blockchain development

 choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successfully enterprise blockchain implementation. Then think of three questions you’d like to ask others at the end.

Security Architecture and Design Assignment 1

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. 

  1. When should the architect begin the analysis?
  2. What are the activities the architect must execute?
  3. What is the set of knowledge domains applied to the analysis?
  4. What are the tips and tricks that make security architecture risk assessment easier?

Project Exploratory Analysis

In this assignment, you will perform an exploratory analysis that will allow you to get a feel for the data and start exploring potential relationships. This may include:

  • Descriptive statistics
  • Histograms
  • Bar charts
  • Heat maps
  • Line graphs
  • Box plots
  • Frequency tables

Once your analysis is complete, you will need to provide a Word document showing and describing the results of your exploratory analysis. This assignment is due by 11:59 PM CT on Sunday.

Project Part 2: Risk Assessment Plan

 Please see attached.

Project Part 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the next step is to create a draft of the risk assessment plan. For this part of the project:

  1. Research risk assessment approaches.
  2. Create an outline for a basic qualitative risk assessment plan.
  3. Write an introduction to the plan explaining its purpose and importance.
  4. Define the scope and boundaries for the risk assessment.
  5. Identify data center assets and activities to be assessed.
  6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
  7. Identify relevant types of controls to be assessed.
  8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
  9. Develop a proposed schedule for the risk assessment process.
  10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide
  • Estimated length: 4–6 pages

Practical Connection – Cryptography

Assignment: Need this by 6pm est today

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Case study

List and explain the new banking technologies and describe how fintech industries has transformed how banks operate

YouTube link:-
https://youtu.be/pPkNtN8G7q8
Answer the above question from the video

computer concept

 It is important for students to pay close attention to the submission guidelines in order to receive full credit for this assignment.  Save the file as MSExcelProjectLastNameFirstName.xlsx (where LastNameFirstName should be replaced with your last and first name)  Close the file after saving it. Otherwise the file will not attach properly to the email message.  Submit the file to Blackboard. 

assembly language

CSP25 Assignment 05
Question 1 (From Chapter 5)
The RandomRange from the Irvine32 library generates a pseudo random integer between 0 and
N-1. Your task here is to improve this by generating a random  number between M and N-1. Let
the user specify M in EBX and N in EAX.
Here is a sample test of this procedure whose name will be BetterRandomRange in your
program.
MOV EBX,-300   ;M is -300
MOV EAX,100   ;N is 100
Call BetterRandomRange

You should call this BetterRandomRange procedure in a loop to be repeated 20 times and display
the value return 20 times also.

Make sure you have the following at the top of your Assembly code file. Fill it up accordingly
such as the name of the asm file will be Assignment05.asm
; Program Template (Assignment01.asm)
; Program Description:
; Author:
; Creation Date:
; Revisions:  
; Date:Modified :
Also make sure to document your Assembly code.

What to submit?
TWO files.
1. Copy your program and paste it to a text editor such as Notepad and save file as .txt file
then submit this text file.
2. A pdf file that has your code (copied or screenshot) and output of dumping of your
registers.
 

Cyber Weapons

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

After doing some research on the more notorious virus, worm, or spyware attacks in the last few years, choose one and post a brief one paragraph summary discussing:

(a) the name of the malware and category (virus, worm, etc.)
(b) target operating system
(c) the malware’s tactic for infecting a victim PC
(d) effect on an infected system
(e) how many computers were infected over what time period
(f) malware author, if known, and whether s/he was ever
apprehended and successfully prosecuted.