed use case. She has decided to split “Create and maintain a Job” into two separate use cases because of this decision. This means that you will create one fully dressed use case for “Create a job”. You will need to create a brief use case summary for “Maintain a Job”.
  4. Create one use case diagram containing all of the use cases you have just created, both brief and detailed.
  5. APA style 

organ leader and decision making

 

Required Reading:

Read Se Yeon Choi, Goo Hyeok Chung, & Jin Nam Choi. (2019). Why are we having this innovation? Employee attributions of innovation and implementation behavior. Social Behavior & Personality: An International Journal, 47(7), 1–13. https://doi.org/10.2224/sbp.8124

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=pbh&AN=137631636&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

This assignment is due by 11:59pm EST on October 4, 2020.

Cyber security planning and management

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

 There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/
https://www.techrepublic.com/