cyber security discussions

1)  The student will successfully discuss current computer technology and principles used to secure computer systems. Specifically: discuss cryptography, authentication, AND access control. (300 words min).

2)  The student will successfully discuss current cyber security as it relates to IoT software protection mechanisms used to protect the consumer (i.e. cryptography, encryption, etc.). 300 words min

Discussion 4 – Proj Risk

 Assigned Readings:Chapter 9: Risk response and Treatment OptionsChapter 10: Risk Monitoring and ControlProject Quality Conference Paper:  https://www.pmi.org/learning/library/practice-three-project-quality-management-7198Project Quality Conferecne Paper:  https://www.pmi.org/learning/library/developing-grading-system-project-quality-6731Six Sigma Conference Paper:  https://www.pmi.org/learning/library/quality-commitment-six-sigma-initiatives-4801Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  • What is TQM?
  • What must a Project Quality Plan address?
  • What does the cost of quality refer to?
  • What is Six Sigma?
  • Compare and contrast Quality Control and Quality Assurance.
  • Please research and provide a two page, referenced discussion on the logic of identifying and eliminating risk for a project and be sure to include an explanation on how an organization comes to conclusions as to how much revenue and time to commit to this process.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review] 

Text

 

Title: Managing Project Risks; 464 Pages

ISBN: 978-1-119-48975-7

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards

Publisher: Wiley-Blackwell

Publication Date: 2019

Building Ethical Judgment Capabilities

Introduction

Computer ethics is a rich topic that affects all of us in our interconnected world. To build good ethical judgment capabilities, Bynum and Rogerson (1) suggest applying a multi-staged approach to case study analysis where these stages are defined as: (1) detailing the case study, (2) identifying key ethical principles and specific ethical issues raised by the case, (3) calling on your experience and skills for evaluation, and (4) applying a systematic analysis technique. In this assignment, you will perform the first three of these steps for a case study.The specific course learning outcome associated with this assignment is:

  • Examine the ethical considerations and dilemmas of a diverse and interconnected world.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you analyze a computer ethics cases.Read the article entitled, “Your Botnet is My Botnet: Analysis of a Botnet Takeover,” about a team of researchers who reverse engineered the Torpig botnet, controlled it, and captured data.

  • Describe the nature and details of the case, including the persons, organizations, and stakeholders involved.
  • Describe ethical principles both supporting the actions of the principal actors (such as minimizing harm or damage to targets of the attacks) in a computer ethics case and contradicting the actions of the principal actors, citing specific, credible sources that support one’s assertions and conclusions.
  • Explain why you agree or disagree with the actions of the principal actors in the case, citing specific, credible sources that support your position from an ethical perspective. 
    • Justify your position from an ethical perspective.
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence. 
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and nearly free of spelling, typographical, formatting, and/or punctuation errors. 
    • Use section headers in your paper to clearly delineate your main topics.
Sources
  1. Terrell Ward Bynum. 2003. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Cambridge, MA: Blackwell Publishers, Inc.

book review

 original text book :  Project Management: A Systems Approach to Planning, Scheduling, and Controlling by Harold R. Kerzner

For your final assessment of learning in this course you are to read a book on project management and review it. The review must be formatted in APA style to include in-text citations and a References page. The review has no minimum or maximum page length; however, it must fully address the following:

  1. What are the main concepts in this book?
  2. Compare and contrast these concepts with those in our textbook.
  3. What did you think of the book?

The following are the first several eBooks on project management that are in our online library. You are not limited to this list; it is just a place to start.

  1. Project Management : A Common Sense Guide to the PMBOK, Part One-Framework and Schedule

By: Marion, James W. Series: Project Management, Part one, Framework and schedule. New York, NY : Momentum Press. 2018. eBook.

  1. Project Management : A Multi-Perspective Leadership Framework

By: Mikkelsen, Hans; Riis, Jens Ove. Edition: First edition. Bingle, UK : Emerald Publishing Limited. 2017. eBook.

  1. Project Management : Practices, Challenges and Developments

By: Hoffmann, Elizabeth C. Series: Management Science – Theory and Applications. Hauppauge, New York : Nova Science Publishers, Inc. 2013. eBook.

  1. Project Management

By: Lock, Dennis. Edition: 10th ed. Burlington, VT : Gower. 2012. eBook.

  1. Successful Project Management

By: Young, Trevor L. Series: Creating Success. Edition: Fifth edition. London : Kogan Page. 2016. eBook.

Using Stack to Evaluate Expression

 

Using a Stack to Evaluate an Expression

We often deal with arithmetic expressions written in what is called infix notation:

         Operand1 op Operand2

We have rules to indicate which operations take precedence over others, and we often use parentheses to override those rules.

Example: Suppose we have this infix expression Q:

         5 * ( 6 + 2 ) – 12 / 4

We can use two stacks to evaluate the expression: a stack for operands, a stack for operators (and parenthesis). We can split the string into array of tokens.

  1. While there are still tokens to be read in,

   1.1 Get the next token.

   1.2 If the token is:

       1.2.1 A number: push it onto the value stack.

       1.2.2 A variable: get its value, and push onto the value stack.

       1.2.3 A left parenthesis: push it onto the operator stack.You can also
choose to push the left parenthesis into the operand stack.

       1.2.4 A right parenthesis:

         1 While the thing on top of the operator stack is not a

           left parenthesis,

             1 Pop the operator from the operator stack.

             2 Pop the value stack twice, getting two operands.

             3 Apply the operator to the operands, in the correct order.

             4 Push the result onto the value stack.

         2 Pop the left parenthesis from the operator stack, and discard it.

       1.2.5 An operator (call it thisOp):

         1 While the operator stack is not empty, and the top thing on the

           operator stack has the same or greater precedence as thisOp,

           1 Pop the operator from the operator stack.

           2 Pop the value stack twice, getting two operands.

           3 Apply the operator to the operands, in the correct order.

           4 Push the result onto the value stack.

         2 Push thisOp onto the operator stack.

  1. While the operator stack is not empty,

    1 Pop the operator from the operator stack.

    2 Pop the value stack twice, getting two operands.

    3 Apply the operator to the operands, in the correct order.

    4 Push the result onto the value stack.

  1. At this point the operator stack should be empty, and the value

   stack should have only one value in it, which is the final result.

Note: Pay attention to negative operator and parenthesis.

Requirements:

1. Submit the repl.it link of the program

2. Copying code from others or from the Internet is considered as cheating and will result in 0 for the project

RFP part 2

 

Module 02 Content

  1. Working off the same Request for Proposal.docx , continue to use your imagination and the fictional website hosting service provider you previously created to complete the following sections of the RFP Response Template.docx that you were developing in the previous week.

    Request for Proposal.docx

    RFP Response Template.docx

    With this fictional business in mind, complete the following sections of RFP Response Template:

    • Replacing any noted locations with the fictional company’s information.
    • Note that Section 4.2 has already been completed.
    • Section 4.3 (Sections 4.3.1 – 4.3.2)
    • Section 4.4 (Sections 4.4.1 – 4.4.5): After researching cloud-based service providers, establish the infrastructure, service levels, and services. Create a fictional infrastructure, including the number of servers and storage. Then within this fictional environment, and using influential communication techniques, generate monitoring techniques, backup, disaster recovery, and security for the environment. Include compliance with governing agencies based on the type of service being provided.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

      Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504