Discussion boards – 3

DB1 (400 – 600 words) 

Create a main post that highlights 2 best practices regarding the implementation of a security plan. This can be anything from the organizational change management aspects (users) or the technical implementation (information technology staff).

  • Describe and evaluate each strategy.

DB 2 (400 – 600 Words)

 

The security awareness program for your company should include a time line of activities (such as security fair, or special “brown bag” meetings) and the types of communications (newsletters, placards, etc.) that would need to be sent to the users. Consider best practices for implementing your Enterprise Security Strategy Plan.

Identify at least 3 activities that would be part of your Enterprise Security Strategy Plan, and provide the following:

  • Approximate timing for roll out
  • Required communications
  • A brief explanation for choosing this implementation activity

DB 3 (400 – 600 Words)

 

Create a main post that highlights 2 key areas to either engage in the normal, everyday operations of a security team, or 2 key areas to monitor, and why. Explain why you have chosen these areas. Provide both the values you would hope to see and the actions you would take if what you saw was not in alignment with that optimal range.

Some examples are the following:

  • Security incidents (per week, month, or year)
  • Viruses detected
  • Administration violations (unauthorized changes)
  • Spam not detected
  • Invalid log-in attempts

apply: signature assignment

A project plan outlines recommended approaches to the use of the network, database management system, software, and cloud service technologies. Because industry best practices dictate transparency in terms of selection criteria and their importance to a specific project, a project plan draft should also include the criteria by which the recommended approaches were selected, along with the benefits to the project that each is expected to deliver.

For this assignment, you will draft a project plan for the project proposal you outlined in Week 1 (and that you updated earlier this week based on instructor feedback).

Download the Project Plan Draft.

Using the Project Plan Draft template, outline your project plan for the business scenario that was approved by your instructor last week. Add lines to each table as needed. Your project plan will include:

  • Network technology recommendation(s)
  • Database management system recommendation(s)
  • Appropriate software application recommendation(s)
  • Cloud service recommendation(s)

Research

 

Use only online article databases found through a university library (such as the UoF Library Portal) and/or Google Scholar to complete this assignment. Suggested databases for this assignment are:  IEEE Xplore, the ACM Digital Library, the Academic OneFile, Expanded Academic ASAP, and Computer Database, though you may use other article databases as well.  Summarize the results of this assignment in a 3-5 page report, ensuring that you report the results of each of the tasks outlined.  Make certain to write an introduction and conclusion for your report.

  1. Find a book about the adoption of biometrics for use in information security. Provide a list of the key words used to find the book. Provide the specific database or web page in which you located the book.  Provide a reference citation for the book in the introduction of your report.
  2. Find out if the author has published other books or articles, on the same topic or other topics (related or not).  You can do this by searching the article databases for other publications by the same author, as well as searching the Web via Google Scholar. Did the publications (or lack of it) affect your confidence in the experience and authority of the author?
  3. Find a book review published in a popular magazine, trade publication, or scholarly journal about the book identified in task number one above and answer the following questions:
  • How did you find the review?  Discuss your research strategy.
  • What did the reviewer say about the book?
  • Is the reviewer qualified to review this book?  Look for related degrees or certifications.  If this information is absent from the review, note that in your report.
  • Did the review affect your attitude about the credibility of the author or the content of the book?
  1. Based on the book review, the publishing history of the author, and references made to the book by other authors, summarize how you would classify this book as an information source. Do you think it is a credible source for use in secondary research? Why or why not?
  2. Conclude with a discussion about what you learned about performing secondary research as a result of this exercise. In addition, include the opinions you formed about the quality of the information sources that are available to you through the library’s article databases versus Google Scholar.

Project 2: introduction to programming in python

 

Introduction

The purpose of this project component is to provide a first experience in the actual writing of computer programs. Using a relatively simple introductory scripting language (Python), you will create program code in an editor (Notepad), save it to your disk, and run it from the command line prompt.

You will gain experience in planning, writing, debugging, documenting, and running simple programs. Learning Python serves as a convenient stepping-stone to more complex object-oriented languages, such as Java.

In this project, you will use online resources, including downloadable Python tools and tutorials.

Before writing programs, it is useful to plan the programming steps and actions by writing an algorithm. An algorithm is a set of plain English language commands or steps, each of which is then replaced by the appropriate command line for the programming language used. This technique becomes less useful when using complex object-oriented languages such as Java, but may be helpful in the early stages of learning to design programs. You will write algorithms for your first two programming exercises in this project.

The project will be graded for completeness and correct functioning of programs.

Acquiring the Tools

Download and install Python version 2.2 or higher by following the instructions at the Python download site.

The downloaded file will be called Python-2_2.exe. After downloading, run this file to complete the installation. You can view the installed components from your “Start” list.

Writing Algorithms

In the traditional approach to programming, the program is seen as a series of steps, which may include branches and loops. A branch occurs when a program may go in two or more different directions, depending upon a logical condition or a choice made by the user. A loop is a situation where a particular step, or series of steps, may be repeated until a certain condition or choice occurs.

The following simple example of an algorithm includes both elements, and describes a simple program for performing addition or multiplication.

Step 1—display the program name “Addition and Multiplication”

Step 2—display the options menu “(A)dd, (M)ultiply”

Step 3—request and store input of user choice A or M as “choice”

Step 4—if “choice” does not equal “A” or “M”, go to Step 9

Step 5—request and store the first number to be used as variable X

Step 6—request and store the second number to be used as variable Y

Step 7—if “choice” = “A” go to Step 11

Step 8—if “choice” = “M” go to Step 13

Step 9—display message “Choose A or M”

Step 10—go to Step 3

Step 11—display “Sum is” X+Y

Step 12—go to Step 3

Step 13—display “Product is” X*Y

Step 14—go to Step 3

Writing, Storing, and Running Python Programs

The actions involved in creating and running Python programs are relatively simple:

Input the code using Notepad, and save the file as *.py (e.g., prog1.py). Save your programs in the Python folder on your hard disk.

Open the MS-DOS prompt window.

Change directory from Windows to Python22 (enter “cd”

Getting Started with iOS – The iPhone

The first iPhone was revealed at the Mac World conference in early January 2007, and later released in June of that year. Initially, third-party native applications were not allowed. Apple products have created a unique brand value within society.  Their products do not support third party applications, thus providing additional layers of security from social engineering and malware attacks.

  1. How has the use of core ideas such as location and orientation-aware pushed iPhone beyond its web browser and tightly integrated web functionalities?
  2. Why are Plists (property lists) the easiest way to store information on Macs?
  3. Discuss the benefits of using Xcode for developing iOS apps.

Need 70-80 words for each question with proper APA style citations.

Assignment Question

 

This is a required assignment, worth 100 points, and must be submitted by the due date.
Review the Grading Rubric before completing this assignment.

Create a list of requirements. Details on the Project:  Project2 Requirements.pdf 

You must use the following Template for your solution:  Project2 Paper Template.docx
A 20% penalty will be applied if this template is not used.

Do not claim credit for the words, ideas, and concepts of others.
Do not copy and paste information or concepts from others or from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.

Submit your solution here.  

Most airlines practice overbooking. That is, they are willing to ma ke more reservations than they have seats on an airplane. Why would they do this? The basic reason is simple; on any given flight a few passengers are likely to be “no-shows.” If

  

Most airlines practice overbooking. That is, they are willing to ma ke more reservations  than they have seats on an airplane. Why would  they  do this?  The basic reason  is simple; on any given flight a few passengers are likely  to  be  “no-shows.”  If the airline overbooks slightly, it still may be able to fill the airplane. Of course, this policy  has its risks. If more  passengers arrive to claim their  reservations  than there are seats availa ble, the airline must  “bump” some of  its passengers.  Often this is done by asking for volunteers. If a passenger with a reserved seat is willing to give up his or her seat, the airline typically  will provide incentives of some sort. The fundamenta l trade-off  is whether  the additional  expected  revenue  gained  by flying an airplane that is nearer  to capacity on average is worth  the additional expected cost of  the incentives. To study the overbooking  policy, let us look  at a hypothetical  situation.  Mockingbird  Airlines  has  a small  commuter  airplane  that seats  16 passengers.  The airline uses Lhis jel uu a ruule fur which iL chaq;es $225 for a one-way fare. Every flight has a fixed cost of $900 (for  pilot’s salary, fuel, airport fees, and so on). Each passenger  costs Mockingbird  an  additional  $100.

Finally, the no-show rate is 4%. That is, on average approximately 4% of those passengers holding confirmed reservations do not show up. If Mockingbird must bump a passenger, the passenger receives a refund on his or her ticket ($225) plus a $100 voucher toward another ticket.

How many reservations should Mockingbird sell on this airplane? The strategy will be to calculate the expected profit for a given number of reservations. For example, suppose tha t the Mockingbird manager decides to sell 18 reservations. The revenue is $225 times the number of reservations:

R = $225(18)

= $4050

  

The cost consists of two components. The first is

the cost of flying the plane and hauling the passengers who arrive (but not more than the airplane ‘s capacity of 16):

C1 = $900 +$100 x M in(Arrivals, 16)

The second component is the cost of refunds and

free tickets that must be issued if 17 or 18 passengers arnve:

C2 = ($225 + $100) x Max( O, Arrivals – 16)

In this expression for C2, the $225 represents the refund for the purchased ticket, and the $100

represents  the cost of the free ticket. The Max ( ) expression calculates the number  of excess passengers who show up (zero if the number  of arrivals is

16 or less.

   

Questions

1. Find the probability that more than 16 passengers will arrive if Mockingbird sells 17 reservations (Res = 17). Do the same for 18 and 19.

2. Find:

E (RI Res = 16) E(C1IRes = 16)

E(C2IRes = 16)

Finally, calculate

E (Profit j Res = 16) = E( R I Res = 16)

– E(C1IRes = 16) – E(C2 IRes = 16)

3.  Repeat Question 2 for 17, 18, and 19 reservations. What is your conclusion? Should Mockingbird overbook? By how much?

  

Discussion

200 word+

Discuss the CIA  (Confidentiality, Integrity, Availability) in detail and provide a real word example for each.

In your opinion does the CIA triad provides adequate security for your system and data resources? Please justify your answer.