Assignment

  

1. Discuss two reasons why software systems tend to degrade over time. For each reason, identify a strategy a team could take to fight entropy. 

  

2. Suggest two contexts where ethnography might be a challenging method of requirements engineering. For each context, how would you recommend that your team elicit requirements? why ? and how ?

C# test

i need an expert in C# for a timed test(3 hrs test)

inbox me only if you can guarantee me quality grades

monitoring

 

Module 06 Content

  1. For the final submission of your course project you will complete both your Risk Register and submit the Risk Monitoring Plan that you have been developing throughout the course.

    Note: Make sure to refer to the Risk Management Plan template if needed.

    CIS3139fw_Risk_Monitoring_Plan_06172019

    Risk Register
    For the final additions to your Risk Register, you will fill out the Risk Control section (Column 3a-3c) for the top 10 risks identified in Module 03. Be sure to identify the control measures that can be used to mitigate each operational risk. A reassessment of the RPN (Risk Prioritization Number) must also be addressed.

    Risk Monitoring Plan
    For your final submission, you will use all your previous work on the Risk Register and your summary reports to complete the Risk Monitoring Plan. For your final Risk Monitoring Plan be sure to:

    • Classify business risks as they relate to information gathered in Module 01 – 05.
    • Identify three Security Controls.
    • Evaluate security control effectiveness for each risk mitigation.
    • Identify who, if anybody, should be in charge of an organization’s conduct.
    • Identify regulating ethical standards and who should watch over the regulators and define information system risks.
    • Identify the key components needed to create a risk management continuous monitoring plan.
    • Finally, your plan will provide your proposals for providing Continuous Assessment, Continuous Reporting, and Continuous Authorization.
    • Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.

       

Research paper Bitcoin economics

 This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).Your paper should meet these requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cybersecurity 14

 

Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?

Include in your plan, several good online backup services can help make data backup easy for the user. Use a search engine to search for online backup service reviews, and select three different services. Research these services and note their features. Create a table that lists each service and compare their features. Be sure to also include costs. Which would you recommend? Why?

Also consider, although not as full-featured as online backup services, several free synchronization storage tools allow users to back up data by synchronization: when you place a file in a designated folder, it is automatically stored to the remote site. Several of these sites offer free storage from 5 GB to unlimited space. Use a search engine to search for free cloud synch storage, and select three different services. Research these services and note their features. Create a table that lists each product and compare their features. Be sure to include storage space limits. How do they compare to online backup services? Which would you recommend? Why?

Write at least a one-page document of a DRP, include the use of online backup services (paid/free) and the table that list and compare the backup services. 

Unit 7 Assignment: Final Project Part IV- Presentation to Stakeholders (Individual Submission)

The proposal must be in your own words and not written directly from the PowerPoint Presentations or papers that you completed with your group. You can include the network diagram. cost-benefit- analysis, and budget that you worked on with your group.Your paper will include a detailed proposal including the following: 

  • Part I: Planning the Network
  • Part II: Building the Network
  • Part III: Securing and Maintaining the Network
  • Include the diagram of the network and cost-benefit- analysis that you would recommend from Part II.
  • Include the budget from Part III.

See the attached document for complete instructions and grading rubric. Submit your completed Project Management Networking Business Plan: Presentation to Stakeholders to the above submission link by 11:59 p.m. EST, Sunday of Unit 7.  

Programming with C++

 Follow the instructions for starting C++ and viewing the Intermediate23.cpp file (SEE ATTACHED) The program uses an array to store the amount of money a game show contestant won in each of five days. The program should display the total amount won and the average daily amount won. It should also display the day number (1 through 5) corresponding to the highest amount won. Complete the program. Save and then run the program. 

SAVE AS gameshow.cpp

Wireless Hacking

How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup. 500 words minimum.