capstone

 

  • Overview of the Business Information Technology System selected (e.g., system description, system boundary) (2 pages), that includes:
  • Identification of the assets involved (i.e. hardware, software)
  • Identification of the business impacts (data, information, financial)
  • Existing risks that pertain to the system i.e. threats and vulnerabilities (1/2 page)
  • Existing gaps in reducing risk (1/2 page)
  • Impact of these risks and why remediation or mitigation is needed (1 pages)
  • Remediation or mitigation approach based on risk management or information security literature, frameworks, methodologies (1 pages)
  • Conclusion (1 page)
  • Reference list (10 or more scholarly sources; no Websites or Internet articles)
  • Include your annotated bibliography (working bibliography) as an appendix

Design and code a class

  

Problem

Design and code a class that will be used to encapsulate a collection of “segment” objects.

Write the code for a class called a “disk” which may contain any number of segment objects, and a string (maximum of 2 characters) indicating the mode (i.e. “w” (write), or “a” (append)) that this disk may be accessed with.

You must modify the attached “segment” class to include the following constructors, each calling their appropriate initialize( ) function(from the attached segment files):

segment( )

segment(const char [ ][2000], int)

As well, you must change the following functions:

int match(const char [ ]);

voidget_word(char [ ], int);

charget_char(int, int);

which were not declared as const functions previously, into constant member functions, by adding the keyword const after their declaration in both the “segment.h” and “segment.cpp” source files.

A “disk” has the following publicly accessible MEMBER functions:

disk(intnum_of_segments, const char *mode)

This constructor allocates enough memory for the disk to storea series of up to “num_of_segments” segments, and sets thedisk’s access mode to the constant string stored in “mode”.

If the string in “mode” is anything other than “w”, or “a”,the disk’s mode must be set to “w” (write).

disk( )

This constructor allocates enough memory for the disk to store

up to twenty (20) segments, and initializes the disk’s access

mode to “w” (write).

const char* get_mode( ) const

This function returns the disk’s access mode as a constant string.

segmentget_segment(intpos) const

This function returns the segment at position “pos”

(where a “pos” value of 0 means the first segment).

The function returns a default segment if “pos” does not reference

one of the disk’s properly initialized segments.

intget_segment_count( ) const

This is used to return an integer value representing the number of

segment objects that have been properly initialized.

const segment* get_all_segments( ) const

This function returns the array containing all of the disk’s

data segments.

int access(const char fname[ ])

This function will either write “w”, or append “a” data

(depending on the access mode) to the file whose name is

stored in “fname”, and return the number of charcters processed

(please see below for details about each access mode).

write:

For this operation, the function must write all of the data in eachof the class’s segments (one segment per line) followed by a newline.

Also, each word in the segment must be separated by a space ‘ ‘ when written to the file spaces and newlines each count as a single (1) character when written).

NOTE: This operation overwrites any data which the file may have

contained.

(see example below).

Assume a “disk” object consists of the following 3 segments:

words: 1 2 3 4 5 6 7 8 9 10

segment1: “”, “” “This”, “is”, “OOP244”, “”, “”, “”, “”, “”

segment2: “Isn’t”, “this”, “”,  “”, “easy?”, “”, “”, “”, “”, “”

segment3: “”, “”, “”, “Yes!”,””, “”, “”, “”, “”, “”

Then the function would write the following to the file:

This is OOP244

Isn’t this easy?

Yes!

and return a value of: 37

15 for (line 1) +

17 for (line 2) +

5 for (line 3)

for a total of 37 charcters written to the file.

BE CAREFUL HERE!

Pay careful attention to the number of spaces and newlines written with respect to each segment!

append:

Exactly the same as “write”, except that data is appended to the end of the file instead of being overwritten.

operator+= 

You must also be able to add segments to a disk by overloading the

+= operator which adds segments (on the right side of the operator)to the disk (on the left side of the operator), unless the disk is already full in which case nothing is done.

NOTE: This operator must return the newly modified “disk” object by value.

NOTE: Because “proper copies” of “disk” objects must be made, it will be necessary for you to include a copy constructor as well an equal operator overload to handle situations when “disk” objects are returned by value or when they are assigned to one another.

You must also code a destructor to remove any memory which may have been dynamically allocated.

A main program (a3main.cpp), which will assume that your “disk” class is declared in a file named “disk.h” and should be compiled and linked with the code for the “disk” (which presumably will be in “disk.cpp”), will test your class to see if it works properly.

Note: The file assign1.c (which searches through the constant null-terminated string “core” looking for the characters ‘1’ and ‘0’ which, when taken 8 at a time and convert to their numeric value in decimal, encode a meaningful ascii character, and inserts that character into the array “data”) attached will need to be executed as part of the solution.

a3main.cpp and assign1.c must not be modified or the solution will be invalidated.

Help2

 Provide feedback on the posts from your group members and state which option would be chosen from their perspective as a potential solution to the problem. You must provide at least one constructive response to each team member within your group. Responses must be at least four sentences to be counted as valid. 

Cyberattack Incident Response Plans

Respond to the following in a minimum of 175 words:

Common types of cyberattacks include socially engineered malware, password phishing attacks, and security breaches related to unpatched software. These attacks have become so common that organizations need to have incident response plans ready. Select 2 different types of cyberattacks and discuss what information should be listed in an incident response plan for each attack. Be as detailed as possible.

Week 2 Lab

 

Steps

Here are the Week 2 Lab Instructions

  1. Prepare a Word file with the following elements (program code and screenshot) that follows Parts A and B in the instructions.
  2. Create a new C++ Console Project in Visual Studio.
  3. Write, test, and debug your program.
  4. Paste your final program code into the Lab Report Template (Links to an external site.).
  5. Paste a screenshot of your working program into the lab report.
  6. Zip the folder you created when you created your project in Visual Studio. (Make sure Visual Studio is not open when you attempt to zip the folder).
  7. Submit the Word file and the zip file.

paper

Read the attach paper and write a comprehensive summary/review of the paper as follows: 

  • Make sure to identify strength and weakness this research paper
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free
  • Upload your response as pdf/word file 
  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 

SE493 week 5

Discussion 5: ( Required Posting)

Due: Please post your initial discussion No later than Thursday or Friday of this week. (80 Points)

Due :Peer/Classmate review/comment: Provide comments to other class members No later than Friday or Saturday of this week. Please mention the classmate/s name.(20 points)

Please take a few minutes and check the discussion board on Sunday and make sure to reply to peer comments OR my comments/query.

Please read IGU Grading Rubric  and late participation grading policy for discussion posted under policy section course modules.

Discussion Topic 

During the past 4 weeks you have studied several software methodology techniques. Discuss what methodology or subject that you have learned has been your favorite topic/subject? Write a paragraph and briefly discuss and share your learning experience with classmates.

Please list your reference

Week 11

1.Write at least 500 words discussing how text mining and anti-crime applications are making internet crime prevention easier.  Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.

2.Write at least 500 words comparing and contrasting multi-threading and parallel processing. Use APA format and Include at least 3 quotes from your sources enclosed in quotation marks.

Cybersecurity

 

Wk 7 – Class Discussion – Secure Network Design

Secure Network Design and Cloud OutsourcingThe increase in the use of cloud services means that network security design must be taken into account.  What are the security design impllications for the differnet Cloud service models?  Be sure to take into account IaaS, SaaS, PaaS and FaaS and network security issues for each model.  Be sure to note both the Cloud providers role and the Client’s role in securing the network.Keep your discussion under 200 words, be sure to substanially comment on two(2) of your classmates discussions (minimum 50 words).  Cite all sources,(remember no citations no validy.)