HomeWork

Discuss the benefits of technology to support Access Control.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the blank APA template to get started.

presentation

part-1

compose a minimum 10-slide research presentation using the current APA version with title and reference slides using Microsoft PowerPoint. Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies contains a policy recommendation of some type. Your presentation will be to upper management in an enterprise firm with over 2,000 employees and six locations throughout the world. Your presentation needs to include a title slide and follow APA formatting guidelines. 

part-2

compose a minimum 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation. APA format citation.

Building on the example

Building on the example(the code bellow ), once you have extracted the data, show using regex, how you would extract certain data items and store them in a dictionary.Then create a text file and place the data from the dictionary into that file, adding proper headers to identify each column.Properly document your code to support what the code is trying to do. The data source must be a live website and not a downloaded file that is offline.

from bs4 import BeautifulSoup

import requests

import csvsource = requests.get(‘http://coreyms.com’).textsoup = BeautifulSoup(source, ‘lxml’)csv_file = open(‘cms_scrape.csv’, ‘w’)csv_writer = csv.writer(csv_file)

csv_writer.writerow([‘headline’, ‘summary’, ‘video_link’])for article in soup.find_all(‘article’):

headline = article.h2.a.text

print(headline)summary = article.find(‘div’, class_=’entry-content’).p.text

print(summary)try:

vid_src = article.find(‘iframe’, class_=’youtube-player’)[‘src’]vid_id = vid_src.split(‘/’)[4]

vid_id = vid_id.split(‘?’)[0]yt_link = f’https://youtube.com/watch?v={vid_id}’

except Exception as e:

yt_link = Noneprint(yt_link)print()csv_writer.writerow([headline, summary, yt_link])csv_file.close()PS : IF THE CODE OR ANYTHING IS NOT MAKING SENSE TO YOU CAN YOU PLEASE JUST PICK A WEBSITE AND DO WHAT WAS ASKED ? please im sorry and thank you very much

CIS 498 Week 8 Assignment – System Implementation

 Week 8 Assignment – System Implementation

Overview

This is the fourth in a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.

You have been working on delivering an information technology project plan in anticipation of the company relocating to a new facility.

  • In the first course project deliverable, you created a project plan inception document and supporting Gantt chart.
  • In the second course project deliverable, you developed the business requirements to be incorporated into the information systems design you are creating. You also updated your original supporting Gantt chart based on major and minor tasks identified in the business requirements document.
  • In the third course project deliverable, you created an infrastructure design that considered the key elements of software, hardware, security, and business process flow for your e-commerce startup company. Once again, you updated your supporting Gantt chart to reflect the major and minor tasks uncovered while developing the infrastructure design.

This fourth course project deliverable focuses on the project’s construction phase. In this assignment, you will develop the system implementation plan document. This document will include the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure. This assignment consists of two parts:

Part 1: System Implementation Document

You will create an 8–10-page system implementation document that details the engineering, furnishing, and installation (EFI) technical aspects of your e-commerce company’s information systems infrastructure.

Part 2: Updated Gantt Chart

You will use Microsoft Project to once again update the supporting project Gantt chart begun in your first course project deliverable.

  • You are not creating a new Gantt chart, only updating the one you created in the previous assignment with the major and minor tasks uncovered while creating the system implementation document.

Note:

  • You are to create or assume all necessary assumptions to successfully complete this assignment.
  • You must submit both parts as separate files to the assignment area. Label each file name according to the appropriate part.

Instructions

Part 1: System Implementation Document

You are to write an 8–10-page system implementation document in which you:

  1. Use graphical tools to design the logical and physical layout of the planned e-commerce company’s information systems.
  2. Use graphical tools to illustrate the possible placement of key infrastructure elements with external connectivity (Internet) and internal connectivity (firewalls, LAN).
  3. Develop the bill of materials and tabulate it in a spreadsheet to include item, description, model number, and approximate cost.
  4. Document the methodology and process to include the engineering, furnishing, and installation of the identified inventory.
  5. Use three sources to support your writing.
    • Choose sources that are credible, relevant, and appropriate.
    • Cite each source listed on your source page at least one time within your assignment.
    • Access the library or review library guides for help with research, writing, and citation.
Part 2: Updated Gantt Chart

Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the system implementation document.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for the narrative portion of your assignment to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Cyber Security

 Finding the Details

“If you know the enemy and know yourself, you need not fear the result
of a hundred battles.

If you know yourself but not the enemy, for every victory gained you
will also suffer a defeat.

If you know neither the enemy nor yourself, you will succumb in every
battle.” – Sun Tzu

In this week’s assignment you will be taking part in building out an
actor centric targeting plan making use of the intelligence cycle and
intelligence gathering techniques. You will be focusing your work on
collecting information on LulzSec, make use of the information from
the provided resources and your own research to build out the
targeting by using the knowledge of details such as its formation, its
members, its collapse, its attacks, etc.. 

Assignment

The discussion questions this week are from Chapter’s 8 & 9  (Jamsa, 2013).Chapter 8 topics:

  • Define and describe virtualization.
  • Describe the various types of virtualization.
  • Define and describe the hypervisor.
  • Define and describe green computing.
  • List the security advantages of cloud-based solutions.
  • Define and discuss the data wiping process.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19 PowerPoint AppCapstone Intro STEM

 
PowerPoint Introductory Capstone – STEM 

  

Project Description:

As a member of the local school district’s STEM (Science, Technology, Engineering, and Math) committee, you have been asked to create a presentation on STEM education to be used to build interest in expanding the STEM curriculum with the local school district and to seek funding from local business owners and taxpayers. You began a presentation and now need to add the content to the presentation.

     

Start PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_Stem.pptx. Grader has automatically added your last   name to the beginning of the filename. Download and extract the zip file   named Exp19_PPT_AppCapstone_Stem_Assets.zip.   

 

Change the theme   colors to Aspect.

 

 

Change the theme   fonts to Gill Sans MT.

 

On Slide 8, insert   the Microscope.jpg in the left   placeholder. Apply the Metal Oval
  picture style. Change the Picture Border fill to Dark Gray, Background 2,   Lighter 10%.

 

On Slide 10 in the   left content placeholder, insert the ElementarySchool.jpg   image. In the right content placeholder, insert the ElementarySchool2.jpg image.
 

  Apply the Simple Frame, White picture style to both images. Change the   Picture Border fill for both images to Dark Gray, Background 2, Lighter 10%.

 

On Slide 11 insert   the MiddleSchool.jpg image. Make   the following changes to
  the inserted image:
  • Crop the left side of the image so that most of the white area is removed.
  • Change the Shape Height of the image to 5.2“.
  • Apply the Simple Frame, White picture style.
  • Change the Picture Border to Dark Gray, Background 2, Lighter 10%.
  • Set the Horizontal position of the image to 3.6” and the   Vertical position to 1.9“.

 

On Slide 12 insert   the HSVideo.mp4 video file. Make   the following changes to the
  video:
  • Apply the Simple Frame, White video style.
  • Change the Video Border to Dark Gray, Background 2, Lighter 10%.
  • Set the video to start Automatically.

 

On Slide 4 insert the   image WorldMap.jpg as a background   image on the slide. Change the transparency to 40%.

 

On Slide 2 insert a   Picture Caption List SmartArt graphic.
 

  Add the following to the SmartArt graphic:
  • Type Science in the first bullet point in the Text pane and then insert Science.jpg as the image
  • Type Technology in the second bullet point and   add then insert the Technology.jpg   image.
  • Type Engineering in the third bullet point and add the image Engineering.jpg.
  • Type Math as the fourth bullet point and add the image Math.jpg.
 

  Apply the Intense Effect SmartArt Style to the SmartArt graphic.

 

On Slide 6 convert   the bulleted list to a Lined List SmartArt graphic and change the
  colors to Colorful–Accent Colors.

 

On Slide 3 apply the   Gradient Fill: Dark Purple, Accent color 5, Reflection WordArt style to the   text Why Stem?
 

  Make the following changes to the WordArt:
  • Increase the font size to 96 pt.
  • Change the Text Fill to Orange, Accent 1.
  • Apply the Wave Up text effect in the Transform gallery (Mac users: Apply   the Wave 2 text effect in the Transform gallery).
  • Change the Shape Height to 2.8“.

 

On Slide 4, insert an   Oval shape on the slide.
 

  Make the following changes to the Oval shape:
  • Change the Shape Height to 3.9” and the Shape Width to   3.9“.
  • Type 40th in Mathematics in the shape, change the font   color to Black, Background 1, and increase the font size to 36   pt.
  • Change the Shape Fill to White, Text 1 and the Shape Outline to No Outline.
  • Change the Transparency to 36%.
  • Set the Horizontal position of the shape to 2” and the Vertical position   to 2.5“.

 

Make a copy of the   formatted oval shape and paste on the slide. Set the Horizontal position of
  the new shape to 7” and the Vertical position   to 2.5“. Highlight the text in the shape, and type
25th in Science.

 

On Slide 9 insert a   table with 2 columns and 6 rows. In the table, merge the following:
  Column 1 – Merge the cells in rows 1 and 2
  Column 1 – Merge the cells in rows 3 and 4
  Column 1 – Merge the cells in rows 5 and 6 

 

Make the following   changes to the table structure:
  • Apply the No Style, Table Grid table style.
  • Change the width of the first column to 2.8“.
  • Change the width of the second column to to 8.2“.

 

Type the following   information into the table:
  Row 1: Col 1: Elementary School; Col 2: Focuses   on introductory STEM courses and awareness of STEM occupations
  Row 2: Col 2: Provides structured inquiry-based and real-world   problem-based learning, connecting all four of the STEM subjects
  Row 3: Col 1: Middle School; Col 2: Courses   become more rigorous and challenging
  Row 4: Col 2: Student exploration of STEM-related careers begins at   this level
  Row 5: Col 1: High School; Col 2: Focuses   on the application of the subjects in a challenging and rigorous manner
  Row 6: Col 2: Courses and pathways are now available in STEM fields   and occupations

 

 

Set the height of the   table to 4.8“. Apply Center and Center Vertically   alignments to the first column of the table. Apply Center Vertically to the   second column of the table. 

 

In the table, apply the   following shading:
  •Red, Accent 2 to the cell with the text Elementary   School
  •Orange, Accent 1 to the cell with the text Middle School
  •Dark Blue, Accent 3 to the cell with the text High School

 

On Slide 5 insert a   Clustered Column chart. Replace the spreadsheet information with
  the following information: Leaving cell A1 blank, type Percentage in cell B1. Populate   cells A2:B7 with the following:
 

All Occupations 14%
Mathematics 16%
Computer Systems Analysts 22%
Systems Software Developers 32%
Medical Scientists 36%
Biomedical Engineers 62%
  Change the source data to use the range A1:B7.

 

Make the following   changes to the chart:
  • Remove the chart title, gridlines, legend, and vertical axis.
  • Increase the font size of the x-axis (horizontal) to 16 pt.
  • Add Outside End data labels and change the font size to 18 pt.

 

Click Slide 13 and   use the Reuse Slides option to insert Slides 2–5 from Careers.pptx. Keep the source formatting of the original slides   (inserted slides).

 

Start Excel. Open the   downloaded file named StemData.xlsx   and save it as StemData_LastFirst.xlsx. Copy the chart from   the HarrisData worksheet and embed the chart using Paste Special on Slide 13.
 

  Change the Shape Height to 4.8“. Set the Horizontal   position to 1.4” and the Vertical position
  to 1.9″.

 

On Slide 1 select the   blue circle shape, press SHIFT, and then select the inserted icon. Group the   shapes. Repeat for the three remaining shapes on the first slide to group   each of the circle shapes with their associated icons.

 

 

On Slide 5 apply the Fly   In animation (Entrance category) to the chart. Set the Effect Options   Sequence to By Element in Category. Set the animation to start After   Previous. 

 

Delete Slide 7. Add   slide numbers to all slides with the exception of the first slide. Apply the   Split transition to all slides.

 

On Slide 1 type Welcome   to our presentation on STEM education. (including the
  period) as a speaker note.

 

Check the   presentation for spelling errors, and correct any errors.

 

Save and close Exp19_PPT_AppCapstone_Intro_STEM.pptx.   Submit the file as directed.

I need help with Python work Q3 only

Question 3

With increasing use of technology in finance, regulators are also showing keenness in the usage of technology in regulatory matters. To quote the words of Mr. Andrew G Haldane, Chief Economist of the Bank of England, in a speech he made in 2014, he said1

Project 2: Client Response Memo

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

 

How Will My Work Be Evaluated?

In writing a clear and concise memo in response to senior management queries, you are demonstrating your communication skills, technical expertise, and responsiveness to customer/client needs and concerns.  

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas. 
  • 2.3.2: Incorporate relevant evidence to support the position. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies. 
  • 12.3.2: Describe the implementation of controls. 
  • 12.4.1: Document how IT controls are monitored. 

need help in homework

Write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.