week-12 discussion

 Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for. 

C-programming, Bench-marking arrays and linked lists

 

Create a new file named linked_list_tests.c with a corresponding header file. This file should contain three functions:

  1. void linked_list_insert_sequential_start(int num_samples, int sample_size)
  2. void linked_list_insert_sequential_end(int num_samples, int sample_size)
  3. void linked_list_insert_random(int num_samples, int sample_size)

Sequential Insert

The first test should create a new sample of size sample_size. Similar to the testing functions used for arrays, you can simulate this using a void * object and allocating sample_size bytes to it. Insert the new pointer at the beginning of the linked list.

The second test will be almost identical to the first one you created, except you should add each sample to the end of the list. Since you are simulating a standard, singly-linked list, you should expect that this version will perform slower inserting at the beginning of the list.

Random Insert

The third and final test should insert the samples at a random position based on the current number of samples. Reference the random tests in array_tests.c to see how the random values are generated.

After implementing all three functions, include the header file in run_tests.c and create a function named void linked_list_tests(int num_samples, int sample_size). This function should call each individual test you created previously. Use array_tests as a reference to what this should look like.

Running the Tests

The provided Makefile will compile and run the tests automatically. If you implement the functions as requested correctly, this will also work for your new tests. Once you have implemented the new tests, run the test by calling make.

The output should clearly show which test is being performed followed by the time (in ms) that it took to execute the test. Feel free to model your benchmark function after the array tests already provided. If the tests run properly, you’re done!

SECURITY ASSESSMENT & TESTING

Business case:  Start Toys & Smart Kids

The company has retail chain stores in the US.

Retail sales: $5 million annually
The number of stores: 300 in the US.
U.S. headquarters location: NYC, NY 

Datacenter location:  Columbus, OHIO 

Question 1: Write Cyber Attack Effects for large enterprises like Start Toys & Smart Kids with the retail store chain.
Resource: Evaluating the Impact of Cyber Attacks on Missions 
https://www.mitre.org/sites/default/files/pdf/09_4577.pdf

Question 2: What are the 4 types of Cyberattacks for this nationwide retail chain?
Resource: https://www.jvrconsultancy.com/what-are-4-types-of-cyber-attacksLinks to an external site.

Question 3: How to Measure and Model Network Security for this nationwide retail chain?

Resource:https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=917850#:~:text=To%20evaluate%20the%20general%20security,compromised%20host%20percentage%20(CHP).

network security layers

Standard security management practice is to test security to confirm proper configuration, performance, and strength against attacks and exploits. When a firewall is updated or its settings modified, another round of firewall testing should be conducted.

Some approaches to firewall testing that do not disrupt the production environment are:

  • Simulated firewall tests: Use an attack simulator to transmit attack packets to the firewall
  • Virtual firewall tests: Are performed in a virtualized network environment using a virtualization tool
  • Laboratory tests: Are run in nonproduction subnets on a duplicate of the production environment

Answer the following question(s):

Which approach do you think would be most effective? Why?

Module 3: Database Project Phase 2 Instructions

Following is Phase 2 of your Database Project. Please remember to follow all submittal instructions below.

Phase 2:  Class Diagram and Table Structure: In this phase of the project you will determine the data elements needed to support your project requirements outlined in Phase 1.  Reference examples in the textbook as your guide.  Deliver the following for this phase:

  • Class Diagram (see examples in the texbook) depicting entities and their underlying relationships.  Also see example in Figure 3.2, page 115.  It shows a simple starting point to building your class diagram.  The final class diagram will show entities and display their name, their attributes, primary keys, and relationship between entities.
  • Display a list of tables in 3NF similar to the example in Figure 3.3.  This is a crucial step in your database design and if not done correctly, the subsequent phases will not return the desired outcome.  Be sure to submit this on time and incorporate recommended changes.
  • Submit your work in a Word document to the assignment submission folder in Module 3.

wk-8 discussion

 Describe some ways that an organization can recover it’s IT resources from a natural disaster (fire, flood, hurricane, tornado etc.). What controls should have been in place in order to be able to retrieve this data? 

project work

  

Project Part 4: Group Policy Objects Recommendations

Scenario

Always Fresh is expanding. The company is adding another application server and several workstations. As the IT infrastructure grows, it becomes more difficult to manage the added computers and devices.

Consider the Windows servers and workstations in each of the domains of a typical IT infrastructure. Based on your understanding of Group Policy, determine possible Group Policy Objects that will make it easier to manage groups of computers. Focus on common aspects of groups of computers, such as permissions for workstations or printers defined for use by groups of users.

Tasks

Recommend Group Policy Objects for the Always Fresh environment in a summary report to management. You must defend your choices with valid rationale.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I provided adequate recommendations for Group Policy Objects.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

own work easy words

  

1. Discuss what performance management is and how it influences effective teams.

2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.

3. Note at least two organizational capabilities and compare and contrast each.

1-2-3 Questions 50 words each (100-150 words only) & 1 reference for 1-2-3 

4. What is your definition of AI?  Please explain. What is your opinion of AI, is the technology currently available? Why or why not?

5. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.

6. How is AI perceived as different in various industries and locations? Please explain.

Question 4-5-6 (3 pages) & 2 reference 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3 in length (not including title page or references)

APA guidelines must be followed. 

.A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

ITS-530 – Analyzing & Visualizing Data – homework

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case, your assessment is only concerned with one design layer at a time. For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation.
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a two-page document answering all of the questions above.  Be sure to show the visualization first and thoroughly answer the above questions. Ensure that at least two peer-reviewed sources are utilized this week to support your work.

Notes: plagiarism check required, APA7 format, include References, within 8hrs