Emerging Technologies

Here are some questions that may help you in your investigation.

Identify and Investigate the Problems from below questions

  1. Critique current and emerging disruptive technologies and their potential to impact social conditions and the global economy.
  2. Contrast current and emerging technologies and their implications for social ethics and the global workplace.
  3. Distinguish the unique characteristics of and differences between disruptive technologies and their impacts.
  4. Assess emerging technologies from the perspective of the Virtuous Business Model.
  5. Evaluate emerging technologies as potential contributors to organizational success.
  6. Assess the challenges and opportunities in designing projects that implement new and emerging technologies.
  7. What is known about the social and ethical challenges related to your chosen emerging technology?
  8. What is unknown about the social and ethical challenges of your chosen emerging technology?
  9. If any resources are cited, please use APA style to format in-text citations and the 5 APA references list. 

Minimum 5 pages required with references

Module 7 – Final Course Project

 

Composition and Inheritance

This is the culmination of everything you have learned up to this point. You will complete your Employee pay form by adding Benefits, Salary, and Hourly classes to the project. Then you will add these capabilities to your user interface. Read the Project Guide provided and the project video link for instructions and details to help guide you through your efforts. The final project is due next week (Module 8).

design ALU

 

You may refer to external sources as well and site them.

Prompt

Design and build a simple CPU on Logisim and write programs that can run on it. you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases:

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

  • Arithmetic addition
  • Increment
  • Decrement
  • Comparison (with 3 outputs: one for equals, one for less than and one for greater than)
  • Logic bitwise Not
  • Logic bitwise And
  • Logic bitwise Or
  • Register right logic shift
  • Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

  • Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.
  • Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.
  • In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

  • addition
  • logic bitwise AND
  • right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

  • branch to an address (name it JMP)
  • conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

  • Write a program that adds two operands.
  • Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.
  • Write a program that increments by 2 the content of a register 10 times.
  • Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

Please record your programs in the same Word doc and label them under the section ‘Phase Four.’

ITS-834: Emerging Threats & Countermeasures. Discussion: PKI and Cryptographic Applications, Research Paper: Threat Modeling

Subject: ITS-834: Emerging Threats & Countermeasures

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10 

Discussion: PKI and Cryptographic Applications

Word count: 300+ words

Chapters 6, 7, and 8 in the course textbook.

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Make sure to back up your statements with scholarly support.

  • Please cite properly in APA 7
  • At least one scholarly source should be used. 
  • Use proper citations and references in your post.

Research Paper: Threat Modeling

Number of pages: 4+

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

 Your paper should meet the following requirements:

  • Four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents.

Virtual Business in Global Marketing

  1. Write an initial response to the following key question(s) or prompt(s):
    As the quotation below from the French AFD reveals, an example of a group of labors in low-cost countries who have long been deprived of equal pay for equal work are women.

    The figures speak for themselves: 70% of people living on less than a dollar a day are women, as are two-thirds of illiterates. In certain countries, 50% of women are victims of violence. Women produce 50% of food and two-thirds of global labor, but only earn 10% of incomes. Women are discriminated against in all areas of society: employment, education, health, and governance. Yet they contribute to the development of countries through their work. A number of studies have demonstrated that reducing gender inequalities contributes to the equitable and sustainable development of countries.

    Go to the ADF site to see the French government’s gender and development strategies. Reflect on the data in the quote above and on France’s strategies to combat these violations of compensatory justice as you respond to the Key Questions.

    1. What are specific ethical pitfalls that underlie the French mitigation strategies?
    2. How can your company leverage concessions from offshore providers to ensure progress in mitigating these pitfalls?
    3. Which virtues would your company’s leadership need to demonstrate in order to accept responsibility to better these workers’ situations and to implement mitigation strategies for the ethical inequities?
    4. Do not muzzle an ox while it is treading out the grain,” and “The worker deserves his wages.”. Verse 17, preceding this one, discussed the Elders in the church who do their work and should be well paid for that, since they are teaching and preaching. “Faithful church leaders should be supported and appreciated” (Tyndale, 2007, p. 1934). 
  2. Need at least 4 references for each one point.
  3. Total words 450 -500

R language expert

  1. The problem to solve.
  2. The data sources to pull from.
  3. The tool that will be used (R)
    1. Note high level graphics that will be used to solve the problem and how they will be used.

***High level, one page proposal – can submit through course messages or email. By end of session on Friday. 

On Saturday, teams will reconvene and complete the following:

  1. There must be a through data plan this includes:
    1. Where the data is online
    2. How you know the data is accurate and the plan for ensuring accuracy.
    3. An import of the data into the selected tool.
  2. A paper that includes:
    1. The data plan mentioned above
    2. The problem- note the description and why it’s a problem and how you are going to make a recommendation with the data presented.
    3. The analysis of why the data will solve the issue.
    4. Graphical representation and formulas.  The screenshots of the formulas in the tool must be present. 
    5. A summary of the consideration and evaluation of results
      1. This includes your teams’ final analysis of the problem and the resolution.

Note: The paper and data sheet (this is the raw data that will be imported into the tool) must be turned in before the end of the day on Saturday.

Assignment (disaster recovery plan.)

Question: Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation and recovery plan.

***Standard for all Assignments Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  • No plagiarism********** 

SECURITY POLICY & STANDARTS

Educating users can be a formal or informal process. Formal methods are those that communicate policies in a formal training environment, such as a classroom or computer-based training (CBT). The advantage of formal training is that you know who’s taking the training, and you can measure, to some extent, its effectiveness.

Answer the following question(s):

  1. 1.Assume you are tasked with developing a user training program on security awareness and security policy implementation. What type(s) of training would you offer? Formal, informal, or both? Written? Online?
  2. 2.What is an advantage and disadvantage of each type of training you noted for question 1?
  3. 3. Is one type of training better than all of the others? Why or why not?