Instructions are attached.
2 Discussions and 1 case Study
Discussion 7.1
What are the 5 pillars of Cyberwarfare?
Discussion 7.2
Describe the 5 stages of APT
100-130 Words only for discussions
Case Study 7.1
Describe 3 theories/ideas that you think characterize the future of Cyberwarfare, and explain their significance.
Writing Requirements
- 3-4 pages in length (excluding cover page, abstract, and reference list).
Refrences should not be older than 2015
Refrences should not be older than 2015
Refrences should not be older than 2015
Refrences should not be older than 2015
Article Summary
– Find 2-3 recent peer-reviewed articles (within the past 3 years) that ‘closely relate to Impact of Mobile Computing on Businesses’
– Should be a minimum of 750 words
– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.
Assembly Language
Write an assembly language program that reads move review information from a text file and reports the overall scores for each movie as well as identifying the movie with the highest total score. There are four movie reviewers numbered from 1 to 4. They are submitting reviews for five movies, identified by the letters from “A” through “E”. Reviews are reported by using the letter identifying the movie, the review rating, which is a number from 0 to 100, and the reviewer’s identifying number. For example, to report that movie B was rated a score of 87 by reviewer 3, there will be a line in the text file that looks like this:
B,87,3
The fields within each record are separated from each other by a comma.
Your program must store the movie review scores in a two-dimensional array (4 rows by 5 columns). Each row represents a reviewer. Each column represents a movie. Initialize the array to zeroes and read the movie review information from a file. After reading and processing the whole file, display a report that shows the total score for each movie and the movie that had the highest total score.
Section 9.4 of our textbook discusses two-dimensional arrays. Section 9.4.2 discusses Base-Index Operands and even contains an example of how to calculate a row sum for a two-dimensional array.
Chapter 11 contains an example program named ReadFile.asm that will show you how to prompt the user for a file name, open a file, read its contents, and close the file when you are done. Look in section 11.1.8, Testing the File I/O Procedures.
Each record in a text file is terminated by the two characters, Carriage Return (0Dh) and Line Feed (0Ah).
Assume that you wish to process a text file named “reviews.txt” that is stored on the “C:” drive in the “Data” folder. If you are using a Windows computer, you have two ways to identify the path to the file’s location:
C:/Data/reviews.txt OR C:\Data\reviews.txt
Double backslash characters () are needed because a single backslash is defined as being the first part of an escape sequence such as newline (n).
This code can be used to load a reviewer’s score into the array of movie reviews:
; Insert score at reviews[rowIndex][colIndex]
mov edx,rowSize ; row size in bytes
mov eax,rowIndex ; row index
mul edx ; row index * row size
mov index,eax ; save row index * row size
mov eax,colIndex ; load col index
shl eax,2 ; eax = colIndex * 4
add eax,index ; eax contains offset
mov edx,score ; edx = reviewer’s score
mov ebx,OFFSET reviews ; array of review scores
mov [ebx + eax],edx ; Store score for movie
Sample Data for Review.txt
D,84,2
A,90,3
A,87,4
B,35,4
B,100,1
C,75,1
D,84,1
B,87,2
A,0,2
C,25,2
D,45,3
E,35,3
A,90,1
B,100,3
C,75,3
E,35,1
C,78,4
E,35,2
D,100,4
E,0,4
Project 5
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
Self-Assessment Checklist
§ I created a policy that addressed all issues.
§ I followed the submission guidelines.
online voting system along with biometrics
Requirements :
- Title of the project (with the list of project team members);
- Executive Summary;
- Table of Contents;
- Introduction;
- Project Plan;
- Functional Specifications (including descriptions of Actors/Roles; Business Rules; Use-Case
Diagrams with Use-Case descriptions; Examples of Class Diagrams (related to particular Use Cases); Examples of Object Diagrams [related to the selected Class Diagrams]; Examples of Sequence Diagrams; Examples of Collaboration or Communication Diagrams; Examples of State- Chart Diagrams); - Functional Tests Plan;
- System Design Specifications (including System Architectural [Layered, “Physical”] Design
Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; Entity- Relational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms); - Integration Tests Plan;
- Issues to Future Studies;
- Conclusion;
- References;
- Appendices (if any).
cloud 12
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
Please
Please help with following questions
Looking for 3 hour AI tutor in the following 24 hr
Looking for 3 hour AI tutor in the following 24 hr
Operational Excellence Discussio.
Discussion: This week we focus on the concept of the balanced scorecard. Please note what it is and how organizations use balanced scorecards. Note any alternative methods organizations use instead of the balanced scorecard and why they would use these methods over the balanced scorecard.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.