Netflix

Go to Netflix (Links to an external site.)

  • Select Investor Relations (located at bottom of webpage, under Our Company)
  • Select Annual Reports & Proxies (under Financials on the top menu)
  • Select 2014 Annual Report
  • Read Form 10-K. 10-K filings

In this report, review and analyze Netflix key strategies. Describe what type of competitive advantage Netflix is currently pursuing? Is the strategy short- or long-term? Why? Does the stock price determine the direction of Netflix? Why? Explain.

Answers based on personal and/or professional experience, textbook and course materials, and academic research. 

300-word count minimum 

Wireshark

  

Assignment.

Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze.

She says:

“Something has happened on my home network. I use my network for internet access so I can access read email (remember my AT&T email account). I am not sure whether this event(s) should cause me concern or not, but I was lucky to be running Wireshark when the event occurred. I will email you the Wireshark capture file so you can analyze the capture file and tell me what occurred during the internet session.”

1) Open the capture file (by clicking Here) using any tools you see fit

2) Perform an analysis on the captured traffic. Some things you should consider are the following (not all of these happened and may not be all inclusive either):

a. How long did the session capture last?

b. How many packets were captured?

c. How many bytes were captured?

d. What protocols were observed?

e. When did the bulk of the data get transmitted?

f. What caused this transmission spike?

g. Were any ISP sites accessed? If so which ones? What accounts?

h. What is the name of the host computer? It’s IP address?

i. What Operating system is it using?

j. What does the local network look like?

k. What device names are on the local network?

l. Did I access any other computes on the local area network?

m. Are any other devices on the network?

3) What “story” does the capture file tell?

4) Run the capture file through SNORT. What alerts are triggered?

Provide a lab report, which will includes the answers to the questions above and an analysis of what actually happened during the network session. Identify the key events and either prove or disapprove that a malicious event occurred.

When referencing the answer to questions or providing proof of your analysis it might be helpful to reference the actual packet number that proves your point.

GRADING: The grade will come from your paper, and supporting documentation. Papers which are clearly organized, referenced, describe the sequence of events and subsequent analysis, and provide sound conclusions based on the presented analysis/evidence will be graded higher. Limit your response to no more than 5 pages. This assignment counts as a double-lab grade.

Intro. to Computer

  Create a 2 page Word document after reviewing the videos to include:

  1. A brief description of 2 careers, 1 in your major and the the second in the technology field.
  2. Describe each career in detail including salary (based in MD, VA, and DC geographical area), education level or certification needed, and duties. 
  3. What emerging technology (within the past 5 years) is used in the industry (your chosen career) to improve production or work flow. 
  4. What are the ethical issues.
  5. Include 4 sources.
  6. Submit as a Word (25 points) .

Write a program that generates n random integers between 0 and 9 and displays the count for each number

 

 

Write a program that generates n random  integers between 0 and 9 and displays the count for each number. (Hint:  Use an array of ten integers, say count, to store the counts for the  number of 0s, 1s, . . . , 9s.)

A modular program is expected – use Methods. The program specifications are as below. 

  1. In the main() method, declare an int array of size 10, named count.
  2. Implement a method populateCount(int[] cnt) that initializes the array to zero.
  3.  Implement a method countNums(int[] cnt, int n) that accepts  the count array and an integer n. The method should generate n random  numbers in the range of 0 to 9. It should keep a count of how many times  each number, 0 to 9; is generated in the array count. 
  4. Implement a method printNums(int[] cnt) to print the count  array.  Note, print “time” or “times” – which ever is appropriate. 
  5. Use basic structured programming and procedural programming.
  6.  Write a main() method that declares the count array. Invokes  the countNums() method with n = 10 followed by invoking the printNums().  Then invokes the countNums() method with n = 100 followed  by printNums(). And again, invokes the countNums() method with n =  1000 followed by printNums(). 
  7. Make sure you invoke  the populateCount(int[] cnt) method at appropriate times. And write out  the heading for each set, n = 10, 100, and 1000.
  8. Documentation. Includes your name, create date and purpose of lab.

110/p4

Project Deliverable 4: Certification Statement, Accreditation Letter, and Final System Security Plan

Certification Statement and Accreditation Letter
The final two appendices for your SSP are the Certification Statement (Appendix 5) and the Accreditation Letter (Appendix 6). To develop these appendices, use the format provided in the Howard text as follows:

  • Certification Statement, found in Appendix R, page 293
  • Accreditation Letter, found in Appendix S, page 297

Insert these appendices in the SSP.

Final SSP
Once the two appendices are completed and included in the SSP, the final project is submitted. The SSP at this point should contain the following:

  • Expanded Outline for Sections 1 – 15
  • Appendix 1: Potential Vulnerabilities Report 
  • Appendix 2: Risk Assessment Outline
  • Appendix 3: Certification Test Matrix Plan
  • Appendix 4: Remediation Plan
  • Appendix 5: Certification Statement
  • Appendix 6: Accreditation Letter

Technical Summary

 

Title – Executive Order (EO) on Improving the Nation’s Cybersecurity MAY 12, 2021  

Link to the document – https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/Links to an external site.

Write a 3 page (Times New Roman, 13pt, Single Spacing) technical summary (2/3 pages) of the changes in cyber operations mandated by this EO. Which mandate do you think is most consequential? Why? (1/3 pages). 

No plagiarism

system analysis

1. Define the role of the Systems Analysts versus the Business Analyst.
2. Define the Systems Development Life Cycle.
3. Define the concept of Organizations as Systems.

-1page

-apa with references

2 Discussions and 1 Case Study

Discussion 2.1

What is the Gramm-Leach-Bliley Act?  Can you find any cases that have dealt with this Act?  

Discussion 2.2

What are the Payment Card Industry Standards?  Provide an example of why these standards were developed.

Case Study 2.1

Case Study:Conduct research on the Internet or select 1 of the 2 examples in your text in Chapter 4, page 117 on a credit card breach. Write a 3 to 4 page paper (Not including title and reference page) in which describe the details of the event. Tell us what could done to prevent the event from happening, list the laws that were broken and if the event violated any of the acts or laws that you read about in chapters 3 & 4. You paper should be in APA format and contain 3 to 4 different sources. Make sure you cite all sources.Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Create a Public Marketing Website

  

Synopsis: A aerospace company has decided to update their customer-facing website with a more modern, responsive design.

Description: An aerospace company, called AAC, is restructuring its external website. AAC is a large corporation that develops and assembles airplanes and cutting-edge craft for several markets, including commercial and defense. These craft include large passenger jets, attack aircraft, as well as spaceflight technologies.

The company has chosen to create a new website to explain its aircraft and technologies to potential new customers. 

You work as a web developer for an international corporation, known as IBN, that has received the contract to create the website. You are the primary developer and business interface between IBN and AAC.

As the web developer, this initial stage should provide a clean, responsive, modern design. There is no requirement for a database to operate the site for this submission. The website should consist of HTML5, JavaScript, CSS3, folders and images. The content of each page must be 100% your own. You are encouraged, however, to research other sites for ideas about what types of content to include oon each page. You must submit a supplementary Word document that is a references page that provides credit for the concepts, ideas, and facts that you glean from these other examples and/or expert sources.

Deliverables:

1. The site will consist of the following, minimum pages:

a. Home Page

i. Include navigation to other pages

b. Five services pages, explaining offerings for each

i. Commercial Aircraft

ii. Business-class Aircraft

iii. Space Technology

iv. Advanced Technology

v. Defensive Technologies

c. Contact Us

i. This page will allow the user to complete a form which will open the default email client on the system, fill in the To, Subject, and Body, based upon the entries of the form.

2. References page in Word/APA format.

Please submit all files as a compressed (*.zip) file via the designated Unit 6 assignment in Blackboard.