Discussion (course: Information security risk management)

 Discuss the difference between a Continuity of Operations Plan (COOP), a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP).  You might want to start with the definitions from the NIST SP 800-34, located at http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-34r1.pdf.  Section 3.5 discusses the different types of Plan Testing, Training, and Exercises. 

Deployment and Maintenance: Test script Word document and test execution report

 

ASSIGNMENT DESCRIPTION

You are working as the software tester for a large travel company. Your company is planning to launch a new Web site that allows users to book their travel online. Please follow the steps below to set up the application on your computer:

  • Step 1: Click here to download the WebTours 1.0 .zip file.
  • Step 2: Go to the C: drive, and unzip the file.
  • Step 3: Click here to download the strawberry-perl-5.10.1.0 MSI file, and install it on your computer.
  • Step 4: Click on the Web Tours folder, and click StartServer file (near the bottom of the folder). Please do not close this file while the test is running.
  • Step 5: Click here and follow the steps.

You need to perform the following tasks as part of your assignment:

  • Click here to open the Tutorial Scripts.zip file.
  • Create at least 4 test specifications.
  • Each test specification section should have at least 3 test cases.
  • Each test case should contain the following:
    • Description
    • Test Steps
    • Expected Results
    • Actual Results
      • Execute each of the test cases, and update the Actual Results column
  • Create a test script execution report for your leadership team. Click here for a sample report.

Please submit your assignment.

References

Helping Testers. (n.d.). Test scenario case status.

Requirements: MAXIMUM

Python Code

Question 1 (10 points)

If we list all the natural numbers below 10 that are multiples of 3 or 5, we get 3, 5, 6 and 9. The sum of these multiples is 23.

Find the sum of all the multiples of 3 or 5 below 1000.

Do this using 2 methods.

  • Explicility testing if 3 or 5 is a divisor inside the comprehension.
  • Using a udf called inside the comprehension to test if 3 or 5 is a divisor.

Print the resulting sum each time.

Question 2 (10 points)

The below snippet of code will download daily closing prices for SPY, which is an ETF that tracks the price S and P 500.

Using a for loop and enumerate, create a list of 5 period moving averages. For instance, the first 5 values of the list are [321.56, 319.12, 320.34, 319.44, 321.14] and the average is 320.32. This means the first entry in our new list would be 320.32.

Make your own udf to calculate the mean and use this in the for loop.

Print last 5 items of the list and the sum of the list of 5 period moving averges.

In [89]:

import yfinance as yf
SPY = yf.download('SPY')
SPY = yf.Ticker('SPY')
spy_lst = SPY.history(start="2020-01-01", end="2020-02-01")["Close"].tolist()
print(spy_lst[0:5])
print(sum(spy_lst[0:5])/5)
[*********************100%***********************]  1 of 1 completed
[321.56, 319.12, 320.34, 319.44, 321.14]
320.32

Question 3 (10 points)

Consider the list of transactions, where each inner list item is a line item on a recipt. For instance, the first inner list ["A", "item_a"] indicates "A" bought "item_a". Iterate the list and return a dictionary where the key is the user id (A, B, C, D) and the values are a list of items the user bought.

The desired output for "A" can be seen in the sample_dct.

Do not include the first item in the list, ["User", "Item"], which can be considered a header.

Be sure your solution is scalable, meaning it should be sustainable for a list of transactions of any size.

Print the dictionary out at the end.

In [13]:

transactions = [
   ["User", "Item"],
   ["A", "item_a"],
   ["B", "item_a"],
   ["C", "item_a"],
   ["C", "item_b"],
   ["C", "item_c"],
   ["B", "item_c"],
   ["D", "item_b"],
   ["D", "item_b"]
]
sample_dct = {
   "A": ["item_a"]
}

Question 4 (10 points)

A string can be sliced just like a list, using the bracket notation. Find the 3 consecutive numbers and their index positions that have the greatest sum in the number 35240553124353235435234214323451282182551204321.

As an example, the the string "1324" has 2 three number windows, 132 and 324. The first sums to 6 and the later sums to 9. Thus the 3 numbers would be [3,2,4] and the indices would be [1,2,3].

Print out the 3 numbers, the 3 indices where they occur and their sum.

In [14]:

sample = "1324"
# results should be
numbers = [3,2,4]
max_val = 9
index_vals = [1,2,3]

In [15]:

a = "35240553124353235435234214323451282192551204321"

Quesiton 5 (15 points)

The sum of the squares of the first ten natural numbers is

  • 1^2 + 2^2 + … + 10^2 = 385

The square of the sum of the first ten natural numbers is

  • (1 + 2 + … + 10) = 3025

Hence the difference between the sum of the squares of the first ten natural numbers and the square of the sum is

  • 3025 – 385 = 2640.

Write a function, or collection of functions, that find the difference between the square of sums and sum of squares from 1 to n. Note, to solve the problem you have to:

  • find the sum of squares
  • the square of sums
  • the difference

This can be broken up into smaller functions, with one function making use of the smaller ones, or all be done in one function.

Add an assert statement to your function, to make sure the input is a positive int.

Test the function using n=12 and n=8 and print the results.

Question 6 (20 points)

Make a function, or group of functions, to find outlier datapoints in a list. The outlier should be based on the standard deviation, giving the user some ability to control the outlier threshold. For instance, setting 2 standard deviations or 3 from the mean should be possible. Note, to solve this problem you will have to:

  • find the mean of a list
  • find the standard deviation fo a list
  • convert the list of zscores using (x-mean)/std
  • find the indices of where the outlier datapoints are, using the zscores
  • return the outlier values and the indicies they occur at.

Test your data using the below stock price data for TSLA. Keep the same data range as is coded in below.

The standard deviation can be calculated as such (https://numpy.org/doc/stable/reference/generated/numpy.std.html):

  • std = sqrt(mean(abs(x - x.mean())**2))

Print out the average, standard deviation, outliers and the index position of where the outliers occur.

Again, this can be done in one big function or a collection of smaller ones that are then used inside a final function to find the outliers.

NOTE: ASIDE FROM CHECKING WORK, THE ONLY PIECE OF IMPORTED CODE TO BE USED IS sqrt from math and the imported data from yfinance.

In [73]:

import yfinance as yf
from math import sqrt
TSLA = yf.download('TSLA')
TSLA = yf.Ticker('TSLA')
tsla_lst = TSLA.history(start="2019-01-01", end="2020-04-01")["Close"].tolist()
[*********************100%***********************]  1 of 1 completed

Question 7 (25 points)

Make a class to profile a list of data. Include methods to do the below:

  • Initialize and create an attribute data that is a list of data.
  • Converts the list to a zscore scale. Note, no data is returned here, instead is bound to the class using self and overrides the value of the data attribute.
  • Returns an n period moving average.
  • Returns an n period cumulative sum.
  • Returns the standard deviation.
  • Returns the range as a tuple.
  • Returns the mean.
  • Returns the median.

The standard deviation can be calculated as such (https://numpy.org/doc/stable/reference/generated/numpy.std.html):

  • std = sqrt(mean(abs(x - x.mean())**2))

Zscore conversions can be checked using the below:

Test a few of your methods on the SPY data from yfinance above.

NOTE: ASIDE FROM CHECKING WORK, THE ONLY PIECE OF IMPORTED CODE TO BE USED IS sqrt from math and the imported data from yfinance.

discussion with two replies

 I’m working on a Computer Science discussion question and need guidance to help me study.

300 words discussion post with citations and references in APA format

150 words each two replies

no plagiarism

need turn it in report

APA format

Term Paper Outline

 Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts and reading.

When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper.

When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper following APA guidelines. 

Discussion

 

Create a discussion thread to answer the following question:

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device? 

project management and computer forensic

Project risks can/cannot be eliminated if the project is carefully planned. Explain.

What are the major differences between managing negative risks versus positive risks (opportunities)?

Why is slack important to the project manager? What is the difference between free slack and total slack?

Review the document on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf. Prepare a one-paragraph summary of three challenges you may encounter when executing a search and seizure of digital evidence.

What is a first responders’ toolkit? Describe the procedures for creating a first responder toolkit.

Identify best practices in digital forensic investigations: Perform a web search for best practices in digital forensic investigations. Prepare a list of the top 5 best practices, based on your research. Include links to any resources that you use.

What is an investigative report? Why are the reports important? Who is responsible for the report?

Business Intellegence

 Discussion (Chapter 8): Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts? 

Questions: 

1. How does prescriptive analytics relate to descriptive and predictive analytics? 

2. Explain the differences between static and dynamic models. How can one evolve into the other? 

3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty? 

4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk. 

Exercise: 

 Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also, investigate how other governments or government agencies are using models in their missions.