Coding

PROGRAM REQUIREMENTS

In this assignment you will implement three basic graph algorithms: breadth-first search, depth-

first traversal, and topological sort. We are not providing any code template, but you must follow 

the input and output formats specified below. Read carefully what you are required to do to 

receive full credit and attempt the extra credit tasks only after you are done with the 

requirements. 

First, implement a graph data structure using adjacency lists. Your code must read graphs of 

arbitrary size from a file (as long as there is enough memory available, your code must work: do 

not assume a maximum number of vertices). The input format is as follows: one line per vertex, 

the first element is the vertex id and the following numbers are the adjacent vertices. The input 

file will always be a bunch of integers and white space. For example,

1 3 4 

3 1 4 

4 1 3

is a graph with four vertices, and three undirected edges: (1, 3), (1,4) and (3,4). 

Then, implement three algorithms: 

• Breadth-first search. Calculate the distance from vertex 1 to all other vertices using BFS. 

Then, print all the vertices sorted by distance from vertex 1. Note that if the graph is 

unconnected, some nodes may have distance ∞.

• Depth-first traversal. Calculate discovery and finish times using DFT. Then, print all the vertices sorted by discovery time.

Topological sort. Print the topological sort of the graph. 

A few comments:

• Look carefully at the sample input and output files and follow the same format. 

• When you look through vertices, visit them in increasing order.

Extra credit: 

• Use BFS to determine whether a graph is connected. The input is a graph, and the output 

is yes or no.

• Implement an algorithm to detect whether a graph has a cycle. The input is a graph, and 

the output is yes or no.

• Design and implement an algorithm that takes as its input a graph ???? = (????, ????) and a 

permutation of ????, and outputs whether the permutation of ???? is a topological sort of ????.

Your algorithm must run in Θ(|????| + |????|).

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Final white paper project – ticketing system

 – Add images and tables that were included in previous submissions. Your current document points to figures and tables that are no longer included in your capstone project. 

  – There are still some discrepancies between the information presented in the Technology Solution and Requirements section (pages 13 – 19) and the Design section (pages 19 – 24) and the implementation section (24 – 31). For instance, the following technologies components listed in the Technology Solutions and Requirements section are not included in the design and implementation sections: Azure cloud-based service, Recoverit, Cisco Integrated Service Virtual Router (ISR), -WD My Book Duo 4TB, and SecuGen biometric scanner. 

 – Your test result doesn’t show specific examples and images (there are references to images, but the document doesn’t include these images) that support the needs that you selected such as database, network infrastructure, access control, and so on.  The test result section for each need is briefly summarized in three or four lines. You must provide specific information that demonstrate a proper test result or a failure if that is the case.  – The Assignment requires that you include the Conclusion section.  

Digital Forensics Tools&Tech

 

Week Nine Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Enterprise Risk Management

 After reading the required articles this week .please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

  • Be approximately four  in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

intext citations,references,proper citations

Practical Connection Assignment

 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). 

Wk 1 – NIST Publications and Outcomes

 2 Part question is below both need to be completed

Assignment Content

  1. Part 1
    The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

    Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

    Include the following column headings: 

    • SP number 
    • SP name  
    • SP purpose
    • Include the following row headings: 
    • SP 800-30 
    • SP 800-34 
    • SP 800-37 
    • SP 800-39 
    • SP 800-53
    • Part 2
      You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

      Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

      Cite all sources using APA guidelines. 

      Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

computer ethics

  

Assignment 2 

In a typical 1000-word essay, discuss what is unique about IT and Computers as far as ethical issues? 

How should people approach ethical issues that IT, Information Networks and Computer Technology present? 

Do not select passages from any resources! You must express your opinion from your reading of the course materials and online resources.

Students have to include proper citations. The essay’s quality of writing is part of the assessment. Therefore, grammatical, typographical or syntactical errors will affect the grade. No late submission. It WON’T be accepted.

Response Required Discussion cloud

Please read the below discussion posts and provide response in 75 to 100 words

Post#1

 

Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance  of  IT  auditing  and  especially  cloud  computing auditing  is  an  essential  effort to  ensure  the  proper  functioning processes  of  an  the organization’s  IT  systems,  management, operations, and  related  processes,  to  avoid  fraudulent,  in  order to  have  comprehensive  and  accurate financial view of their business” (Moghadasi, 2018).

The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).

The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).

The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).

Post#2

 

Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.

The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control.  The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.

The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.

The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.