31/p3

  • What are vulnerabilities associated with implementing virtualization?
  • What is the likelihood for each vulnerability that it could be exploited?
  • What strategies/methods can be used to mitigate the risks for virtualization?

Activity 8- Project HR & Stakeholder Mngt

How should a project manager gain buy-in from stakeholders? What techniques should a project manager use to obtain this buy-in?

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22

3/4 IT Governance PPT

  1. Develop a short PowerPoint presentation that would be given to management on the benefits of implementing an IT governance program.
    1. Provide the pros and cons of such a project.
    2. Include a section that discusses how lean IT governance could enhance such a program.
  2. The presentation should be a minimum of 10 slides and should include an introduction, conclusion, and recommendations.
  3. Be sure to use good grammar and formatting. The first slide should provide an introduction, and the last slide should list any references used in the presentation using APA formatting.

300 words

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Lab12

Please review Lab12

answer these questions: 

  

1) Explain why it is a spam e-mail

  

In two to three paragraphs (i.e., sentences, not bullet lists) using APA style citations if needed, summarize, and interact with the content covered in this lab. Summarize what you did as an attacker, what kind of vulnerabilities did you exploit, what might have prevented these attacks. Mention the attackers and all of the targets in your summary. You can provide topologies, sketches, graphics if you want. In particular, highlight what surprised, enlightened, or otherwise engaged you. You should think and write critically, not just about what was presented but also what you have learned through the session. You can ask questions for the things you’re confused about. Questions asked here will be summarized and answered anonymously in the next class.

Animal

Please attach the requested programs below as your assignment submission.

Your assignment is to create a hierarchy of classes representing animals.

The root of the hierarchy should be a class named Animal (in file Animal.java), described in more detail below.

There must be at least two subclasses of Animal (you are welcome to have more than two). If you have no other ideas, you may name the subclasses Pet (Pet.java) and MarineAnimal (MarineAnimal.java), but you are welcome to choose different groups of animals.

Each of your subclasses of Animal must in turn have at least one subclass (it may have more). Each of these sub-sub-classes of Animal must represent a specific animal, such as dog, cat, green turtle, octopus, and so on. In total, you must have at least six of these classes, representing six different kinds of animals. Choose suitable names for each of these animal classes — the TA may award less than full credit if your names are not suitable, so if you choose an unusual animal, make sure an appropriate comment clearly explains why your choice is suitable. It is also your choice which of these animals belongs to which subclass of Animal, but again your score may depend on the appropriateness of your choices and/or on how well your comments explain your choices.

Your Animal class must have at least:

  • An instance variable to represent the animal’s current weight. You can choose the units (grams, kilograms, ounces, pounds, etc). Your code must have a comment saying which units this variable represents.
  • Another instance variable to represent the animal’s weight when fully grown. This variable should use the same units as the previous variable.
  • Another instance variable to represent the animal’s current size. Again, you must both choose and document suitable units.
  • Another instance variable to represent the animal’s size when fully grown. This variable should use the same units as the previous variable.
  • A constructor that takes as parameters the initial values of all four instance variables, and initializes them accordingly.
  • A method eat that eats a certain amount of food, and increases the animal’s weight by 1% of the amount of food (but without ever exceeding the animal’s fully-grown weight), and similarly increases the animal’s size by exactly 1%, again never exceeding the animal’s fully grow size.
  • Accessor methods for each of the animal’s weight and size.

For your immediate subclasses of Animal, you should choose which instance variables (if any) and methods they provide. The same is true for the individual animal classes. The only requirement is that each of these classes must have at least one new instance method not present in any of its superclasses. Again, choose suitable methods. For example, a Pet usually has a name, and a MarineAnimal may or may not breathe air.

As well as its own unique method, each animal or group of animals may override one or more methods from its superclass(es). This is up to you.

You must also create a TestAnimals class with a main method that does all of the following:

  • Create at least two animal objects of each class of each specific animal. Since you are required to create at least six specific animal classes, the test program will have at least twelve animal objects. Animals should be created with a reasonable minimum size and weight.
  • Feed each of the animals at least until it is fully grown. Once the animal is fully grown both in weight and in size, print the animal’s name and how many feedings it took for it to grow to full size and weight.
  • Call at least once each of the methods specific to each of the animal classes.
  • Call at least once each of the methods specific to each of the classes representing groups of animals.

The code in your TestAnimals class need not be all in the main method, and in fact you are encouraged to create and use multiple methods within this class.

Case Studies I

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Select a country, criminal organization, or hacktivist group known to have a significant cyber warfare capability. Based on your open source research, post a one paragraph summary of

(a) name and brief description of the organization
(b) estimated level of sophistication
(c) example(s) of known or suspected cyber attacks from that entity (other than those mentioned in our case studies)

Discussion Cybersecurity

 

Chapter 2 discussed the three dimensions of the cybersecurity sorcery cube. The central responsibility of a cybersecurity specialist is to protect an organization’s systems and data. In your initial post, explain how each of the three dimensions discussed in this chapter contributes to that effort. Provide an example (from your personal or work experience or from further reading) to illustrate your point.

Initial posts are due by Wednesday at 11:59 PM CT. Your two peer responses are due by Sunday at 11:59 PM CT.

In 200 words

Business Intelligence Discussion

 Discussion  (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

 
Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.