Make an adaptive corsi block test in gorilla.
Fundamentals of Java
must be at least 200 words
- Discuss the differences between repetitive and selective statements. Use segment codes to demonstrate your understanding.
- Explain why you are choosing one of the following three statements in your code:
- a) for statement,
- b) while statement,
- c) do-while statement.
- Provide examples.
Audit Report
Please write a brief report listing the controls tested and the result of the test. You may express your opinion or thoughts on the findings. The goal is familiarize everyone with an Audit Report related to FISMA. I am looking for 500 to 600 words, using APA Style formatting. 100% original work and not plagiarized.
Instructions:
For this week, I would like to have you read and analyze an Office of Inspector General (OIG) report. I picked the 2012 FISMA Audit report of the Department of Education. Please review the report attached.
Risk management project part 3
Risk management project part 3
This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports. Please see the attached requirements.
Project Part 3: Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Submission Requirements
- Format: Microsoft Word (or compatible)
- Font: Arial, size 12, double-space
- Citation style: Your school’s preferred style guide
Estimated length: 4–6 pages
Riskmanagement6
1. Using the components of risk assessment documentation presented in the chapter, draft a tentative risk assessment of a lab, department, or office at your university. Outline the critical risks you found and discuss them with your class.
2. Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?
3. Go to the Web site of VeriSign, one of the market leaders in digital certificates. Determine whether VeriSign serves as a registration authority, certificate authority, or both. Download its free guide to PKI and summarize VeriSign’s services.
4. Go to csrc.nist.gov and locate “Federal Information Processing Standard (FIPS) 197.” What encryption standard does this address use? Examine the contents of this publication and describe the algorithm discussed. How strong is it? How does it encrypt plaintext?
OS vulnerability
It is necessary to understand that there is more than just file vulnerabilities in order to recognize the brevity of a situation involving an operating system attack that can render an entire system compromised.
Using the GCU library, research the security differences between the Windows and the Linux operation system. In 500-750 words, address the following:
- Proactive and reactive defensive tools provided by the operating system vendors themselves
- Third-party tools that further assist in mitigating cybersecurity threats
- Different methodologies used by hackers who have found a way to penetrate both operating systems
- At least one chart detailing the severity of at least five vulnerabilities found throughout your research, including descriptions of the potential side effects of the vulnerability becoming active
- At least one table outlining differing types of vulnerabilities for each operating system; within the table, including solutions to these vulnerabilities in the form of tools provided by the operating system vendor or third party vendors who provide mitigation tools for the vulnerability you list
- Evidence that exposes any trends found regarding each operating systems security efforts
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.
This benchmark assignment assesses the following programmatic competencies:
MS Cybersecurity
1.2: Apply appropriate qualitative and quantitative analytic methodologies to predict trends and communicate security strategies to meet business objectives.
LIT101 week 3b
Discussion 3B: Identifying Literary Devices in Business
No unread replies.No replies.
Discussion board 3B
Believe it or not, the use of literary devices is quite common in the business world. Anything from creating a company name, a logo, a slogan, or a commercial, businesses use literary devices to reach their audience and get what they want: for consumers to use their products and services. Please review the following before starting this discussion board assignment.
How to use rhetoric to get what you want – Camille A. Langston:How to use rhetoric to get what you want – Camille A. Langston (Links to an external site.)
Create A Memorable Name For Your Business Using Poetic Devices https://www.forbes.com/sites/forbesagencycouncil/2017/06/06/create-a-memorable-name-for-your-business-using-poetic-devices/#2542246dc048 (Links to an external site.)
One you have reviewed these documents, find an example of how a business uses literary devices. This can be an advertisement, a commercial, or a slogan to give a few examples. Describe the company and how it is uses literary devices. Then, explain how this example uses ethos, pathos or logos to appeal to an audience and why you think it is effective or not.
Respond to others
Respond to at least two other persons; what did you learn from their post?
300 words
Project Abstract on cloud computing
compare/contrast network topologies DUE 4/29
A network topology is the shape, or pattern, of the way nodes on the network are connected to each other.
Please respond to the following in a post of 150 – 200 words:
- Compare/contrast the basic network topologies: point-to-point, bus, ring, star, and mesh.
- Select an industry and recommend which network topology best supports this industry’s business needs.
- Support your rationale with examples.
When a file is removed
1. When a file is removed, its blocks are generally put on the free list without being zeroed out. From a security perspective, would it be a good idea to clear freed blocks? Why? If so, would it be better to clear the block out before it is put on the free list, or should it be zeroed out before it is used again in another file? Why? Why isn’t this typically done on file systems today?
2. Attributes associated with a file can be maintained in several places as discussed in the course content:
a. Within the set of open file descriptors
b. Within the system-wide file table entry for the file
c. Within the ‘i-node’ (or ‘v-node’)
These attributes can be associated with the actual file (e.g. the file size), or can be associated with an open instance of the file (e.g. whether the file is opened for reading or writing, whether the file is opened for non-blocking I/O, etc.). What would be preferred location of the following attributes of a file and why? Discuss any tradeoffs if that attribute could be in more than one of the above.
a. The owner of the file.
b. The “read/write” pointer of the open file.
c. Whether the file is opened for reading, writing, or both.