Returns True

Returns True after converting the image to monochrome.

All plug-in functions must return True or False. This function returns True

because it modifies the image. It converts the image to either greyscale or

sepia tone, depending on the parameter sepia.

If sepia is False, then this function uses greyscale. For each pixel, it computes

the overall brightness, defined as

0.3 * red + 0.6 * green + 0.1 * blue.

It then sets all three color components of the pixel to that value. The alpha value

should remain untouched.

If sepia is True, it makes the same computations as before but sets green to

0.6 * brightness and blue to 0.4 * brightness.

Parameter image: The image buffer

Precondition: image is a 2d table of RGB objects

Parameter sepia: Whether to use sepia tone instead of greyscale

Precondition: sepia is a bool

Discussion

 

Week 11 Discussion

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0

Topic: information Security risk management Write a literature review of the given topic You are requested to write review, survey or state-of-art article. The article has to give an overview of existing literature in a field, often identifying specifi

 

Topic: information Security risk management

Write a literature review of the given topic 

You are requested to write review, survey or state-of-art article. The article has to give an overview of existing literature in a field, often identifying specific problems or issues and analyzing information from available published work.

This is a literature review paper

Ten of references must to be from journal articles published in well publishers’ databases; IEEE, Springer, Elsevier, Wiley and Taylor & Francis.

SECURITY ASSESSMENT & TESTING

Business Case: Local Hospital’s data center

Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.

Where the Local Hospital’s parameters are:  600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations. 

Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.

QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it.  What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?

How can you adapt the principles for your hospital case?

Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 2: Companies should assess threats and develop controls for the most critical assets.

If the threats against tour Hospital IT System are 

Manipulation of software

Unauthorized installation of software

Misuse of information systems

Denial of service

What would be controls that you should apply to mitigate above listed risks?

Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?  

Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

DS_research

Topic: Quantitative v. Qualitative security risk assessment

Your Research Project is due this week. It must consist of:

1. 5 sources annotated bibliography( In this case, write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.)

2. Summary or Abstract containing at least 850 words.

Cloud Computing

 Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.

 Chapter 7 topics:

  • Define collaboration.
  • Define and describe cloud-based collaboration.
  • The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
  • List the questions one should consider when evaluating a cloud-based collaborative solution.

Take the following

  

Take the following set of Pseudocode and make a flowchart as well as an output sample using the visual logic program:
Begin parcelCharges
 

Calculate delivery_charge
Prompt parcel for weight in kilograms (kg)
Get parcel_weight
If parcel_weight <2.5 THEN
delivery_charge = $3.50 * parcel_weight
else
If parcel_weight <= 5 THEN
delivery_charge = $2.58 * parcel_weight
else
delivery_charge = $2.45 * parcel_weight
ENDIF
ENDIF
Display “Delivery charge for parcel is”, delivery_charge
 

End

Presentation on cybersecurity to seniors

Cyber Awareness for seniors

social engineering

-What is cybersecurity

-why do we need cybersecurity

-what is social engineering

part 2 or body 

Talk about phishing

– what is phishing

– what are some example of phishing

– what are biggest cybersecurity threats to seniors right now?(wire transfer,emails links etc..)

– How can you know your informations have been harcked

A little video on phishing or cyber to intertain them or have their attention ( it could be funny)

Part 3

Tips on how to protect your informations

then couples of links should they need more informations.