IT470 week 8

Week 8 discussion topic APA FORMAT 400 words

what is the internet of things? give an example. please add pictures, videos etc. if it will help explain .

Your response should be at least 400 words and appropriately cites your resources.

Building an Information Security Risk Management

Review the workflow steps for the security risk review in Chapter 12 in Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. What is the overall objective of the questionnaire that is distributed to primary contacts? How important is ethics when answering the various questions in the questionnaire? Provide an example of an unethical response and its impact to a company’s security posture.

The String class is provided in the Java library

  

10.22 (Implement the String class) The String class is provided in the Java library. Provide your own implementation for the following methods (name the new class MyString1):
public MyString1(char[] chars);
public char charAt(int index);
public int length();
public MyString1 substring(int begin, int end); public MyString1 toLowerCase();
public boolean equals(MyString1 s); public static MyString1 valueOf(int i);10.23 (Implement the String class) The String class is provided in the Java library. Provide your own implementation for the following methods (name the new class MyString2):
public MyString2(String s);
public int compare(String s);
public MyString2 substring(int begin); public MyString2 toUpperCase();
public char[] toChars();
public static MyString2 valueOf(boolean b);Implement the requirements for both MyString1 and MyString2 as a single class, MyString.
As well as implementing the MyString class, provide a test main method in the main class MyStringTest that demonstrates the use of your class and its methods.
Have all your classes inside one .java file, MyStringTest.java. Do not have a separate file for the MyString class.

Project management……8888889999

 Please review the attached RFP for instructions regarding the group project. The REQS document will give you detailed system requirements which you may consider incorporating into your prototype. 

 Lastly, please review the grading rubric to understand how your projects will be graded and what should be included. Submit in the form of a power point.

Week 2 Creating a scope statement

 

Wk 2 Team – Apply: Creating a Scoping Document [due Day 7]

Assignment Content

  1. A Work Breakdown Structure (WBS) is based on a project’s scope statement. This statement lists all the work that goes into creating the products of the project. It includes the charter, requirements document, processes, and is managed by the project manager. In this week’s Team assignment, your team will review the scenario and develop a project scope statement based on the provided information. You may use the template provided or develop your own.

    Read the Global Treps Scenario and complete the assignment below.

    Develop a first version of a project scope statement for the project. Use the Scope Statement template and the example in Chapter 5 as guides. Be as specific as possible in describing product characteristics and requirements, as well as all of the project’s deliverables. Include the following:

    • Global Treps website
    • 4 Shark-Tank-like events
    • A business plan
    • Outsourced items(laptops, donation acceptance, video creation, etc.) as part of the project scope
    • Submit your project scope statement.

Assignment

 

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). 

Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.Your assignment should be 3-4 paragraphs in length. 

Secure software design

1,At what level the security policy should be developed?

2,Why is the cloud of concern from a security point of view?

3,Name and explain the mitigation methods to control the employee threats?

4,Why are the world wide web and internet have so much concern for the security?

5,Explain the difference between incident response plan, dissaster preparedness plan and the business continuity plan?

cybersecurity

 Week 6 is here! Posted on: Sunday, February 12, 2023 11:59:00 PM EST Hello Students. Week 6 is here! There is a connection between chapter three and chapter one in the dissertation writing process. Therefore, as an extension of our week in the mock chapter three from last week, you will write a mock chapter one. It is very important to use and follow the required headings from the University of the Cumberlands Dissertation Handbook. Click the link in the course … the START HERE tab – Dissertation Resources section – choose Doctoral Research Handbook Have a wonderful week and see you at the LIVE class 7pm central Monday evening. Dr. Babb Week 6 Assignment: Develop a 3-4 page (more is fine) mock chapter one to include the following expectations from the university: Overview (1-2 well developed paragraphs) Background and problem statement (1-2 well developed paragraphs) Purpose of the study (1 well developed paragraph) Significance of the study (1 well developed paragraph) Research Questions (numbered list) Theoretical Framework (1-2 well developed paragraphs) Limitations of the Study (1 short paragraph) Assumptions (1 short paragraph) Definitions (list) Summary (1 well developed paragraph) 

Association rule mining

1 Association rule mining

In this notebook, you’ll implement the basic pairwise association rule mining algorithm.

To keep the implementation simple, you will apply your implementation to a simplified

dataset, namely, letters (“items”) in words (“receipts” or “baskets”). Having finished that code,

you will then apply that code to some grocery store market basket data. If you write the code

well, it will not be difficult to reuse building blocks from the letter case in the basket data case.

1.1 Problem definition

Let’s say you have a fragment of text in some language. You wish to know whether there are

association rules among the letters that appear in a word. In this problem:

• Words are “receipts”

• Letters within a word are “items”

b, where a and b are

letters. You will write code to do that by calculating for each rule its confidence, conf(a =

)

You want to know whether there are association rules of the form, a =

)

b).

“Confidence” will be another name for an estimate of the conditional probability of b given a, or

Pr[b

a].

j

1.2 Sample text input

Let’s carry out this analysis on a “dummy” text fragment, which graphic designers refer to as the

lorem ipsum:

In [ ]: latin_text = “””

Sed ut perspiciatis, unde omnis iste natus error sit

voluptatem accusantium doloremque laudantium, totam

rem aperiam eaque ipsa, quae ab illo inventore

veritatis et quasi architecto beatae vitae dicta

sunt, explicabo. Nemo enim ipsam voluptatem, quia

voluptas sit, aspernatur aut odit aut fugit, sed

quia consequuntur magni dolores eos, qui ratione

voluptatem sequi nesciunt, neque porro quisquam est,

qui dolorem ipsum, quia dolor sit amet consectetur

adipisci[ng] velit, sed quia non numquam [do] eius

1

modi tempora inci[di]dunt, ut labore et dolore

magnam aliquam quaerat voluptatem. Ut enim ad minima

veniam, quis nostrum exercitationem ullam corporis

suscipit laboriosam, nisi ut aliquid ex ea commodi

consequatur? Quis autem vel eum iure reprehenderit,

qui in ea voluptate velit esse, quam nihil molestiae

consequatur, vel illum, qui dolorem eum fugiat, quo

voluptas nulla pariatur?

At vero eos et accusamus et iusto odio dignissimos

ducimus, qui blanditiis praesentium voluptatum

deleniti atque corrupti, quos dolores et quas

molestias excepturi sint, obcaecati cupiditate non

provident, similique sunt in culpa, qui officia

deserunt mollitia animi, id est laborum et dolorum

fuga. Et harum quidem rerum facilis est et expedita

distinctio. Nam libero tempore, cum soluta nobis est

eligendi optio, cumque nihil impedit, quo minus id,

quod maxime placeat, facere possimus, omnis voluptas

assumenda est, omnis dolor repellendus. Temporibus

autem quibusdam et aut officiis debitis aut rerum

necessitatibus saepe eveniet, ut et voluptates

repudiandae sint et molestiae non recusandae. Itaque

earum rerum hic tenetur a sapiente delectus, ut aut

reiciendis voluptatibus maiores alias consequatur

aut perferendis doloribus asperiores repellat.

“””

print(“First 100 characters:n {} …”.format(latin_text[:100]))

Exercise 0 (ungraded). Look up and read the translation of lorem ipsum!

Data cleaning. Like most data in the real world, this dataset is noisy. It has both uppercase and

lowercase letters, words have repeated letters, and there are all sorts of non-alphabetic characters.

For our analysis, we should keep all the letters and spaces (so we can identify distinct words), but

we should ignore case and ignore repetition within a word.

For example, the eighth word of this text is “error.” As an itemset, it consists of the three unique

letters,

e, o, r

f

g

. That is, treat the word as a set, meaning you only keep the unique letters.

This itemset has three possible itempairs:

e, o

,

e, r

, and

f

o, r

g

f

g

f

g

.

Start by writing some code to help “clean up” the input.

Exercise 1 (normalize_string_test: 2 points). Complete the following function,

normalize_string(s). The input s is a string (str object). The function should return a new

string with (a) all characters converted to lowercase and (b) all non-alphabetic, non-whitespace

characters removed.

Clarification. Scanning the sample text, latin_text, you may see things that look like

special cases. For instance, inci[di]dunt and [do]. For these, simply remove the

non-alphabetic characters and only separate the words if there is explicit whitespace.

2

For instance, inci[di]dunt would become incididunt (as a single word) and [do]

would become do as a standalone word because the original string has whitespace on

either side. A period or comma without whitespace would, similarly, just be treated

as a non-alphabetic character inside a word unless there is explicit whitespace. So

e pluribus.unum basium would become e pluribusunum basium even though your

common-sense understanding might separate pluribus and unum.

Hint. Regard as a whitespace character anything “whitespace-like.” That is, consider

not just regular spaces, but also tabs, newlines, and perhaps others. To detect whitespaces

easily, look for a “high-level” function that can help you do so rather than checking

for literal space characters.

In [ ]: def normalize_string(s):

assert type (s) is str

#

# YOUR CODE HERE

#

# Demo:

print(latin_text[:100], “…n=>”, normalize_string(latin_text[:100]), “…”)

In [ ]: # `normalize_string_test`: Test cell

norm_latin_text = normalize_string(latin_text)

assert type(norm_latin_text) is str

assert len(norm_latin_text) == 1694

assert all([c.isalpha() or c.isspace() for c in norm_latin_text])

assert norm_latin_text == norm_latin_text.lower()

print(“n(Passed!)”)

Exercise 2 (get_normalized_words_test: 1 point). Implement the following function,

get_normalized_words(s). It takes as input a string s (i.e., a str object). It should return a

list of the words in s, after normalization per the definition of normalize_string(). (That is, the

input s may not be normalized yet.)

In [ ]: def get_normalized_words (s):

assert type (s) is str

#

# YOUR CODE HERE

#

# Demo:

print (“First five words:n{}”.format (get_normalized_words (latin_text)[:5]))

In [ ]: # `get_normalized_words_test`: Test cell

norm_latin_words = get_normalized_words(norm_latin_text)

assert len(norm_latin_words) == 250

3