“Assessing Cybersecurity Readiness within SMEs: Proposal of a Socio-Technical based Model.”

Assignment Content

  1. At this point, you have found 4 research articles exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class

    For this assignment:  You will use ONE of you research articles from p. 13a to write your first objective summary. 
    Requirements:

    • 15 pts, Cover/Title Page 
    • 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS 
    • 15 pts, References Page (you will only have one reference listed — the research article you are using.) 
    • Resources to help you:
    • Re-watch the class recording
    • See pp. 17-22 to read about objective summaries
    • See pp. 23-28 to read more about avoiding plagiarism

Signature Assignment – Security Threat Awareness Infographic & Presentation

  

Imagine you are the Information Systems Security Officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Create a 1-page infographic or job aid of the cyber domain using the DoD or OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation.

Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training in your presentation.

Select 3 threats from your infographic or job aid.

Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines. 

discussion

 

With the change this week’s assignment to using PHP for form validation instead of JavaScript, let’s use this to share some resources about how to do it as well as other things that PHP can do. Share 2 resources about PHP, one with form validation and another showing another feature that you could implement as part of your site. Be creative!

Project 3

 

Project 3: Support Queue Case Study Instructions For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group. As you prepare to analyze and hopefully

Project 3: Support Queue Case Study
Instructions
For this project, you will apply the CompTIA 6-Step Troubleshooting Process to explain how you would tackle Hudson Fisher Associates Help Desk Tickets. There are three groups of tickets, Level 1, Level 2, and Level 3. You will pick two tickets from each group.
As you prepare to analyze and hopefully solve these typical IT help desk tickets, keep in mind that for this course, it is more about the process and less about finding the “correct” answer. You may not always find an exact answer from the information given. The problems are structured to approximate what you will find in the workplace. Use a logical and repeatable process (e.g., the CompTIA 6-Step Troubleshooting Process) and eliminate the improbable as you work your way through each scenario.
CompTIA 6-Step Troubleshooting Process:
1. Identify the problem.
2. Establish a theory of probable cause.
3. Evaluate the theory to determine the actual cause.
4. Establish a plan of action to resolve the problem and implement the solution.
5. Verify full system functionality and if applicable implement preventative measures.
6. Document findings, actions, and outcomes.
How Will My Work Be Evaluated?
As you progress in your information technology and cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. For this assignment, you should articulate your findings from the six support cases.
But the challenge you face is in expressing a technical solution to a nontechnical audience. Avoid jargon and acronyms. Find a way to relay your solution (and challenges) in language that your audience will find easily relatable.
Communicating in this manner will not always be easy. You may struggle to find the right analogy or metaphor. But if you can master the skill of summarizing your results and recommendations to management in an effective presentation, you will demonstrate how you use your technical knowledge to convey your ideas to others in a professional setting. You will also earn the respect and trust of your peers, your supervisor, and upper management as an effective communicator. You will be viewed as an employee ready for advancement.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
• 1.1.1: Articulate the main idea and purpose of a communication.
• 1.1.3: Present ideas in a clear, logical order appropriate to the task.
• 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
• 2.1.1: Identify the issue or problem under consideration.
• 2.3.1: State conclusions or solutions clearly and precisely.
• 12.7.2: Explain the process of analyzing IT incidents.
• 13.1.1: Create documentation appropriate to the stakeholder.
Your deliverable for the project is an annotated PowerPoint Presentation covering the following:
• List of the six tickets you selected (two each from Level 1, Level 2, and Level 3)
• One to two slides for each ticket, in which you:
o State the problem.
o Describe the steps taken to troubleshoot/analyze the problem.
o Propose a brief resolution.
• One summary slide: What did you find challenging or interesting about one or two of the support cases (opinion-based)?
• One reference slide (two to six IEEE references). Include references for materials you consulted in TestOut or on the internet.
If you haven’t already done it last week, download the Support Queue Case Study Presentation Template to get started.
Delete the instructional text from the template before you submit.
When you are finished, click “add a file” to upload your work, then click the Submit button

INFS 4950 Project

Develop your own Comprehensive Web Application

  • Synthesize the conceptual information covered in previous modules to propose your own comprehensive web-based application that you will develop
  • Design a consistent look for your web application 
  • Create an intuitive navigation structure for your web application
  • Develop your proposed web application using the ASP.NET Core MVC tools and coding techniques covered in previous modules
  • Incorporate at least one user story within your application for adding, updating, and deleting data in a database table

Discussion

For whichever U.S. state you are currently residing in(state – Kansas), research its breach notification law. Note that some states do not label it as such, but all 50 states have some form of legislation that mandates an organization’s responsibilities when a data breach affects the state’s citizen’s private, protected information.

What types of organizations or individuals does it apply to? 

Is it limited to only those organizations or individuals who reside or exist in that state, or might it affect external interests? 

How does the law define or describe the information that it protects, by both name and description? 

What exemptions, if any, exist? 

What are the penalties for violating the law? 

In your opinion, is it effective? Good law? Needing updating? What other critiques or opinions do you have about it? 

Comprehension

  

Part I: Comprehension of java programming concepts (Total 16):

Answer the following questions in a paragraph using full sentences.

  1. Define the term inheritance in java and give an      example.(4 points).

2. List two differences and one similarity between an interface and an abstract class (6

Points).

Differences 

1) Abstract class is a class which contains one or more abstract methods, which has to be implemented by sub classes. An abstract class can contain no abstract methods also i.e. abstract class may contain concrete methods. 

 

3. Describe the Java Collections Framework. Explain the differences between the Set, List and Map interfaces referring to the elements/objects that they store. (6 points)

Part II Fill in the blanks (Total 20 points):

Complete each sentence or statement with the missing word(s)

Type in the missing word(s) in the given box, , to complete each statement.

1. (2 pts)The constructor of a derived class can access the constructor of its base class by

using the java reserved word(keyword).

2. (2 pts) binding is when the meaning of a method invocation is not bound to it until the program is run.

3. (2 pts) Adding the  modifier to a method heading prevents derived classes from

overriding the method.

4. (2 pts) A(n) specifies headings for methods that must be defined by an

class.

5. ( 2 pts) In Java, every class is a descendant of the class

6. ( 2 pts) Object-oriented programming allows you to derive new classes from existing

classes. This is called.

7. (2 pts) may be used to convert an object of one class type to another within the

inheritance hierarchy.

8. (1 point each) A(n) class can be extended with the condition of providing

implementations for all of the methods of the class.

9. (2 pts) A(n) is a kind of component that can have other components added to it.

10. ( 2 pts) You can refer to any member of the current object from within an instance

method or a constructor by using the java keyword .

 

Part III: Multiple Choice Questions(Total 28 pts)

Identify the letter of the choice that best completes the statement or answers the question.

Type the letter “X” in the given box, , to indicate the selection. (2 points each).

1.When comparing two objects to see if they have the same contents, one should

a. use the = operator

b. use the == operator

c. define an equals method in the class and use it

d. use the equals method to see if they have the same variable name

2. The term overloaded refers to

a. an error where more than one method matches a method call

b. two or more methods in the same class that have the same name

c. method calls where there are two many actual parameters

d. two or more methods in different classes that have the same name

3. Suppose Child is a derived class of Parent and doStuff() is a private method in the class

Parent. Which of the following is true?

a. doStuff() may be used in the definition of methods in Child.

b. doStuff() may not be used in the definition of methods in Child.

c. In some, but not all cases, doStuff() may be used in the definition of methods in Child..

d. none of the above

4. Which statement best describes overriding a method?

a. Methods in a base class and derived class have the same name but different visibility

modifiers.

b. Methods in a base class and derived class have the same name and have the same

number and types of parameters.

c. Methods in a base class and derived class have the same name but have different return

types.

d. Methods in a base class and derived class have the same name but different number or

types of parameters.

5. Assume that Sub1 and Sub2 are both subclasses of class Super.

Given the declarations:

Super super = new Super();

Sub1 sub1 = new Sub1();

Sub2 sub2 = new Sub2();

Which statement best describes the result of attempting to compile and execute the following

statement:

super = sub1;

a. Compiles and definitely legal at runtime

b. Does not compile

c. Compiles and may be illegal at runtime

6. For the following code:

class Super

{ int index = 5;

public void printVal()

{ System.out.println( “Super” );

}

}

class Sub extends Super

{ int index = 2;

public void printVal()

{ System.out.println( “Sub” );

}

}

public class Runner

{ public static void main( String argv[] )

{ Super sup = new Super();

System.out.print( sup.index + “,” );

sup.printVal();

}

}

What will be printed to standard output?

a. The code will not compile.

b. The code compiles and “5, Super” is printed to standard output.

c. The code compiles and “5, Sub” is printed to standard output.

d. The code compiles and “2, Super” is printed to standard output.

e. The code compiles and “2, Sub” is printed to standard output.

f. The code compiles, but throws an exception.

7. What will happen when you attempt to compile and run the following code. Classes are

saved in separate files.

8. Which of the following statements is true?

a. An interface can only contain method(s) and not variables

b. Interfaces cannot have constructors

c. A class may extend only one other class and implement only one interface

d. A class accesses an interface via the keyword uses

9. An abstract class

a. is a class which cannot be instantiated

b. is a class which has no methods

c. is a class which has only abstract methods

d. is a class which has only overridden methods

CMIS 242 2009-10, Spring, Session 1 Nafia Gungordu

10) Which of the following statements is false?

a. If a class has any abstract methods it must be declared abstract itself.

b. All methods in an abstract class must be declared as abstract

c. When applied to a class, the final modifier means it cannot be sub-classed

d. abstract and interface are Java keywords

11. A catch-block

a. is a special method used in exception handling

b. allows the user to specify what will happen next in the program

c. is not allowed in the same method as a try-block

d. contains code that is executed when an exception occurs

12. Given the following code

import java.io.*;

public class Ppvg{

public static void main(String argv[]){

Ppvg p = new Ppvg();

p.fliton();

}

public int fliton(){

try{

FileInputStream din = new FileInputStream(“Ppvg.java”);

din.read();

}catch(IOException ioe){

System.out.println(“flytwick”);

return 99;

}finally{

System.out.println(“fliton”);

}

return -1;

}

}

Assuming the file Ppvg.java is available to be read correctly which of the following

statements is true if you try to compile and run the program?

a. The program will run and output only “flytwick”

b. The program will run and output only “fliton”

c. The program will run and output both “fliton” and “flytwick”

d. An error will occur at compile time because the method fliton attempts to return two

values

13. What is the default layout manager for a JPanel?

a. FlowLayout

b. BorderLayout

c. GirdLayout

d. No default layout manager

14.Suppose you want to display a text in multiple lines, which component should you use?

a. JButton

b. JLabel

c. JTextField

d. JTextArea

Part IV: Comprehension of java programming code (Total 36pts. ):

Please indicate what is displayed on the console(standard output) when the following program/code is

executed? Please note that all the given codes can be compiled and executed.

1. (5 Points) Consider the following classes saved separately:

public class Base

{

private int num = 10;

public void print()

{

System.out.println(num);

}

public void setNum(int j)

{

num = j;

}

}

public class Derived extends Base

{

public void setNum(int j)

{

super.setNum(j + 10);

}

}

public class BaseDriver{

public static void main(String[] args)

{

Derived d = new Derived();

d.setNum(20);

d.print();

}

}

What is the output?

         

2. (5 points)Consider the following classes saved in separate files:

public class Base

{

public void print(Base b)

{

System.out.println(“Base”);

}

}

public class Derived extends Base

{

public void print(Derived b)

{

System.out.println(“Derived”);

}

}

public class BaseDriver{

public static void main(String[] args)

{

Base d1 = new Base();

Derived d2 = new Derived();

d1.print(d1);

d1.print(d2);

}

}

What is the output?

 

3. (6 points)Consider the code below:

void myMethod()

{ try

{

fragile();

}

catch( NullPointerException npex )

{

System.out.println( “NullPointerException thrown ” );

}

catch( Exception ex )

{

System.out.println( “Exception thrown ” );

}

finally

{

System.out.println( “Done with exceptions ” );

}

System.out.println( “myMethod is done” );

}

What is printed to standard output if fragile() throws an Exception called

IllegalArgumentException?

 

4. ( 6 points)What is displayed on the console when the following program is run?

public class Test {

public static void main(String[] args) {

try {

int[] a = new int[10];

a[10] = 1;

System.out.println(“Welcome to HTML”);

}

catch (Exception ex) {

System.out.println(“There is an exception”);

}

finally {

System.out.println(“The finally clause is executed”);

}

}

}

What is the output?

5. (6 pts)Design a java interface called Priority that includes two methods: incrementPriority

(void method)and getPriority(returns an integer). The interface should define a way to

establish numeric priority among a set of objects.

6. ( 8 points)What is the output of the following program? Please view/use the “References”

section at the end of the exam.

import java.util.*;

public class Exercise{

public static void main(String[] arg){

ArrayList list = new ArrayList();

list.add(0,”One”);

list.add(1,”Two”);

list.add(2,”Three”);

list.add(3,”Four”);

list.add(4,”Five”);

System.out.println(list);

list.remove( 3 );

System.out.println(list);

System.out.println(list.get(2));

list.set(1,”Hello”);

System.out.println(list);

}

}

What is the output?

Class ArrayList

Resizable-array implementation of the List interface. Implements all optional list operations,

and permits all elements, including null. In addition to implementing the List interface, this

class provides methods to manipulate the size of the array that is used internally to store the

list. (This class is roughly equivalent to Vector, except that it is unsynchronized.)

Method Summary

Appends the specified element to the end of this list.

Inserts the specified element at the specified position in this list.

Appends all of the elements in the specified Collection to the end of this list,

in the order that they are returned by the specified Collection’s Iterator.

Inserts all of the elements in the specified Collection into this list, starting at

the specified position.

Removes all of the elements from this list.

Returns a shallow copy of this ArrayList instance.

Returns true if this list contains the specified element.

Increases the capacity of this ArrayList instance, if necessary, to ensure that it

can hold at least the number of elements specified by the minimum capacity

argument.

Returns the element at the specified position in this list.

Searches for the first occurence of the given argument, testing for equality

using the equals method.

Returns the index of the last occurrence of the specified object in this list.

Removes the element at the specified position in this list.

Removes a single instance of the specified element from this list, if it is

present (optional operation).

protected

void

Removes from this List all of the elements whose index is between

fromIndex, inclusive and toIndex, exclusive.

Replaces the element at the specified position in this list with the specified

element.

Returns the number of elements in this list.

Returns an array containing all of the elements in this list in the correct order.

T[]

Returns an array containing all of the elements in this list in the correct order;

the runtime type of the returned array is that of the specified array.

Trims the capacity of this ArrayList instance to be the list’s current size.

S-4/Wk1

 Assignment 1

After reading “Discussion PPT”, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organization’s security posture.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.