assignment
Paper Review
server 404 error
Apply: Configuring and Deploying a Private Cloud with System Center
Assignment Content
- The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.
Using the links provided, research at least 2 of the following codes of ethics:
- (ISC)2 Code of Ethics
- The International Council of Electronic Commerce Consultant (EC-Council)
- System Administration, Networking, and Security Institute (SANS)
- Global Information Assurance Certification (GIAC)
- SANS IT
- Institute of Electrical and Electronics Engineers (IEEE)
- Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:
- Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
- Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.
- Cite any references to support your assignment.
Format your assignment according to APA guidelines.
Submit your assignment.
Process Synchronization Using Monitor and Pthreads
The purpose of this programming project is to explore process synchronization. This will be accomplished by writing a program to solve the bounded buffer problem using monitor concept. Your program must be written using C or C++ and you are required to use the Pthread libraries.
Bounded buffer is used to enable multiple producers and consumers processes to share memory. A producer can place items into the buffer only if the buffer has a free memory location to store the item. A producer cannot add items to a full buffer. A consumer can remove items from the buffer if the buffer is not empty. A consumer must wait to consume items if the buffer is empty. The “items” stored in this buffer will be integers. Your producer processes will have to insert random numbers into the buffer. The consumer processes will consume a number.
Java – Process Synchronization
In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data.
Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5.
disaster recovery plan in cybersecurity
Business continuity and business impact analysis are essential models for all businesses but can be costly. Pick an organization and create a disaster recovery plan for that business.
Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).
Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.
offer advice and suggestions on thing we should do or should not do in disaster recovery plan
3 pages
Data Analytics
1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data? Explain why or why you cannot do analytics without big data?
2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.
1. What is data mining? Why is data mining so popular?
2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion.
3. Distinguish data mining from other analytical tools and techniques.
4. Discuss at least 3 data mining methods. What are the fundamental differences among them
The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)
Hackers and ethics
My topic is about Hacker and Ethics
empowering leadership and effective collaboration
This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:
- How do geographically dispersed teams collaborate effectively?
- Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool.
- Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.
The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
Discussion (Chapter 4):
What are the privacy issues with data mining? Do you think they are substantiated?
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 100-300 words. Respond to two postings provided by your classmates.