WordSplit Printer Material from Lecture 09 will be helpful here. In lecture, we talked about how we can use recursion exploration to print out all permutations of a given string. For example, we could use recursion on the input “goat”

  WordSplitPrinter,  

WordSplit Printer Material from Lecture  09 will be helpful here. In lecture, we talked about how we can use  recursion exploration to print out all permutations of a given string.  For example, we could use recursion on the input “goat” to print out:  tgoa tgao toga goat gota gaot gato gtoa gtao ogat ogta oagt oatg otga  otag agot agto aogt aotg atgo atog toag tago taog Most of these aren’t  actual anagrams, because they’re gibberish. We could check which are  actual words (like “toga”), but that wouldn’t be enough. There are also  cases like “atgo” where the full string isn’t a word, but we can break  it into the separate words “at” and “go”. To find all anagrams, then, we  need to find the ways we can take one of these permutations and split  it into separate English words. That’s where your method,  findWordsplits, comes in: public void findWordSplits(String input,  TreeSet allWords) { // TODO: Implement this. }   The method takes two parameters: input and allWords. input will be a  string like “atgo” or “goat” that you’re trying to split into separate  words. You do not need to find permutations of input, since that was  part of the demo we did in class. input will be a string whose character  ordering is already set. allWords is a set containing the words listed  in the “words.txt” file — nearly 10,000 English words. allWords is  already populated for you! You’ll need to use it when you’re splitting  up the input string, since each chunk needs to be an actual word. . Your  task is to implement findWordsSplits to find every way you can split  input into valid English words, where every character in input is used  exactly once. For example, if input is we would expect these two splits  to be printed: “goat”, go at goat Other arrangements, such as “g oat” or  “goat”, would not be printed because “g”, “goa”, and “t” are not  considered words. The main method uses “isawabus” as input. Once  findWordsSplits is correctly implemented, you should see the following  output: i saw a bus i saw ab us is aw a bus is aw ab us If the exact  ordering is not the same, that’s completely fine. I’ve provided an  already implemented method in the starter code called printWordsplit:  public void printWordSplit(ArrayList words) { // Already  implemented for you. } You should call printWordSplit to print out a  single arrangement. For the “i saw a bus” example above, you would call  printWordSplit passing in an ArrayList containing [“i”,  “saw”, “a”, “bus” ] to print it out. findWordSplits is a recursion  exploration problem, just like our permutations demo in lecture. Think  about how to apply the recursion exploration formula:   1. How do you represent a path of options you’re exploring? o  printWordsplit is a major hint — if you need an ArrayList  to print a word split, that would also be a convenient way to represent  a path. 2. At each step, what are your options? o Consider an example  like “isawabus”. We can actually list out every possible option for the  next word: i is isa isaw isawa isawab isawabu isawabus Not all of these  are words, so you’ll need to check for yourself which ones are valid  options using the allWords set. The TreeSet is just a  specific type of Set, so you can use any Set methods on it. 3. What do  you do when you’ve finished exploring a path? o Just call  printWordsplit! Another hint: in your implementation, you will need to  use the String’s substring method to split a string into two parts. • To  get a substring that contains the first i characters, use  str.substring(0, i) where str is the name of your String variable. To  get the rest of that string (i.e. everything other than the first i  characters), use str.substring(i). If you’re struggling to translate the  above into actual code, I strongly recommend revisiting Lecture 09 and  see how we applied the same formula to the permutations problem or the  password guessing problem. WordSplitChecker Material from Lecture 10  will be helpful here. If you were able to complete WordSplitPrinter,  then congratulations! You’ve already done most of the hard work for this  last step. In WordSplitChecker 

WordSplitPrinter.java

package edu.csc220.recursion;

import java.io.*;
import java.util.*;

public class WordSplitPrinter {
   /**
    * Finds and prints out every possible way to split the input String into individual, valid English words (including
    * if input is itself a single valid word). You must call printWordSplit below to actually print out the results.
    */
   public void findWordSplits(String input, TreeSet allWords) {
       // TODO: Implement this.
   }

   /** Prints out a word split, i.e. one particular arrangement of words. This is implemented for you! */
   private void printWordSplit(ArrayList words) {
       if (words.isEmpty()) {
           System.out.println("(empty word list)");
       } else {
           System.out.print(words.get(0));
           for (int i = 1; i < words.size(); i++) {
               System.out.print(" " + words.get(i));
           }
           System.out.println();
       }
   }

   public static void main(String[] args) {
       TreeSet dictionary = readWords();
       WordSplitPrinter wordSplitPrinter = new WordSplitPrinter();

       // Expected to print out:
       // i saw a bus
       // i saw ab us
       // is aw a bus
       // is aw ab us
       wordSplitPrinter.findWordSplits("isawabus", dictionary);
   }

   // Reads the "words.txt" file and returns the words in a TreeSet. This is completely implemented for you!
   private static TreeSet readWords() {
       TreeSet allWords = new TreeSet<>();
       try {
           BufferedReader bufferedReader = new BufferedReader(new FileReader("words.txt"));
           String line;
           while ((line = bufferedReader.readLine()) != null) {
               if (line.trim().isEmpty()) {
                   continue;
               }
               allWords.add(line.toLowerCase());
           }
           bufferedReader.close();
       } catch (IOException exception) {
           throw new RuntimeException(exception);
       }
       return allWords;
   }
}

Security Architecture

 Assessment Description

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

  1. Identify all types of data and sensitive data the organization will store.
  2. Define where that information is stored.
  3. Record all hardware and software devices in your network.
  4. Describe how the security controls are positioned and how they relate to the overall systems architecture.
  5. Define security attacks, mechanisms, and services, and the relationships between these categories.
  6. Specify when and where to apply security controls.
  7. Present in-depth security control specifications.
  8. Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.
  9. Include the full scope of policy, procedural, and technical responsibilities.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

ds-9

Describe in 500 words the disaster recovery plan and who is responsible  at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

Tech Brief on Current Alerts

 

Choose an Alert closely related to the weekly topic and write a concise summary using the template.

Assignment Directions: 

  1.  The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
  2.  Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

    Organizational Template.docx 

NP_EX19_7a

 NP_EX19_7a_FirstLastName_1 

  

* GETTING STARTED

· Open the file NP_EX19_7a_FirstLastName_1.xlsx, available for download from the SAM website.

· Save the file as NP_EX19_7a_FirstLastName_2.xlsx by changing the “1” to a “2”.

o If you do not see the .xlsx file extension in the Save As dialog box, do not type it. The program will add the file extension for you automatically.

· With the file NP_EX19_7a_FirstLastName_2.xlsx still open, ensure that your first and last name is displayed in cell B6 of the Documentation sheet.

o If cell B6 does not display your name, delete the file and download a new copy from the SAM website.

* PROJECT STEPS

1. Lael Masterson works in the Student Activities Office at Valerian State College in Illinois. Lael has started compiling information on students who are interested in helping run student organizations at Valerian State, and she needs your help completing the workbook.
Switch to the Student Representatives worksheet. In cell E2, enter a formula using the HLOOKUP function as follows to determine a student’s potential base hourly rate (which is based on the number of years of post-secondary education):

a. Use a structured reference to look up the value in the Post-Secondary Years column. Retrieve the value in the 2nd row of the table in the range P13:U14, using an absolute reference. Because base hourly rate is tiered based on the number of years of education, find an approximate match.

b. Fill the formula into the range E3:E31, if necessary.

2. Student organizations sometimes require transportation for off-campus activities, and school policy requires students to be over 23 years old to serve as transport.
Lael wants to determine how many of the active students will be eligible to transport other group members. In cell J2, enter a formula using the IF function and structured references as follows to determine if Kay Colbert can serve as authorized transport:

a. The function should use a reference to the Age column to determine if the student’s age is greater than 23, and should return the text Yes if true and No if false.

b. Fill the formula into the range J3:J31, if necessary.

3. To be eligible for the leadership training program offered by the office, a student must have at least 2 years of post-secondary education or have gone through the organization finance training.
In cell K2 enter a formula using the IF and OR functions and structured references as follows to determine if Kay Colbert can join the leadership training program:

a. The IF function should determine if the student’s Post-Secondary Years is greater than or equal to 2 OR if the student’s finance certified status is “Yes”, returning the text Yes if a student meets one or both of those criteria or the text No if a student meets neither of those criteria.

b. Fill the formula into the range K3:K31, if necessary.

4. Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In cell L2, enter a formula using the IF and AND functions and structured references as follows to determine if Kay Colbert is eligible to serve as a mentor:

a. The IF function should determine if the student’s age is greater than or equal to 21 AND the student’s post-secondary years are greater than or equal to 3, and should return the text Yes if a student meets both of those criteria or the text No if a student meets none or only one of those criteria.

b. Fill the formula into the range L3:L31, if necessary.

5. Lael is always on the lookout for students who might be interested in running for office in student groups.
In cell M2, enter a formula using a nested IF function and structured references as follows to determine first if a student has already been elected to office in a student group, and if not, whether that student meets the qualifications to run in the future:

a. If the value in the Elected column is equal to the text “Yes”, the formula should display Elected as the text.

b. Otherwise, the formula should determine if the value in the Finance Certified column is equal to the text “Yes” and return the text Yes if true And No if false.

6. Students who work with student organizations are also considered for employment at the Student Activities Office. Students with more than 4 years of post-secondary education are qualified for more complex Tier 2 jobs.
In cell N1, enter the text Tier as the column heading. 

7. In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:

a. The IF function should determine if the student’s Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.

b. Fill the formula into the range N3:N31, if necessary.

8. Lael wants a quick way to look up students by their Student ID.
In cell Q3, nest the existing VLOOKUP function in an IFERROR function. If the VLOOKUP function returns an error result, the text Invalid Student ID should display.

9. Lael wants to determine several totals and averages for active students.
In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

10. In cell R8, enter a formula using the AVERAGEIF function and structured references to determine the average number of post-secondary years for students who have been elected.

11. In cell R9, enter a formula using the AVERAGE function and structured references to determine the average number of years of post-secondary education of all students as shown in the Post-Secondary Years column.

12. Switch to the Academic Groups worksheet. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.

13. In cell A17, use the SUMIF function and structured references to display the total membership in 2023 for groups with at least 40 members.

14. Lael is also planning for student groups that the office will be working with in the coming year. She decides to create a PivotTable to better manipulate and filter the student group data.
Switch to the Academic PivotTable worksheet, then create a PivotTable in cell A1 based on the AcademicGroups table. Update the PivotTable as follows so that it matches Final Figure 2:

a. Change the PivotTable name to: AcademicPivotTable

b. Add the Activities field and the Group Name field (in that order) to the Rows area. 

c. Add the 2021, 2022, and 2023 fields (in that order) to the Values area.

d. Change the display of subtotals to Show all Subtotals at Top of Group.

e. Change the report layout to Show in Outline Form.

f. Update the Sum of 2021 field in the Values area to display the name 2021 Membership with the Number number format with 0 decimal places.

g. Update the Sum of 2022 field in the Values area to display the name 2022 Membership with the Number number format with 0 decimal places.

h. Update the Sum of 2023 field in the Values area to display the name 2023 Membership with the Number number format with 0 decimal places.

15. Lael wants to summarize data for all student groups in a PivotTable. To do so, she must first update the AllGroups table.
Switch to the All Groups worksheet then edit the record for the Astronomy Society to use 76 as the 2023 field value.

16. Switch to the All Groups PivotTable worksheet. Refresh the PivotTable data, then verify that the 2023 Membership value for the Astronomy Society in row 6 reflects the change you made in the previous step.

17. Apply the Light Blue, Pivot Style Medium 2 PivotTable style to the PivotTable.

18. Add the Office field to the Filters area of the Pivot Table. Filter the table so that only organizations with private offices are visible.

19. Filter the PivotTable as follows:

a. Create a Slicer based on the Activities field value.

b. Resize the slicer so that it has a height of 2.2″ and a width of 3.2″

c. Move the slicer so that its upper-left corner appears within cell F3 and its lower-right corner appears within cell J14. 

d. Use the slicer to filter the PivotTable so that only Fraternal groups are visible.

Lael also wants to summarize membership data for all organizations using a PivotChart to help determine which groups are showing the most interest from students.
Switch to the Activities PivotTable worksheet. Based on  

ops

Part 1: 

Using the Internet and/or the Library research and complete the following: 

In a minimum of 1000 words, respond to the following: 

  • What are the major considerations of organizational security policies? (minimum 750 words)
  • Create two possible policies regarding risk assessment and analysis. (minimum 250 words) 

Part 2: 

In 250 or more words for each answer, respond to the following: 

  • What should the acceptable use policy cover and why?
  • What types of information should be covered in a commercial organization’s data classification policy and why?
  • What are some effective ways to get user buy-in of security policies? 

Mysql database

Create a MYSQL Database. (10 marks)

Create two/three Tables under the database; ensure there is one-to-many or many-to-many relationship in between tables. (15marks)

Write node code to insert data to all the tables. Create a generic function which will take the table name, query as parameter to insert data into the tables. (10 mark)

Write node code to get data from the tables. Create least 5 different queries to find data from database (the find queries must have combination of and/or/gt/ls/like commands available to retrieve data). Use table joins when you retrieving the data.(30 marks)

Write node code to update data into the table(20 marks)

Write node code to delete data from table. When you delete data ensure that related data in the other table also get deleted. (15mark)

How to submit the database:

1. Upload your node file.2. Create a screenshot of the output of read, insert, delete, and update functions

2

Analyze threat and vulnerability assessment best practices.

  

Requirements

Answer the following question(s):

1. A best practice for threat assessments within the seven domains of a typical IT infrastructure is

“Assume nothing, recognizing that things change.” What do you think “assume nothing” means in

this context?

2. A best practice for performing vulnerability assessments within the seven domains of a typical IT

infrastructure is to identify assets first. Why should you identify assets before performing

vulnerability scans?

Fully address the questions in this discussion; provide valid rationale for your choices.

Required Resources

§ Course textbook

§ Internet access

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 1–2 pages