pro4

The final two appendices for your SSP are the Certification Statement (Appendix 5) and the Accreditation Letter (Appendix 6). To develop these appendices, use the format provided in the Howard text as follows:

  • Certification Statement, found in Appendix R, page 293
  • Accreditation Letter, found in Appendix S, page 297

Insert these appendices in the SSP.

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Can someone help me

 Chapter 3: Requirements and analysis. This should state, in a more detailed way, the  objectives of the project by requirement and the analysis should break the problem down into  manageable steps. There may be more than one suitable approach; the analysis may cover more  of the area than is finally implemented. Suitable diagram-techniques (e.g. UML, other drawings)  should be used where appropriate. If a method is applied selectively, explain which parts were  used and why. Experimental projects should pay careful attention to control conditions, samples  selected, etc. to ensure a valid result. Testing and evaluation should be given due consideration.  It is important that you state how you will evaluate your work. For a design project it is  appropriate to consider testing at the same time as specification. 

dwek3

 Please use this reference:  https://www.pbs.org/video/fake-news-vs-real-news-ltadaw/

Discussion:
Fake news is no longer a matter of the occasional hoax. There is growing evidence that fake news has the power to shape public opinion and even sway elections. As more Americans get their news online, it is increasingly vital that we as consumers know how to verify sources and spot fake news.
Topic 1 Questions:

  1. Explain at least two ways fake news could affect results of political elections?
  2. What can companies like Facebook and Twitter do to stop users from spreading fake news? What can we, as consumers, do? What do you think would work, especially with younger users?

Topic 2: Deepfakes

This week you read about Deepfakes (https://www.youtube.com/watch?v=T76bK2t2r8g) in two different Read & Watch items, one created by CNN Business and one by Forbes.

Discussion:
Deepfake technology will certainly become more prevalent as we move into the future.
Topic 2 Questions: 

  1. How concerned are you about the negative impact Deepfakes could have on society?

You MUST type all of your answers

  

· You MUST type all of your answers for each question in the space provided. 

· For full credit, you need to show all of your work when requested.

· You MUST save your exam file as “LastName, FirstName – Final” and place it in the Drop Box before the deadline specified in the ENGAGE online course shell. Note that you have a total of 6 hours (typed answers only) OR 80 minutes (handwritten answers) once you access the exam file.

· You can easily insert symbols by copying & pasting what you need from the following list. 

  1. [5 pts] Given the word below, tell what characters      are stored in the computer memory. We assume our computer uses 8 bits      to represent a single character. Use the ASCII table and show all of your      work.
  2. [5 pts] Given the word below, tell what decimal      number (base 10) is stored in the computer memory. We assume our      computer uses 16 bits to represent an integer. Show all of your      work. 
  3. Write a Formal Negation for the      following statements using symbols (/) and      variables. There is no partial credit for this problem.
    1. [5 pts] qR such       that q < 0 and qq3.
    2. [5 pts] bZ, if 2 b,       then b is odd.
  4. In the questions below, suppose A = {a, b, c} and B = {a, b, {c}, d}.
    1. [5 pts] Is A Í B.? Make sure to justify       your answer.
    2. [5 pts] Find the power set of A: P       (A)
  5. [5 pts] Show the following number is a      rational number. Show all of your work.
  6. [10 pts] Use the Euclidean algorithm to      calculate the greatest common divisor of the following pair of integers:      2431 and 4131. Show all of your work. 
  7. [10 pts] Disprove the following      statement:
  8. [10 pts] Write a proof by contraposition      of the following statement:
  9. You need to show that the following      equality is false by doing the following:
    1. [5 pts] Draw a Venn diagram for each       side.
    2. [5 pts] Disprove the equality
  10. [10 pts] Write a proof by contradiction      of the following statement.

Easy own words

  Need to be in APA format with proper citation and references.Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, one tool for each of the three network management areas. What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not? Required Section Headings:

  • Introduction
  • Policy Compliance Tool
  • Bandwidth Management Tool
  • Asset Management Tool
  • Tool Comparison
  • Summary/Conclusion

Remember to support your statements with factual information (i.e., attribution/citations). In addition, material from the course textbook or the textbook’s author(s) cannot comprise more than 25% of the sourced and/or quoted material.The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2020), (7th ed.), and  contain, at least, three scholarly/peer-reviewed references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the Turnitin originality-checking tool.  More APA assistance can be found at the Purdue University Online Writing Lab (Links to an external site.).

**********Required about 5-6 pages including title and reference pages separately.*********  

This assignment is built using the code from Assignment 5

  

This assignment is built using the code from Assignment 5.
In this assignment create a separate serialized file using ObjectOutputStream for each student.
File should contain student’s score and statistics for entire class.
model –
ReportCard that contains Stats and Student
Statistics
Student
util –
FileIO
separate serialized file (contains student’s score and statistics)Using debug mode (with Debug flag) print the contents of the serialized file.
Create and implement an interface to:
Print student statistics.
Print scores for a given student id.
implement the Debug flag globally
Use an abstract class to implement all the methods declared in an interface. 

Lab 6 -ReportCard should work with upto 40 students
How is ReportCard created? by util –
readFile – returns an array of students.
Statistics – computes statistics
build report card object – in an array – so you can easily serialize each ReportCard –
Interface – Reportable
public void printscores(int id);
public void printstats();
public boolean DEBUG = true;
public abstract class RCOutline implements Reportable {
public void printscores(int id) { }
public void printstats() { }
}public class Driver extends RCOutline {
public static void main(String [] args)
{}
}and this
In this assignment create a separate serialized file using ObjectOutputStream for each student.
File should contain student’s score and statistics for entire class.
model –
ReportCard that contains Stats and Student (make this class abstract) – let it implement Reportable interface.
Statistics
Student
util –
FileIO
separate serialized file (contains student’s score and statistics)Using debug mode (with Debug flag) print the contents of the serialized file.
Create and implement an interface to:
Print student statistics.
Print scores for a given student id.
implement the Debug flag globally
Use an abstract class to implement all the methods declared in an interface.Lab 6 -ReportCard should work with upto 40 students
How is ReportCard created? by util –
readFile – returns an array of students.
Statistics – computes statistics
build report card object – in an array – so you can easily serialize each ReportCard -Interface – Reportable
public void printscores(int id);
public void printstats();
public boolean DEBUG = true;public abstract class RCOutline implements Reportable {
public void printscores(int id) { }
public void printstats() { }
}public class Driver extends RCOutline {
public static void main(String [] args)
{}
}11/20 – If RCOutline is not created and ReportCard becomes abstract – then ReportCard must be extended to be instantiated./adapter –
Reportable
ReportCard
Any class that extends ReportCard to instantiate ReportCard/driver
/Driver.java
Reportable a1 = new ChildReportCard(“35a.txt”);
a1.printscore(1221);
a1.printscore(1223);
a1.printscore(1224);
a1.printstats();

Assignment 5.
In this assignment create a separate serialized file using ObjectOutputStream for each student.
File should contain student’s score and statistics for entire class.
Using debug mode (with Debug flag) print the contents of the serialized file.
Create and implement an interface to:
Print student statistics.
Print scores for a given student id.
implement the Debug flag globally
Use an abstract class to implement all the methods declared in an interface.

Activity 9- Project Risk

Over the past few decades, one of the most common types of projects within a business is the development of a new piece of software to facilitate a certain facet of business operations. This assignment entails a project concerned with the creation of a new version of business expense software for the entry of, tracking of, and payment of business expenses accrued by organizational members during normal business operations such as reimbursing employees for expenses they personally paid for during their business related travel.Assignment

  1. Your first task is to create a risk matrix in EXCEL.
  2. Identify the risks to be addressed with a rational as to why you have chosen these risks from the matrix.
  3. Explain which of the four remediation methodologies you will use for each risk and why.

Requirements:

  • There is no minimum or maximum required number of pages. Your response will be considered complete, if it addresses each of the components outlined above.
  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13