Please find the hep doc below.
Analyze how advanced security concepts are applied to develop secure code
You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.
- Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
- What is the value of secure communications to the company?
- Are there any international transactions that the company produces?
- Are there governmental restrictions about secure communications to consider?
- What external threats might be present now and in the immediate future?
- What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
- Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.
*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.
- Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
- Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
- The names or vulnerability codes of the known vulnerabilities
- A brief description and recommended solutions provided by the dependency check report
- Attribution (if any) that documents how this vulnerability has been identified or documented previously
- Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.
*Please note: You do not need to fix these vulnerabilities in this project.
read the articles and answer the following question.
1. Read the attached article “Why the Future Doesn’t Need Us” by Bill Joy. Appeared in Wired, issue 8.04, April 2000;
2. Read a summary of Professor Peter Singer’s lecture on ethics and technology; (Links to an external site.)
3. Read Tech Ethics Issues We Should All Be Thinking About In 2019 (Links to an external site.).
4. Write a paper containing answer to the following questions. Your paper should present your understanding of ethical dimensions and unintended consequences of technology.
- What do you strongly agree with in the articles? and Why? (20 points)
- What do you disagree with in the articles? and Why? (20 points)
- What kind of person Bill Joy seems to you, an idiot, a Luddite, or a genius? and Why? (5 points)
- Are the assumptions in both the articles sound? (5 points)
Requirements:
Please make your analytic points specific; The paper cannot be just a collection of generalities and cannot contain too many direct quotes from the articles. Find something interesting to say. Reference any ideas that are not your own in APA format.
The paper should be at least 1 page but no more than 2 pages long, single line spacing, use a font size of minimum 10 points but no larger than 12 point. Set margins to 1 inch on all sides. Use correct grammar.
Save your paper in a Word document and name it as P4_FL.docx where FL are your first and last name initials. Use the link Assignments -> Project 4 to submit your document.
Emerging threats_4.2
Discussion:
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.
When or where would you think it would be necessary to implement security measures for both?
At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.
Numerical computation Project
Project Description
– Learn one state of the art multivariate analysis method
• NMF, PCA, ICA, NN, CNN, etc.
– Apply matrix analysis and numerical computation on real world data sets
• image, video, audio, social media, sensory signals, etc.
Project Topics
– Given topics
• Numerical computing in econometrics • Applications of the SVD
• Multi-level non-negative matrix factorization • Multi-view non-negative matrix factorization
• Advanced principal component analysis • Binary independent component analysis
• 1D convolutional neural networks • Survey of automatic rank determination in non- negative matrix factorization
– Free optional topics
• You can also search and select a topic other than above given topics as your final project. But your topic should be related to matrix, multivariate analysis and numerical computation. Please send me your topic for approval in advance if you choose a free optional topic.
Project Deliveries
– Project proposal (template will be given)
• Topic, method, application, novelty
• Novelty (new investigation, new trials, new idea, new design, technology improvement)
– Presentation (10m presentation)
– Project report
•Experiment and discussions
• Findings and conclusions
• In paper format (template will be given)
• Good quality project reports will be refined and polished by Dr. Sun and submitted for publication • https://cscsu-conference.github.io/
PS. Paper types file is the guide line for this project.
Proposal template have to be used for the project proposal.
Lab report template has to be used for the lab report.
There are explanations for .zip files in the Paper types file.
Ps. LATEX compiler and Editor Link
MiKTex :: https://miktex.org/download
Texmaker :: https://www.xm1math.net/texmaker/download.html
Discussion
“As organizations expand their digital infrastructures, the amount of data being collected is growing at an ever-increasing pace. This deluge presents a new set of challenges, and the most crucial of these — making sense of it all — depends on data visualization. Digital tools like Many Eyes and Tableau Software have empowered companies and the public to create visualizations using built-in templates, but they have also spurred a desire for more control over visual method, layout, style, and branding.”
Find two data visualization products to review. These may be either a products which you are already familiar, or products you could research.
Provide a 250 word review of the two products in responding to the following questions:
Regarding the use of data visualizations, what are the products’ advantages? What are some of the products’ disadvantages? Which product would you prefer and why?
Discussion Length (word count): At least 250 words
References: At least two peer-reviewed, scholarly journal references.
Enterprise Risk Management
Description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
- Ask an interesting, thoughtful question pertaining to the topic
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
System analysis
Assume you are hired by the XYZ company as Systems Analyst to prepare a cost-benefit analysis report for building an R&D laboratory for its staff with the following specifications:
- The company already have a large hall reserved for the purpose, meaning the owner will not have to rent the space.
- The lab will have ten computer spaces with a computer table and chair.
- Each computer space is to be equipped with a high-performance laptop, a headphone and a scanner.
- Each laptop will have an operating system (i.e. Microsoft Windows), word processing package (i.e. Microsoft Office 2016) and an antivirus (i.e. Kaspersky Antivirus) installed
- All the computers need to be connected with the internet (requiring the purchase of a router and internet connection from an Internet Service Provider)
- The laptops in the lab will share a heavy-duty printer available on the network
This lab will be established in Year 0 and you have to calculate the cost of establishing it. You can use the e-commerce websites (e.g. Amazon Saudi Arabia, Jarir Book Store, Extra Store etc.) to gather the costs of each of the above-mentioned items to be purchased and thus estimate the total cost of establishing the lab (in SAR).
Once the lab is operational, benefits and ongoing costs are projected over a period of three years according to the table shown below:
Year 0
Year 1
Year 2
Year 3
Total
Total Benefits
25,000
40,000
62,000
Total Costs
To be estimated
10,000
11,000
17,000
(Note: The cost of establishing the lab that you have already estimated (in SAR) for year zero is to be entered in the cell “To be estimated” in the table)
Based on the information in the table above, calculate:
- The total benefits and total costs over the duration of three years.
- The return on investment (ROI)
- The break-even point (BEP)
4 computer questions
DUE IN 24 HOURS – ANSWER IN 1 TO 3 SENTENCES
Why is it beneficial for all I.T. users to know something about programming?
How are algorithms and programs similar and different?
What would be your approach to writing a program as a solution to a business?
Why do you think the ability to create and manage programs are sought after skills across industries?
SQL DATA BASE
Create a Microsoft Word document. For each task, paste a screenshot (more than one if necessary) into a single Word document proving that you have carried out the task.
Download/install MySQL Server and Workbench if you have not already done so. Start the server, open MySQL Workbench and create a connection for the root account. Connect to the server using this connection.
I have uploaded the word document which has questions to be done and following files.