Easily visibility for security(intruders will be deferred to walk through it) actual college buildings and classrooms: Finger Print for student specific to that college building.
Need 3 pages on Finger print access for students to college building
Easily visibility for security(intruders will be deferred to walk through it) actual college buildings and classrooms: Finger Print for student specific to that college building.
Need 3 pages on Finger print access for students to college building
You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent.
The network specifically contains:
The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin. A single security guard is located on the second floor of the building. The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees. The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.
The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.
Write a four to six (4-6) page paper in which you:
Expectations
Note: Wikipedia and similar websites do not constitute as credible and quality resources.
Note: The cover page and reference page are not included in the assignment page length requirement.
I will send the picture of the ER diagram for reference, to come up with the queries.!
Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:
In about 2 lines, explain what the query returns.
Queries:
1 trivial query. Simple select with ordering.
2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.
1 query that uses subquery.
2 queries that uses join (1 inner join, 1 left or right outer join).
1 view (query must use join – hint: you can use one of the queries from the
previous question).
1 query that uses union.
1 custom stored function.
1 custom stored procedure.
ij.start canon is a platform for getting the canon printer driver . You can easily download the driver according to your model as ij.start.canon is designed with a user-friendly interface. Ij.start.canon , Https //ij.start.cannon
Canon IJ Network Tool is a toolkit software with the options to keep a check on most of your Canon printer network settings and adjust them according to your requirements. Canon.com/ijsetup offers the Printer Setup download link where you can install the printer setup further.
Case Study
LH Medical Company (LHM)
LHM is a London based privately owned hospital which provides healthcare to its patients. The hospital uses in-house software to manage and service its patients which they refer to as clients. It is an expanding venture and needs to accommodate for processing its information globally. The practice management system is web enabled and multi-platform for connectivity via web services, in addition it has connectivity to existing legacy systems. An enterprise document management system ensures patient documents are replicated globally and available per demand.
In addition to medical treatments, medicine and drugs, consultation and vaccinations are offered to its patients (with a variable additional fee) the company offers medical instruments to other companies either to purchase or to lease. LHM records the details of its clients with possibly their full medical history in their computer system. When a new patient requests an appointment (walk-in or on-line) a treatment course begins and a practitioner is allocated to the patient. A full history and previous medical records are printed showing different categories of Treatments during different time intervals. Analyses are drawn in terms of any possible allergies and previous histories. Treatments may involve many surgeons and consultants depending on its complexity.
The contact practitioner is responsible for estimating the costs of treatments that is agreed by the client at the start of the treatment. The duration of the treatment may be set at any time duration and may also be changed during the treatment depending on the complexity of possible operations. The final cost and completion date are recorded at the end of the treatment.
During a treatment process notifications may be sent to patients and other practitioners.
Repeat prescriptions may automatically be produced by the system if appropriate and are available for collection at any surgery by the patient. At any time a practitioner may suspend or cancel the prescriptions. The cost for a treatment is paid for by the client or an insurance policy provided by a number of insurers. Insurance policies may have additional surcharges and costing depending on treatment types and medicines. Long term treatment courses may be edited or cancelled by practitioners or clients. To re-start an existing treatment an additional fee is applied.
LHM may receive requests for specialise treatments from other hospitals or they may refer clients to other medical centres.
Each treatment course or service may include one or more of the following items:
• Operations and vaccinations
• Consultations and check-up
• Medicine and different types of tablets
• Clinical reports and attached documents and history
• Prescriptions and repeat Prescriptions
Payments by clients may be in full or part payments to cover a range of medical and non-medical services offered by the company. Payments may include possible applied surcharges for late payments and or special discounts for long term treatments. Tax allocations may also vary from one treatment item to another. Payments have to accommodate for price changes for medicines and medical services and track price changes for drugs purchased from pharmaceutical companies.
A treatment course comprising services from other hospitals carry additional changes set by the medical service providers. A full list of Treatment courses with corresponding payments may be requested by the site manager at any time. Clients’ outstanding balances may be retrieved at any time for current treatment and services indicating the payments for the treatment course.
Task Detail
This assignment is accompanied with a case study describing a high level system specification for an application. You are required to provide UML models for ONLY ONE appropriate use case. Your selected use case must be agreed by your module tutor.
Task 1
Develop a Use case model with one use case. As part of your answer produce the use case description and use case scenario.
Produce a Class diagram and domain model with appropriate refactoring and abstraction, related to the selected use case. As part of your model, produce a system class with clear set of public methods.
Produce a Sequence Diagram for the selected use case. Include possible guards, iteration, and message operations in your diagram.
Task 2
Incorporate OCL to represent the business logic, rules and constraints for the selected use case. As part of your solution include the correct syntax for pre and post conditions, navigation, and multiplicities.
Task 3
Produce a Component model with associated interface methods. As part of your model, illustrate various possible component composition and discuss the significance of your design.
Task 4
Produce a software architectural design and associated interface methods. Discuss coupling and cohesion aspects of your design.
Task 5
Enhance your class diagram given as part of Task1 to contain the Mediator design pattern. Illustrate and discuss how your model can be extended with the observer pattern.
Develop a fun presentation on how to protect our informations when using a public wifie and a Bluetooth . Based on this video, wifie and Bluetooth we use every day are vulnerable to hacking. Point out things people could do to avoid that or to protect themselves. How do people hack from a public wifie and poison it?
Caped Crusaders Inc.
The Super Heroes of the comic world have united in an organization to save the world from villains (some who also possess super powers). You are charged with keeping track of things in this comic world. Your database will contain the information presented below.
Table: tblSuperheroes
Table: tblArrests
Table: tblVillains
Super Hero ID (autonumber)
Arrest ID (autonumber)
Villain ID (autonumber)
Super Hero, Secret Identity (text)
Super Hero ID (foreign key)
Villain, Secret Identity
Last Name
Villain ID number (foreign key)
Villain, home planet
First Name
Date of Crime (Date/Time with input mask)
Primary Characteristic (what is their special power?)
Super Hero, Home Planet
Arrest Date (Date/Time with input mask)
Strength Rating
Primary characteristic, other than flying. (What is the character’s special power?)
Fine Charged (Should be more than largest Hero’s charge; currency)
Indicator if the Hero can fly (Yes/No)
Indicator if fine was paid. (Yes/No)
Strength Rating. (1-10 with 10 being the strongest)
Fee Hero Charges to make arrests (currency)
Step by Step Description:
1. Use all naming conventions discussed in this course.
2. Set the database to compact on close.
3. Create three tables as per specifications below.
4. Set table relationships and referential integrity (including cascade update and cascade delete if applicable)
5. Enter data into the tables
a. Create a minimum of eight super heroes in your database
b. Create at least ten villains
You may use existing characters from comic books or invent your own. Some villains should have a record indicating multiple arrests and some of the super heroes should have more than one arrest to their credit. At least one super hero should have NO arrests. Some of the fines will and others will not be paid.
c. Create a minimum of 15 arrests. Most super heroes should have arrests but at least one super hero should not have an arrest.
6. Create Queries
§ A query that computes the strength quotient for each arrest. Name this query: qryQuotient.
The strength quotient = hero’s strength rating divided by the villain’s strength rating.
§ A query that lists the sum of all of the fines collected, grouped by each superhero. Name this query: qryHeroFines
7. Create the following forms:
§ One that allows you to enter a new hero. Name this form: frmNewHero
§ One to enter a new villain. Name this form: frmNewVillain
§ One to enter a new arrest record. This last form assumes that the superhero and villain are already listed in the database. Name this form: frmNewArrest
§ Create a form that lists the superhero and identity that is sorted by the hero’s last name. This form should contain a subform that lists all of the arrests made by that hero with the name(s) of the villain, date(s) of arrest and fine(s). Any hero that has no arrests should not appear in this form. Name this form: frmFinesFromHero. Name the subform: fsubArrests.
8. Create the following Reports:
§ One that lists all of the arrests and the fines that have been levied. Make sure to include the hero and villain names Name this report: rptArrests
§ One that lists the heroes who can fly. Name this report: rptFly
§ One that shows the total amount (one number) fined for all arrests. Name this report: rptTotalFines
§ One that gives the total outstanding amount (not paid by the villains) by each villian. Name this report: rptOutstanding
§ One that lists all of the arrests with the villains that involved a strength quotient that was less than one. Name this report: rptStrength
9. Include at least one graphic in your database on one or more of your forms.
By the end of this week, you should be able to:
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.
Your paper should meet the following requirements:
Freedom and security are not always compatible. Discuss what you have learned about privacy, or the lack thereof, in today’s technology. Is privacy at a comfortable level in general for you? Is it possible to have a privacy level you’re comfortable with considering the threats that exist on the internet and elsewhere?
As manager of the gift shop at the Metropolitan Zoo, you are responsible for managing the weekly payroll. Your assistant developed a partial worksheet, but you need to enter the formulas to calculate the regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay. In addition, you want to include total pay columns and calculate some basic statistics. As you construct formulas, make sure you use absolute and relative cell references correctly in formulas
Start Excel. Download and open the file named Exp19_Excel_Ch02_ML1_Payroll.xlsx. Grader has automatically added your last name to the beginning of the filename.
Use IF functions to calculate the regular pay and overtime pay based on a regular 40-hour workweek in cells E5 and F5. Pay overtime only for overtime hours. In cell G5, calculate the gross pay based on the regular and overtime pay. Abram’s regular pay is $398. With 8 overtime hours, Abram’s overtime pay is $119.40.
Create a formula in cell H5 to calculate the taxable pay. Multiply the number of dependents (column B) by the deduction per dependent (B24) and subtract that from the gross pay. With two dependents, Abram’s taxable pay is $417.40.
Use a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. Use the tax rates from the range D21:E25. The VLOOKUP function returns the applicable tax rate, which you must then multiply by the taxable pay.
Calculate FICA in cell J5 based on gross pay and the FICA rate (cell B23), and calculate the net pay in cell K5. Copy all formulas down their respective columns to row 16.
With the range E5:K16 selected, use Quick Analysis tools to calculate the total regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay on row 17.
Note, Mac users, with the range selected, on the Home tab, in the Editing group, click AutoSum.
Apply Accounting Number Format to the range C5:C16. Apply Accounting Number Format to the first row of monetary data and to the total row. Apply the Comma style to the monetary values for the other employees. Apply the Total cell styles format to the range E17:K17.
Insert appropriate functions to calculate the average, highest, and lowest values in the Summary Statistics area (the range I21:K23) of the worksheet. Format the # of hours calculations as Number format with one decimal and the remaining calculations with Accounting number format.
Insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of the worksheet.
Save and close the workbook. Submit the file as directed.