Mastering block chain
Organizational Risk Assessment
In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:
- Describe when some controls cannot be implemented (such as on a personal laptop).
- Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
- Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
- Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).
APA style is not required, but solid academic writing is expected.
Refer to “Organizational Risk Assessment Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
Technical Writing
My major is computer science. And this assignment needs to be completed within 12 hours. Please read the description carefully as it carries a big part of my assignment.
This assignment allows you to practice translating engineering concepts for different audiences and requires you to think about how we use language to convey ideas. Choose a topic that you are familiar with from your major and practice adapting your writing for three audiences:
- Nonexperts: these readers should include anyone who is not an expert in your own field: high-school students, college students, the general public, even people with advanced non-technical degrees. (Do not write for audiences younger than high-school students.)
- Experts / peers: as the phrase indicates, this audience should include people with a very similar technical background as yours, which means you can assume they have some familiarity with your subject, but you should still obviously ensure you’re not omitting important details.
- Executives / administrators: this audience should include people high up within an organization who are likely more interested in “big picture” ideas: e.g., developing the concepts you discuss into marketable/sellable products or devoting research funding to a new lab or degree program. These readers could also include, e.g., people who actually do have an engineering or scientific background but who have not practiced actual hands-on engineering in many years (because they have moved into administration).
Each of the three descriptions should be about 1 page, double-spaced. So the length of the entire paper will be ~3 pages double-spaced.
The assignment comes from a series in Wired magazine Links to an external site.in which an expert explains a high-level concept to five audiences: a child, a teenager, an undergraduate student majoring in the same subject, a graduate student, and a colleague. We will watch at least one of the Wired videos as part of this module, and you should note well the strategies the expert uses to translate the topic to his audience.
Cloud computing
Using a Word Document, write a Report of no more than 2 pages that summarizes the main concepts discussed in the paper.
ITCO425U3IP
Assignment Details
Assignment Description
The next important step in the process of systems integration is to evaluate your options. It is always recommended that you compare at least three potential options to make the best decision. Based on what you determined as the best evaluation method during this week’s Discussion Board, you will apply this evaluation method to the three potential system integration options that you are considering.
Assignment Guidelines
For this week’s assignment, you will be providing detail on 3 potential options for pursuing the system integration project, the evaluation method you will use to compare each, and the overall quality assurance considerations that must be met.
- New Content (Week 3)
- Enterprise System Integration Analysis
- Refine and describe in detail the list of quality assurance considerations that you determined in the Discussion Board to be ranked highest.
- Thoroughly describe 3 potential options that you are considering for moving forward with the Systems Integration Project.
- Systems Integration Approach Evaluation and Selection
- Select and describe in detail the evaluation method that you plan to use to compare the 3 options.
- Design a table or matrix to perform your evaluation comparison. The evaluation criteria should include quality objectives and organizational capabilities and considerations and should use some type of weighted priority scheme for ranking.
- Fill in the table and use ranking criteria to determine which is the best option for you to proceed with for the system integration project.
- Summarize by discussing which is the best option based on the results from the previous step.
- Enterprise System Integration Analysis
- Make sure that the document is in APA format.
Discussion 500 words
Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.
PowerPoint_3G_Remodels
PowerPoint_3G_Remodels
PowerPoint_3G_Remodels
#PowerPoint 3G Remodels
Project Description:
In the following project, you will format a presentation that describes backyard remodels.
Open the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.
Change the Colors for the presentation to Paper.
On Slide 1, format the background with the Stationery texture, and then change the Transparency to 30%.
Select Slides 2 through 4, and then apply a Solid fill to the background of the selected slides-in the fifth column, the third color.
On Slide 2, hide the background graphics.
On Slide 2, insert a Table with 2 columns and 4 rows. Apply table style Medium Style 3-Accent 1, and then type the information below in the inserted table.
Row 1, Col 1: Improvement Type; Col 2: Components
Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines
Change the Font Size of all of the table text to 28. Resize the table height to 5.8″, and then distribute the table rows. Align the table text so that it is centered horizontally and vertically within the cells.
In the table, change the Font Size of the first row of text to 32. Apply a Round style Cell Bevel to the first row. Note, depending on your version of PowerPoint, this may be called Circle.
On Slide 3, animate the picture using the Wipe entrance animation starting After Previous. Change the Duration to 01.00. Apply the Split entrance animation to the bulleted list placeholder, and then change the Effect Options to Vertical Out.
On Slide 4, insert a Clustered Column chart. In the worksheet, beginning in cell B1, type the following data.
In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850
Apply Chart Style 8 to the chart, and then remove the Chart Title element. Apply the Wipe entrance animation to the chart and change the Effect Options to By Series.
On Slide 5, format the background using solid fill color Dark Green, Background 2 and hide the background graphics. (depending upon your version of Office, the color may be named Dark Green, Text 2). From your downloaded project files, insert the video p03G_Video1.mp4.
Change the Video Height to 5 and use the Align Center and Align Middle options to position the video. Apply the Simple Frame, Black video style.
On the Playback tab, change the Video Options to Start the video Automatically. Trim the video so that the End Time is 00:07 and then compress the media to Low Quality. (Mac users, the Compress Media feature is not available on a Mac).
On Slide 6, hide the background graphics, and then format the slide background by inserting a picture from your downloaded grader files-p03G_Backyard.jpg. Set the Transparency to 0%
Insert a Header & Footer on the Notes and Handouts. Include the Date and time updated automatically, the Page number, and a Footer with the text 3G_Remodels
Display the document properties. As the Tags, type backyard remodels
Access control strategies
Access Control Strategies
Introduction
In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The specific course learning outcome associated with this assignment is:
- Determine an access control strategy based on existing documents.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
Scenario
Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI’s coding development projects often encompass classified information and personally identifiable information (PII).
Instructions
Write a 2- to 4-page paper in which you:
- Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
- Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
- Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
- Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
- Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.
- Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
- Cite each source listed on your source page at least one time within your assignment.
- For help with research, writing, and citation, access the library or review library guides.
- Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
- Use section headers in your paper to clearly delineate your main topics.
501 discussion 7
You are required to submit a 1,000-word, double-spaced
Question
What is an Intranet? What is an Extranet? The differences between these two proprietary networks.
You will use your textbook, the university digital library and online resources with proper citations.
Your paper must have three parts:
- Review of source(s)
- Opinion and commentary
- Citations
Information Technology
Question 2: Functional Area Business Application
Describe the functions and objectives of ONE functional area business application (e.g., software system) that is in your organization and explain its value to the organization. Include at least two reference in APA format