Research a unique article on encryption techniques. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite you source.
Research a unique article on encryption techniques. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite you source.
Unit 2 Discussion: Through the Looking GlassThis unit talks about perception, and what influences how we think of ourselves.How did watching the video about stranger’s interpretations of each other influence your thoughts on self-identity?
(Utilize the components of identity from chapter 3 to add credibility to your response.)What steps could you take personally to enhance your self-esteem and self-identity?
(Cite information from your textbook to back your response.)
Lab Section: e.g. CP107-[1 2]-[A B C] Lab Assignment: Lab9 Pointers & StructsProject
Name: Lab9_1 Array Builder Description: Dynamically allocates a new integer array or larger integer arrayLimitations:Credits:
Includes mandatory file header:- uses empty Win32 Console Application:- Programs submitted with correct folder structure and correct files (cpp & h):user Interface (10%):———————- Clean easy-to-use:- Informed user of application:- Prompted user for input data:- Leaves cursor at end of line prompting input:- Correct spelling in user interface: Source Code Formatting (40%):—————————— Descriptive Names for functions and variables:- Correct Use of Indentations:- Effective use of newlines:- Use of local variables:- Misuse of global variables:- Effective use of comments:- Use of constants and enums:Demo Results (40%):——————– Compiles w/o errors:- Instructor pause included in all return paths:- Input validation done according to requirements:- Produced expected program output:-
using namespace std;int * arrayBuilder(int * arr, int size, int newSize);void showArray(int * arr, int size);int main(){int * theArray = 0;int i;cout << "This program demonstrates an array builder function." << endl << endl;// create the initial array. The initial size is zero and the requested size is 5.theArray = arrayBuilder(theArray, 0, 5);// show the array before values are addedcout << "theArray after first call to builder: " << endl;showArray(theArray, 5);// add some values to the arrayfor(int i = 0; i < 5; i++){theArray[i] = i + 100;}// show the array with added valuescout << endl << "Some values stored in the array: " << endl;showArray(theArray, 5);// expand the size of the array. size is not the original size. newSize// must be greater than size.theArray = arrayBuilder(theArray, 5, 10);// show the new array with the new sizecout << endl << "The new array: " << endl;showArray(theArray, 10);cout << endl;delete [] theArray; // be sure to do this a1t the end of your program!system("pause");return 0;}/*FUNCTION: arrayBuilderINPUTS: Pointer to an array. Size of the array. If size is zero, arr can be NULL.
Size of the new array.OUTPUTS: Returns a pointer to allocated memory. If newSize is greater than size, an array of newSize is allocated and the old array is copied into the new array. Memory pointed to by the old array is deleted. All new elements are initialized to zero.*/int * arrayBuilder(int * arr, int size, int newSize){// TODO: Your code goes here// HINT: Design the function before writing it.return NULL; // default return value. No memory allocated!}/*FUNCTION: showArrayINPUTS: Pointer to an array. Size of the array. If size is zero, arr can be NULL.OUTPUTS: Prints the contents of the array to the console.*/void showArray(int * arr, int size){cout << "arr = ";for(int i = 0; i < size; i++){cout << arr[i] << " ";}cout << endl;}
Final Research paper:
12-13 pages in total excluding title and references
Assigned Readings:Chapter 7: Project Risk Identification ToolsChapter 8: Project Risk Analysis and IdentificationInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:
2. Complete a risk analysis for a project involving a family vacation where a family of four is driving 1,000 miles one way to Myrtle Beach, SC to stay for one week at a coastal resort. Include the construction of a risk matrix.[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]
Text
Title: Managing Project Risks; 464 Pages
ISBN: 978-1-119-48975-7
Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards
Publisher: Wiley-Blackwell
Publication Date: 2019
. Your word processing project will be to write an essay about a topic related to PC Security. Read this all through to the end once before you try it.
2. Do some research on the Internet (Google, Wikipedia, etc.) and find out some information about ONE security issue, security problem or crime relating to use of a computer on the Internet. There are literally hundreds of issues that can include hacking, theft of information, theft of money, personal attacks, or vulnerabilities overall. If it can get you “hurt” in some way, it counts. Get information about the problem so you can describe it in detail and offer strategies for what a user could do to protect themselves. Be sure you have at least 2 URLs with good web sources, and also get 2 images. You will discuss 1 image now, and later at the end of the course you will turn this essay into a presentation where you will use both images.
3. Write 400-500 words about your topic. It must be all original writing, no copying at all, and will provide the following:
* An introductory paragraph
* A middle, several paragraphs with explanation, description and detail so the reader has the basic idea of what the essay is all about.
* A concluding paragraph
4. Use the following formatting requirements and create a Microsoft Word document with the filename PC Security Essay
* Margins 1″
* Any font you like as long as it’s clear and readable, 10 point
* Title at the top, centered
* Your name under the title, centered
* Paragraphs single spaced, 1 blank line between paragraphs, no indent, left justified
* 1 image, relevant to the topic and explained in the text
* Footer with page number
* References cited at the end on a separate Works Cited page
* Spelling and grammar checked
5. Your project will be graded according to the following rubric:
Requirements
Max Points Possible
400-500 word count
10
Covers the topic in appropriate detail
20
Formatting correct
10
1 Image included, relevant and discussed
10
Spelling and grammar checked
10
Total
60
Objective: Create a web page that accesses data from a SQL* data source. You will need to create the TechSupport DB if you have not already.
Start by creating a new ASP.NET Web Application project in Visual Studio called SportsPro.
You will need the TechSupport SQL database (Tips & Resources -> Database Files -> TechSupport DB ->Pre-Build SQL Server DB). Save it to your PC, then import it to your project, specifically into the App_Data folder.
Create the Customer Display page. It should look similar to the attached image (Sportspro.jpg).
Use a table to align the address, phone, and email information.
Use any fonts, colors, and sizes you like for the two headings.
Create a SQL data source that retrieves all the rows and columns from the Customers table, sorted by the Name column (Figures 4.9 – 4.11).
Bind the drop-down list to this data source so that the Name column is displayed for each item in the list and the CustomerID column is stored as the value of each item.
Create a class named Customer that contains public fields.
The easiest way to do this is to right-click the App_Code folder, then click Add.
Then, let the menu expand out, and then choose Class.
Change the name of the new class to Customer before you go any further. Be certain to save it in the App_Code folder. This will be similar to the Product class in the top of Figure 4-16, adjusted, of course, for the TechSupport Customer table fields. Only a Customer class is required for this portion of the project.
You will also need to add the System.Data class from the class library. Consult Figure 4-19 for the syntax to include this in your code file (Hint: C#: using, VB: imports).
Create a method called GetSelectedCustomer that will use the Customer class to create a Customer object that contains the information for the selected customer. Create a data view from the data source and then filter the data view so it consists of just the row for the selected customer. Your code should look similar to the code in Figure 4-19 adjusted for the tech support customer instead of a product. Return the Customer object that you created.
On the ASPX page, be sure to check the EnableAutoPostBack attribute in the dropdownlist smart tag menu to trigger a page reload anytime the selection is changed. This will force the code to execute that will show the newly selected customer’s data on the page.
When the page is displayed, the information for the first customer in the drop-down list should display on the page. To add this code, you will need to add a Page_Load event to the codebehind by double-clicking somewhere in a blank area of the Design View of the page.In this event, add code that will do the following:
If this is the first time the page is loaded (Hint: If Not/! IsPostBack), then bind the database to the dropdownlist (ddlCustomer.DataBind)
Call the GetSelectedCustomer method and assign it to a Customer object.
Display the address, phone and email from the selected customer in the correct label fields.
Include your name on the page. The title field works well for this.
Test your project to make sure that it works. Be sure that when you select a new customer that you see refreshed customer data.
The attached pdf file
Project 1-A: Display customers For this project, you’ll create a page named CustomerDisplay.aspx that displays information for a selected customer. To do that, you’ll use a SQL data source. (Required reading: section 1) The design of the Customer Display page Operation When the page is first displayed, the information for the first customer in the drop-down list is displayed on the page. After that, the information for the customer that the user selects from the drop-down list is displayed. Specifications Create a class named Customer that contains a public property for each column in the Customers table. Then, use this class to create a Customer object that contains the information for the selected customer. Add a SQL data source to the page that retrieves all the rows and columns from the Customers table and sorts them by the Name column. When you create the connection for this data source, you should save it in the web.config file. Then, bind the drop-down list to this data source so the Name column is displayed for each item in the list and the CustomerID column is stored as the value of each item. To get the data for a selected customer, create a data view from the data source and then filter the data view so it consists of just the row for the selected customer. Use a table to align the address, phone, and email information. Create a style sheet that contains the basic formatting for the page as shown above. Use any color you like for the border and any fonts, colors, and sizes you like for the two headings.
MIS607 Assessment 3 Mitigation Plan for Threat Report
Course: MIS607
Task Summary
For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).
Context
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.
Task Instructions
1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.
2. Review your subject notes to establish the relevant area of investigation that applies to the case. Reread any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.
3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats
• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.
4. The report should consist of the following structure:
A title page with subject code and n ame, assignment title, student’s n ame, student , and lecturer’s n ame.
The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report
The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.
The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.
5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page n umbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.
6. Referencing
There are requirements for referencing this report using APA referencing style for citing and referencing research. It is expected that you used 10 external references in the relevant subject area based on readings and further research.
7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment—this will give you a clear picture of what a successful report looks like.
Submission Instructions
Submit Assessment 3 via the Assessment l ink in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0 Project Description: In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters. Start Access. Open the downloaded Access file named Exp19_Access_Ch01_CapAssessment_Latte_Delights_Inventory.accdb. Grader has automatically added your last name to the beginning of the filename. Add the following records to the Sales Reps table, letting Access assign the SalesRepID: LastName FirstName Address City State ZIP Eissler Karean 13 Oak Lane Montgomery PA 17752 Rai Namrata 1000 Ogden Blvd New Castle DE 19720 Pellum Katryn 286 Bergen Rd Salford PA 18957 Close the table. Open the Customers form in Form view. Use Search to locate the record for Baker Auto Supply. Modify the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form. Open the Products form in Form view. Add a new product (Access will automatically add the Product ID): Coffee-Arabica Premium. The Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form. Open the Products report and check that the report contains the new product P0026, Coffee-Arabica Premium. View the layout of the report in Print Preview and then change the page layout to Landscape. Save the report and close Print Preview. Open the Customers table. Sort the table by Customer Name in ascending order. Save the changes and close the table. Open the Revenue Stats query and sort the City field in ascending order. Apply Filter by Selection so that only stats for the last name Pellum display. Save and close the filtered query. Open the Products table. Use Filter by Form to create a filter that will identify all premium brands in the Brand field that were introduced after 2017. Apply the filter and preview the filtered table. Close the table and save the changes. Close all database objects. Close the database and then exit Access. Submit the database as directed.
Q1) Select one of the topics listed below and find a recent article that relates to this topic and post a summary of that article and express your views as well.
Listed Topics: