Software Project Management -2 Dis

 

Read chapter 2. Answer questions 1-3 on page 57, Internet Exercises from the textbook. Submit the RFP that you download.

  1. Based on the results of your search, find an RFP that has been posted on the Web. What company developed the RFP, and what is the company looking to accomplish?
  2. Evaluate the effectiveness of this RFP based on information you have studied in this chapter. Discuss the strengths and weaknesses of the RFP. Are there any items missing from the RFP that should have been included?
  3. Download the RFP, and based on what you learned in this chapter, revise it. Highlight the areas you revised. What makes your revised RFP better than the original?

Enterprise risk management Research 6

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Wk 3 – Apply: Hacking Threats

Assignment Content

  1. This week, your flooring sales and installation company client wants you to explain the different kinds of attack threats their business faces from hackers.

    Write a 1- to 2-page memo or create a 1- to 2-page table that summarizes attack threats from hackers to any business, noting which are applicable to your client’s business; how the vulnerabilities in a system can be exposed; and countermeasures that can mitigate against threats from attack.

    Describe sniffing attacks, identify a protocol that is vulnerable to sniffing, and suggest appropriate countermeasures.

    Describe session hijacking, provide an example of a specific threat from session hijacking, and recommend appropriate countermeasures for the threat. 

    Describe spoofing, provide an example of a specific threat from spoofing, and recommend appropriate countermeasures for the threat. 

    Describe poisoning attacks, provide an example of a specific threat from a poisoning attack, and recommend appropriate countermeasures for the threat. 

    Describe denial-of-service (DoS) attacks, explain the threat from DoS attacks, and recommended countermeasures that can prevent them.

    Format your references according to APA guidelines.

Discussion Question

 Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world. 

Java Reservation class Create a class named Reservation that defines a reservation

 

Reservation Calculator
Enter the arrival month (1-12): 5
Enter the arrival day (1-31): 16
Enter the arrival year: 2018
Enter the departure month (1-12): 5
Enter the departure day (1-31): 18
Enter the departure year: 2018
Arrival Date: May 16, 2018
Departure Date: May 18, 2018
Price: $145.00 per night
Total price: $290.00 for 2 nights
Continue? (y/n): n
Bye!

Specifications

Create a class named Reservation that  defines a reservation. This class should contain instance variables for  the arrival date and departure date. It should also contain a constant  initialized to the nightly rate of $145.00.

The Reservation class should include the following methods:

  • public LocalDate getArrivalDate()
  • public String getArrivalDateFormatted()
  • public setArrivalDate(LocalDate arrivalDate)
  • public LocalDate getDepartureDate()
  • public String getDepartureDateFormatted()
  • public setDepartureDate(LocalDate departureDate)
  • public int getNumberOfNights()
  • public String getPricePerNightFormatted()
  • public double getTotalPrice()
  • public String getTotalPriceFormatted()

Assume  that the dates are valid and that the departure date is after the  arrival date. You must allow the user to enter the date in the  MM/DD/YYYY format.

Reservation class
Create a class named Reservation that defines a reservation


This criterion is linked to a Learning OutcomeInstance variables
Reservation class should contain instance variable for the arrival date.
Reservation class should contain instance variable for the departure date.

Nightly rate constant
Reservation class should also contain a constant initialized to the nightly rate of $145.00.

Entry format for dates
Allow the user to enter the date in the MM/DD/YYYY format.

This criterion is linked to a Learning Outcomepublic instance methods
The Reservation class should include the following methods:

public LocalDate getArrivalDate()

public String getArrivalDateFormatted()

public setArrivalDate(LocalDate arrivalDate)

public LocalDate getDepartureDate()

public String getDepartureDateFormatted()

public setDepartureDate(LocalDate departureDate)

public int getNumberOfNights()

public String getPricePerNightFormatted()

public double getTotalPrice()

public String getTotalPriceFormatted()

cybersecurity week 4

All posts must be a minimum of 250 words each for Question 1 and 2. APA reference for each questions. 100% original work. no plagiarism.

QUESTION 1: 

For this discussion, discuss how and why a network engineer would want to implement Virtual LANs in their network.

QUESTION 2: 

1. What are the functional control types? provide an example for each type.

2. What is the principle of least privilege? Why is it important to implement?

3. List and briefly discuss the User Domain Compliance Requirements.

Government Presence on the Internet

Describe several situations, imagined or actual, where good policy intentions could work in your favor, or go astray. In your overall estimation, should there be more or less government presence on the internet? Give some concrete examples, especially in business situations. Use real-life examples where possible.