Risk mitigation

 

Discuss web applications and risk to an organization. Include at least three examples of where web applications were compromised (such as the SQL injection hack at Qatar National Bank), and how security teams can assess and mitigate the relative risk of insecure web applications.

Your assignment should meet the following requirements:

  • 5-6 pages long, not including the cover page and reference page.
  • Conform to APA Style.
  • Support your answers with at least two current scholarly journal articles (not more than five years old). The Rasmussen Library is a great place to find resources.
  • Clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style and APA format, start with the Writing and APA guides at the Rasmussen Library.

IT476 week 5

term project:

Adams, Ives, and Scott Incorporated is an agency that specializes in representing clients in the fields of sports and entertainment. Given the nature of the business, some employees are given a company car to drive, and each company car must be assigned to an employee. Each employee has a unique employee number, plus an address and set of certifications. Not all employees have earned one or more certifications. Company cars are identified by their vehicle id, and also contain a license plate number, make, model, and year. Employees represent clients. Not all employees represent clients, while some employees represent many clients. Each client is represented by one and only one employee. Sometimes clients refer one another to use Adams, Ives, and Scott to represent them. A given client can refer one or more other clients. A client may or may not have been referred to Adams, Ives, and Scott by another client, but a client may be referred by only one other client. Each client is assigned a unique client number. Additional attributes recorded for each client are name, address, and date of birth.

Create an ERD by first identifying the entities, then their relationships, and finally add the attributes to each entity.

Document everything including ERD diagram using Open ModelSphere or Dia.

SECUR

The literature review focuses on how other researchers have addressed similar questions. It places the study in context and discusses how it will differentiate itself from what is already in the field. You are attempting to establish what the literature says, and where the gap exists that you plan to fill with your project. You may find help at http://www.lib.ncsu.edu/tutorials/litreview/. Please make sure not to “stack” sources. Weave each source into the relevance of your project and each other. Group the literature by themes and use headings. This is NOT an annotated bibliography and should not be written like on. 

Your literature review should rely strictly on scholarly material to include government publications and peer reviewed journal articles. Using websites or news/media articles is NOT acceptable. Please see the lesson module for Weeks 4, 5, and 6 for examples of student and scholarly literature reviews. 

Technical Requirements:

  • Your paper must be at a minimum of 10-15 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
  • Type in Times New Roman, 12 point and double space.
  • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

Add taxpayer

  

You have been asked by a tax return preparer to create a program which will help him calculate taxes. This preparer will at most have 100 clients. For each client, he has to keep track of the client’s first name, last name, gross income, and number of children. Use parallel arrays to store this information for him.

A taxpayer’s federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she will get a dependency exemption deduction of $4,000. A taxpayer gross income is reduced by the amount of the dependency exemption deduction to determine his taxable income.

The amount of tax due is a percentage of taxable income. If taxable income is greater than or equal to $100,000, the tax due is 30% of taxable income. If taxable income is greater than or equal to $50,000, but less than $100,000, the tax due is 20% of taxable income. If taxable income is less than $50,000, tax due is 10% of taxable income. A taxpayer cannot have a negative tax due – if his taxable income is less than 0, his tax due is 0.

Present the user with a menu of the following four choices

1. Add taxpayer info (This will allow the user to enter the info (first name, last name, gross income, number of children for ONE taxpayer )

2. View info for all taxpayers (This will allow the user to view info for all

taxpayers: first and last name, gross income, number of children, tax due.)

3. Find and display the total owed for all taxpayers

4. Exit the program (If the user choices 4, the program will exit. If the user

chooses 1, 2 or 3, the program will do what the menu item says it will do,

and then the menu will appear again.

IT214: Computer Science and Engineering

 

Define Garbage collection – in Computer Programming. Discuss the advantages and pitfalls of “Garbage collection.” 

Your first post must be between 300 and 400 words.

Your second post must be between 50 and 75 words.

Post by Thursday noon – this gives your classmates time to respond to your posts.

Paper

Using your textbook, LIRN, other researchable databases, and the Internet, develop an APA formatted paper. Your paper must include in-text citations, references, critical thinking, creativity and innovation, and written from the perspective of a researcher. your analysis should take on a 3-paragraph format; Define, explain in detail, then present an actual example via research. Your paper must provide in-depth analysis of all the topics presented:

●  Explain how computerized support will assist in managerial decision-making

●  Provide an in-depth analysis into the analytical and data-science side of computerized support

●  Define, describe, and explain the concept of Business Intelligence (BI)

●  Various types of analytics and applications

●  Develop an understanding of the analytics ecosystem as it relates to managerial decision-making and career opportunities

APA format with 6 references

Discussion

 

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission.