Virtualization

 Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about the business process as a service and security.  

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes. 

java





/**

* COSC 1436

* EL Centro

* Week 15

* Cell Phone Class

*

* This CLASS does not need to change

*

*/

import java.util.ArrayList;

import java.util.Arrays;



public class CellPhone {

// Attributes

private final ArrayList AVAILABLE_BATTERY_TYPES = new ArrayList<>(

Arrays.asList("NiCd", "NiMH", "Lo-ion", "Li-pol"));

private ArrayList favoritePhoneNumbers = new ArrayList();



private String cellProvider = "AT&T";

private String batteryType = null;

private boolean isFlipPhone = false;

private boolean hasInternational = false;



// Methods

public ArrayList getFavoritePhoneNumbers() {

return favoritePhoneNumbers;

}



public void addAFavoritePhoneNumber(Long phoneNumber) {

this.favoritePhoneNumbers.add(phoneNumber);

}



public void deleteAFavoritePhoneNumber(int phoneNumber) {

this.favoritePhoneNumbers.remove(phoneNumber);

}



public String getCellProvider() {

return cellProvider;

}



public void setCellProvider(String cellProvider) {

this.cellProvider = cellProvider;

}



public String getBatteryType() {

return batteryType;

}



/**

* Validates battery type

* @param batteryType

* @return

*/

public boolean setBatteryType(String batteryType) {

if (AVAILABLE_BATTERY_TYPES.contains(batteryType)) {

this.batteryType = batteryType;

return true;

}

return false;

}



public boolean isFlipPhone() {

return isFlipPhone;

}



public void setFlipPhone(boolean isFlipPhone) {

this.isFlipPhone = isFlipPhone;

}



public boolean isHasInternational() {

return hasInternational;

}



public void setHasInternational(boolean hasInternational) {

this.hasInternational = hasInternational;

}



public ArrayList getAVAILABLE_BATTERY_TYPES() {

return AVAILABLE_BATTERY_TYPES;

}



public boolean isValidBatteryType() {

return batteryType != null;

}



@Override

public String toString() {

StringBuilder builder = new StringBuilder();

builder.append("CellPhone [favoritePhoneNumbers=");

builder.append(favoritePhoneNumbers);

builder.append(", cellProvider=");

builder.append(cellProvider);

builder.append(", batteryType=");

builder.append(batteryType);

builder.append(", isFlipPhone=");

builder.append(isFlipPhone);

builder.append(", hasInternational=");

builder.append(hasInternational);

builder.append(", valid battery type=");

builder.append(isValidBatteryType());

builder.append("]");

return builder.toString();

}



}

Create a new Java Project for this assignment.

       Copy the provided class CellPhone into your default package area.

  1. Create a new class called SmartPhone that extends CellPhone. Add the following attributes:

    1. boolean – hasGPS. 
    2. boolean – hasWIFI. 
    3. String OSVersion.   Default to “Windows 10 Mobile”;
    4. long internalMemoryStorageCapacity – Default to 16_000_000_000L;
    5. Generate the setters and getters and toString() method.
  2. Create a new class called TestPhone that includes a main() method.
  3. Inside the main() method of TestPhone, do the following: 
    1. Create an instance of CellPhone. Set all the following attributes to values of your choosing: (Call all the setters with values) 
      1. cell provider
      2. isFlipPhone
      3. hasInternational
      4. batteryType
      5. Add 2 favorite phone numbers
    2. Display the CellPhone toString results.
    3. Create an instance of SmartPhone. Set the following attributes to values of your choosing: 
      1. hasGPS
      2. hasWIFI
      3. OSVersion 
      4. cell Provider
      5. isFlipPhone
      6. hasInternational
      7. batteryType
      8. Add 1 favorite phone number
    4. Display the SmartPhone toString results.

Deliverables include the SmartPhone.java and TestPhone.java files.

There is no defined constructors in the CellPhone class so the super() method does not need to be addressed.

Discussion

 

  • What factors might cause peak loads in a network? 
  • How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

Written Assignment 3

 

  • Who uses extended support features?
  • Why is it important to keep backups of your SQL software?
  • What did you learn about SQL after watching Brent Ozar’s video?
  • How can you keep your skills aggressively current?
  • Be specific and provide examples.

Click the link above to submit your completed assignment.

Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

security architecture 17

 

Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier
  • Other reputable sources are OK.

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page. 
  • Each source should be cited in the body of the paper to give credit where due. 
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 4 pages in length. 
  • The Title and Reference pages do not count towards the page count requirements.

Application security Procedure guide

  

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Assignment

 Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD 

Cloud Computing and Digital Forensics

1.) Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Use the Research Databases available from the Danforth Library as your first choice. Include at least 3 quotes from your sources enclosed in quotation marks 

and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.

2.) You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. 

It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

home work assignment

Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.

minimum 300 – 400 words

Assignment should follow all APA rules and include a min. of (1) citation/reference.

no plagiarism