CTI

 

Assignment Content

  1. Summarize your threat intelligence findings in a concise and informative 8-page report for your organization.

    Complete the following in your summary:

    1. Identify company details: client, organization, stakeholders
    2. Identify test details: tests performed, dates performed, duration, assets analyzed, categorized threat intelligence types
    3. Include an executive summary:
    4. Summarize the impact of the threats on the organization.
    5. Include direct and indirect threats.
    6. Articulate the traffic light protocol:
    7. Recommend a method for disseminating intelligence in the organization.
    8. Indicate threat risk levels.
    9. Describe the security team: skill sets and size of the team needed to run the threat intelligence program.
    10. Explain the analysis methodology: methods used to collect, extract, process, analyze, and evaluate data.
    11. Describe the threat details: technical information on identified threats.
    12. Identify IoC: specifies indicators.
    13. Summarize recommended actions based on risk analysis.
    14. Cite any references to support your assignment.

      Format your assignment according to APA guidelines.

      Submit your assignment.

       

Discussion 4- Planning

Discussion:

Chapter 9: Scope Planning

Chapter 10: Project Schedule Planning

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Go online and research the difference between total slack and free slack.
    1. Prepare proper reference citations for the sites you located, using APA style.
    2. Write definitions of total slack and free slack in your own words.
    3. Why would the distinction between different forms of slack be important to a project manager?
  2. How does scope management differ from scope control?

Text

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 

Edition: 2nd Edition 

Need Help with SQL Server (Indexes)

  Watch video Indexes In SQL Server 

1. Run the script file “Create database 1.sql”, this will create the database Index_Examples and two tables, dbo.raw_data, dbo.index_example. & it will insert 2000 rows of data into dbo.raw_data. Next run the script Script File for Index Assignment.sql”. It will insert 4,000,000 rows into the dbo.index_example table (id, first_name, last_name, birthday). If I created a database with more it will bog down your CPU. With 4 million rows, you will see the difference in time between a non-index query and an index query. You are looking for the SQL Server Execution Time.

2. Run the following queries separately and record the time it took to complete each (see attached document “Example of Solution of Index Assignment.pdf”). You will have to set up the query window to show statistics & time. Go to the pull down menu Query, click on Query Options, under Execution, Advance check the box SET STATISTICS TIME, click OK.

  

USE [Index_Examples]

GO

select count(*) from dbo.index_example where last_name =’Waters’;

Screen Shot Goes Here!

select count(*) from dbo.index_example where first_name =’Colman’;

Screen Shot Goes Here!

select count(*) from dbo.index_example where birthday =’2000-01-01′;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where last_name =’Waters’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where first_name =’Colman’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where birthday = ‘2000-01-01’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where last_name = ‘Waters’ and birthday = ‘2000-01-01’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

3. Create 3 indexes for this database, and record the time it took to create each.

a) Create an index for the Last_Name column

Index Goes Here!

Screen Shot Goes Here!

b) Create an index for the First_Name column

Index Goes Here!

Screen Shot Goes Here!

c) Create an index for the birthday column

Index Goes Here!

Screen Shot Goes Here!

d) Create an index for the Last_Name and birthday column

Index Goes Here!

Screen Shot Goes Here!

4. Run the seven queries from step 1, separately and record the time it took to complete each (see attached document “Example of Solution of Index Assignment.pdf”).

USE [Index_Examples]

GO

select count(*) from dbo.index_example where last_name =’Waters’;

Screen Shot Goes Here!

select count(*) from dbo.index_example where first_name =’Colman’;

Screen Shot Goes Here!

select count(*) from dbo.index_example where birthday =’2000-01-01′;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where last_name =’Waters’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where first_name =’Colman’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where birthday = ‘2000-01-01’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

select first_name, last_name, birthday from index_example where last_name = ‘Waters’ and birthday = ‘2000-01-01’ order by last_name, first_name, birthday;

Screen Shot Goes Here!

5. In DETAIL what conclusion did you come to about indexes?

Personal Reflection: Problem Solving in the Workplace

It is important for students to understand how their curriculum is applied to real world workplace environments. How what you are studying can or will benefit you in your current, or future, career. For this assignment, you will need to review your program’s curriculum and goals and compare that to your current job/internship (if unemployed, reflect on a job/career that you desire to obtain in the future). To complete the assignment, please follow the below instructions:

 

Courses: 

 1. Comp Crimes & Digital Forensic.

 2. Digital Forensics Tools & Tech.

  1. Review your program’s goals and curriculum on the UC Webpage and the UC Graduate Course Catalog:
  1. Reflect on (research, if needed) your current (or future) job duties and responsibilities.

Assignment Details:Part 1 – Identify a Problem

  • Problem solving starts by being able to identify existing problems, gaps in service, inefficient systems/processes, flawed policies, or any other areas of our job/career where improvement is needed. Identify a problem or gap at your workplace and explain why/how this problem exists.

Part 2 – Solve the Problem

  • Use your knowledge that you’ve learned in the program (or hope to learn in a future course) to implement a plan to solve the problem.

Grading Expectations:

  •  Fully answer both parts of the assignment.
  • Word requirement: 400-500 words

*Please include job details (job title and employer, if available). 

Design, implement, test, and

  

Part 1

Design, implement, test, and debug a program with a JFrame that allows the user to enter a series of contacts’ names, ages, e-mail addresses, and cell phone numbers, and creates a file from the entered data. Validate the age entry to ensure that it is numeric and between 0 and 120. Include information for three to five contacts.

Part 2

Design, implement, test, and debug a program that reads the file you created by the list in Part 1 and displays the records in a JFrame. You may either display all entries in the list at once or display them one at a time; the user interface is up to you. Protect against not being able to open the file.

Operations Security Reflection

Provide a reflection of operations security and how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. 

500 Words APA format

Need plagiarism report.

Objective

  

Objective
This project focuses on demonstrating your understanding of Java Collections. Before attempting this project, be sure you have completed all of the reading assignments listed in the syllabus to date, participated in the weekly conferences, and thoroughly understand the examples throughout the chapters. The project requirements include:
Requirements
 Design, write and test the Java program ReadStoreShow.java with the following requirements:
1. Invite the user to enter an input file name and a number N (10 <= N <= 20). Read N pairs of unique colors and their unique associated hexadecimal values (for example Red FF0000) from the specified file (each pair color – hexadecimal value should be on a separate line) and store them in appropriate JCF collection(s). Give reasons for the chosen JCF collection(s);
2. Sort the pairs in the increasing order of their hexadecimal values and then use iterators to display the sorted pairs to the console.
3. Using a GUI, display the pairs as radio buttons. When the user selects a radio button, the background of the GUI should change to that color.
Note. Using GUI automatic generation facilities of IDEs is not accepted.
Your programs should compile and run without errors.

Database Security

 (8)

Write at least 450 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. 

(9)

 

Describe in 450 words the disaster recovery plan and who is responsible  at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

Use at least three sources.

(10)

 

Write at least 450 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. 

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. 

(11)

 

In 450 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.