cloud

You are required to use at least two sources (besides your textbook) to answer the above questions.

The discussion questions this week are from Chapter’s 3, 4, and 5 (Jamsa, 2013).

1. List the computing resources normally provided with a PaaS. (50 words)

2. Define and describe colocation. Discuss how you might use IaaS to implement colocation. (50 words)

3. Define SAML and describe its purpose. (50 words)

4. Define and describe provisioning. (50 words)

Homework Computer Science

1 — Some say that analytics in general dehumanize managerial

activities, and others say they do not. Discuss arguments

for both points of view.

2—- What are some of the major privacy concerns in employing

intelligent systems on mobile data?

3— Identify some cases of violations of user privacy from

current literature and their impact on data science as a

profession.

4—-Search the Internet to find examples of how intelligent

systems can facilitate activities such as empowerment,

mass customization, and teamwork.

Discussions

 

1.

Discuss the objectives of establishing security procedures within an SSP for an organization’s Information Systems.

Discuss two of the barriers to establishing security procedures within an organization.

2)

 

 Discuss the natural friction between the desire to restore IT capability within an organization quickly and the need to determine the cause to prevent further attacks within the Remediation Plan.

Discuss at least two of the barriers to developing an effective remediation plan

Provide any available scholarly research, directives, publications, memorandums to support your discussion and provide references in APA 7 format.  Provide at least two sources from academic or scholarly literature.

Case Study 5.1

 Read the attached case study  “APPLE WATCH” and provide a short answer to each question.

Writing Requirements

  • 2 -3 pages in length  (excluding the cover page, abstract, and reference list)

discussion response- operating system 2

 Please respond to the below text in at least 100 or more words.

The operating systems were designed to run on desktop and  laptop computers. Mobile devices such as phones, tablet computers, and  MP3 players are different from desktop and laptop computers, so they run  operating systems that are designed specifically for mobile devices. An  operating system is the most important software that runs on a  computer. It manages the computer’s memory and processes, as well as all  of its software and hardware. It also allows you to communicate with  the computer without knowing how to speak the computer’s language.  Without an operating system, a computer  is useless. The operating system (OS) allows users to perform the basic  functions of a computer. The OS manages all software and peripheral  hardware and accesses the central processing unit (CPU) for memory or  storage purposes. It also makes it possible for a system to  simultaneously run applications. All PCs, laptops, tablets, smartphones,  and servers require an OS. Developers may use specific operating  systems that are more conducive to programming and application  development, while the average employee will likely use a proprietary  system for more common, everyday usage. The most common operating  systems are Microsoft’s Windows, Apple’s OS X, Linux distributions, and  mobile operating systems for smartphones. A PC can be a Linux, Windows,  Mac, Chrome variant, or other OS installed on it. A PC is a personal  computer. A smartphone can also have different OSs on them and with  different levels of security, the same goes for tablets. These are all  hardware devices that you are asking a question about, the security will  be mostly software related with some extra hardware sometimes. That is  like asking a question what tires will last better, a hand wagon, a car,  or a semi-truck. All can be secure and all can also be a leaking  component for your information and privacy leaving you vulnerable to  attack.

Assignment

Select one American healthcare organization (“covered entity” in HIPAA parlance) that frames your research. Describe the organization, its components assuming it’s a healthcare “system,” its business in general, and any additional descriptive information that will inform your reader about your subject matter.  Describe and define at least one the laws focused on compliance within the healthcare sector that came up during our course. Research the law itself, any legal cases that were based on that law, and the critique of the law that you found through your research. Of course, if your selected covered entity was involved in such litigation, or has published their critique, include that information too.  In addition to compliance laws that directly target healthcare institutions, countless other laws apply to them. Use the U.S. Patent and Trademark Office’s website to discover whether your selected institution has been awarded intellectual property rights for their trademarks, patents, or IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the most prominent criminal or tort risks that your entity faces; or perhaps has been involved in.  In addition to risks in the realms of criminal or tort law, every organization faces the potential risk of enduring a cyber-attack or other incident that must be followed by a forensics investigation. Keeping the focus on your organization and the healthcare sector, research and discuss an incident or case in which such an institution was compelled to go through the forensic investigation process. There are no sectors exempt from those incidents or cases, regrettably, so be diligent and you will find one to discuss.  Conclude the Portfolio with your overall assessment of whether the legal system—from compliance mandates, to IT, criminal, and tort laws, to forensic investigations—benefits, hurts, or otherwise affects the institution. Assume the role of information security and privacy risk consultant in this section. 

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

Discussioon 250 words

 

Each week please link to an instructor facilitated Discussion Board forum. A Discussion Board rubric clearly communicates expectations for participation, please see the NEC Grading Matrix for Discussion Board Postings as an example.

In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?