Legal Issues in information Security – Practical Connection Assignment

  

Executive Program Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Legal Issues in information Security course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

The attached file

  

1) The attached file (attendance.txt) is a list of email addresses you collected for a conference your company hosted. Create a program that will parse each email address by its name and company. (Note: email parser object is attached). The company should be sorted in the first column and the person’s name associated with the company should be sorted in the second column; separated with tab character. (first sort is by company; secondary sort is by firstname.lastname). Sample output is listed below:

amzn bob.freed

amzn caitlin.thomas

amzn edward.flak

amzn jill.bennet

amzn mike.reade

fb chris.booker

fb fred.smith

fb jane.bland

fb megan.hill

goog gary.teafer

goog john.kohl

goog larry.page

goog phil.heal

goog zara.war

msft alan.gret

msft darlene.neddle

msft don.shaffer

msft ken.smith

msft sue.flemming

orcl  heidi.opal

orcl  john.voy

orcl  larry.lee

orcl  mark.lite

2) Create a histogram on the number of attendees per company for the conference. (can be in same program as #1)

3) Check if bill.gates attended the conference.Output that Bill Gates attended conference. (can be in same program as #1)

4) Create an output text file for the output above so that it can be imported in Excel for further analysis. One method of code to write text to an output file: (can be in same program as #1)

String text = “my textrn”;

BufferedWriter output = null;

try {

File file = new File(“example.txt”);

output = new BufferedWriter(new FileWriter(file));

output.write(text);

} catch ( IOException e ) {

e.printStackTrace();

} finally {

if ( output != null ) {

output.close(); // need to close file to write to a file

}

}

  

Assignment #4:

1)  Write a program(main() method) that reads an arbitrary number of integers that are in the range of 0 to 50 inclusive and counts how many occurrences of each are entered.  After all inputs have been processed, print only the values that have an occurrence of greater than zero.  Also, print the number of occurrences next to the value. [use arrays and indexing ]
        e.g.
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 3
        Enter a value between 0 and 50 [ -1 to end ]: 10
        Enter a value between 0 and 50 [ -1 to end ]: 30
        Enter a value between 0 and 50 [ -1 to end ]: 2
        Enter a value between 0 and 50 [ -1 to end ]: -1
        Output:
        The value of 2 has 2 occurrences.
        The value of 3 has 1 occurrences.
        The value of 10 has 3 occurrences.
        The value of 30 has 2 occurrences.
2)  Write a program (main() method) that reads, from the terminal (screen), sequence of names and postal (ZIP) codes for individuals.  Store the data in an object designed to store a first name (String), last name (String), and postal code (int).  Assume each line of input will contain two strings followed by an integer value, each separated by a tab character.  Users will type “quit” when they have completed input entry.  Print the output of the input values by the user to the screen.
[use ArrayList to store object]
[Note:
1)  create an object that will store the first name (String), last name (String), postal code (int)
2)  use ArrayList to store object]
C:Enter Input {first_namelast_namezip_code}:
Bill     Smith   10002
Enter Input {first_namelast_namezip_code}:
Jane     Dome    11354
Enter Input {first_namelast_namezip_code}:
3)  Revise #2 problem to read a list of inputs from a file.  The input file will contain two strings followed by an integer.
Input file:
Bill     Smith   10002
Jill     Ryan    11120
Robert   Johnson 11122
.
.

Risk Mitigation Plan

Module 04 Content

  1. Based on your work developing a Risk Mitigation Plan, you will be ready to draft a Risk Management Security Plan for management, proposing specific tools and policies for implementation. Your plan should include specific proposals for monitoring, control and reporting and six security policies that would safeguard your organization.

    Objectives

    • Develop a Risk Management Security Plan
    • Research industry policies as a basis for developing risk management policies
    • Requirements
      Your Risk Management Security Plan should include the following:

      1. Introduction (brief background and overview)

      2. Purpose of the Risk Management Security Plan (rationale for this document)

      3. Risk Monitoring, Controlling, and Reporting

    • Monitoring: What security tools do you need to implement to monitor your organization? Provide at least three examples and an explanation of why you chose them.
    • Controlling: What levels of password management, user access, and elevated privileges (i.e., domain) need to be implemented at XYZ Corporation. Provide details and explanations for your decisions?
    • Reporting: What reporting capacity do you have implemented based on adoption of your monitoring tools?
    • 4. Policies
      Research various ISO, SANS, COBIT or NIST policies and use these as a basis for drafting and customizing six
      policies that address the concerns of XYZ after the malware incident. Be sure to provide the details of each
      policy and to cite your research with links in APA format.

    • SANS Security Resources
    • ISO
    • NIST
    • COBIT

Blockchain

For this assignment you’ll set up your own Bitcoin wallet. Follow the instructions in the video (this week’s required activity). After you create your wallet, go to the Receive screen and take a screen shot that includes YOUR Bitcoin URI and Address. 
To complete and submit the assignment, paste your screen shot into a MS Word document and upload that document (Attach File)  to show that you’ve created a wallet. 
Note that you must create your own wallet and submit a screen shot with YOUR Bitcoin URI and YOUR address. 

Video Link : https://www.youtube.com/watch?v=Jglr36jlCBY

bswa week11 p11

Hello,

i need this paper by 3/31 afternoon 12am.

Strictly No plagiarism please use your own words.

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

Please write 300 words

 https://www.youtube.com/watch?v=wDQ0KXR4D7A

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism