SE942

Assignment:

What is project management? Briefly describe the project management framework, providing examples of stakeholders, knowledge areas, tools and techniques, and project success factors. 

_____________________________________________

You are required to respond to the assignment question posted above with no less than 200 words. To support your response you are required to provide at least one supporting reference with proper citation. Your response will be reviewed by Unicheck, the plagiarism tool synced to Canvas. Unicheck will submit a similarity report a few minutes after you post your assignment. If the similarity index is above 30%, please redo and resubmit your assignment after you cite the sources properly to avoid plagiarism. Please review the PowerPoint slides explaining how to avoid plagiarism and post your assignment accordingly. Even a single plagiarized statement will not be tolerated. You must cite your sources properly by using IGU writing format.

Information security policies – MS cybersecurity assignment

 

Identify a recent incident in cyber(in)security, investigate it in detail and write up a report on it using the following structure. Please see below for ineligible incidents.

Maximum 2000 words. This does not include references. Provide citation of sources using any recognized format.

The paper must contain the following two sections:

  1. Apply the Diamond model

Use the framework of the model to identify Adversary, Victim, Infrastructure and Capability. Pay special attention to what the paper calls “the Social-Political meta-feature determining the Adversary-Victim relationship, and the Technology meta-feature enabling both the infrastructure and capabilities.”

  1. Policy assessment

Identify at which level of organization this problem is best addressed. Does this incident, in your judgment, reflect the need for some kind of public policy change at the national (9) or transnational (10) level? Or is it best handled at the organizational (8) or industry level (8.5)? In making this assessment, consider how common these types of incidents are, what kinds of risks they pose, and what kind of legal, technical or policy tools could combat them.

Grading will be based on the following criteria:

  • Thoroughness of background research
  • Demonstrated understanding of and correct application of the diamond model
  • Demonstrated understanding of the different “layers” of governance and the reasoning underlying your policy recommendations
  • Clarity and organization of the writing 

Ineligible Incidents

The below incidents can not be used for this assignment. The reason is that some incidents have already been analyzed in class, or there are already too many materials floating around on the web that could be copied.  Here is a list of incidents that are not allowed:

  • Banrisul (Brazilian bank) (2016)
  • Capital One (2019)
  • Equifax (2017)
  • Marriott (2018)
  • Solarwinds (2020)
  • Target (2013)
  • TJX (2007)
  • Ukraine electrical power grid (2015/2016)
  • US Office of Personnel Management (2014)
  • Yahoo (2014/2016)

I/O Management Techniques

Question 1:

Consider the following I/O scenarios on a single-user PC: 

a. A mouse used with a graphical user interface 

b. A tape drive on a multitasking operating system (with no device preallocation available)

 c. A disk drive containing user files d. A graphics card with direct bus connection, accessible through memory-mapped I/O 

For each of these scenarios, would you design the operating system to use buffering, spooling, caching, or a combination? Would you use polled I/O or interrupt-driven I/O? Give reasons for your choices.

Question 2:

Describe three circumstances under which blocking I/O should be used. Describe three circumstances under which nonblocking I/O should be used. Why not just implement nonblocking I/O and have processes busy-wait until their devices are ready? 

securing their assets and how to mitigate security threats

 For this assignment, review the article: Abomhara, M.,  & Koien, G.M. (2015). Cyber security and the internet of things:  Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414 and evaluate it in 3 pages (800 words), using your own words, by addressing the following: 

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments  pertaining to other approaches to testing their hypothesis (logical  follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief  and concise. Also, you should  include a complete reference (title, authors, journal, issue, pages) you  turn in your evaluation. This is good practice for your literature  review, which you’ll be completing during the dissertation process. IT should meet the following requirements: 

  • Be approximately three pages in length, not including the required  cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. It should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Evaluating UI

Consider two software applications that you regularly use that have menu interfaces, whether they are PC-or mainframe-based applications. Think about how you use these applications and evaluate them in terms of the menu design. Additionally, make a recommendation for improving the interface design. 

You work as the night manager

  

You work as the night manager for a local grocery store chain. One of your duties includes to go to several store locations at closing time to collect cash and checks on hand at the end of the day. After collecting, you must record how much money (specifically bill denominations) was collected from each store and then calculate the grand total. You currently are counting by hand, using a simple calculator and recording this in a notebook. After being in this SDEV120 course, you know that you can create a program to help you with this nightly task. You know that if this is successful, you can promote this to the other managers as well as other local stores that have chains, so you want to create proper documentation.

20210428

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

literature review

  

Data Analysis:

What were some of the findings, for example, if there were any hypotheses asked, were they supported?