Describe four proven data protection strategies a company can use to protect their data stored in the cloud. Use your textbook and quality external resources for your writing assignment. Remember to cite your sources. APA format is preferred. However, MLA or Chicago (Turabian) would be fine as well. The important part to me is that you cite your sources consistently. This assignment should be 3-5 pages in length
Own work easy words no plagarism
Using the industry where you currently work or have worked before, write a 3 to 5-page proposal recommending your choice between Android or iOS? From a user and developer’s perspective, which would you recommend to your company and why? Your assignment must follow these formatting requirements:
- Please provide peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment.
Data Classification and Data Loss Prevention
Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf
It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?
The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.
After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.
Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)
Wk 4 – Apply: Project Documentation [due Day 7] Wk 4 – Apply: Project Documentation
The assignment will be based off of the project plan that is attached for Lowkey Inc.
To complete this assignment, you will create the below based on the attached proposed project for Lowkey Inc:
- A system diagram that shows, in graphic form, the components of your project.
- Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
- You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
- A network diagram that shows, in graphic form, the flow of data within your project.
- Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
- You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
- A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
- A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
- Source code (may be partial) for at least one software application.
- Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
- Download and unzip the HTML/JavaScript/CSS sample code files for an example of a partial software application implementation.
- A quality assurance and software test plan.
- Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.
Note: All deliverables must be portfolio ready, which means as complete and error-free as possible.
Submit your assignment.
Data Structures
Please answer the following with a minimum of at least 200 words. Be sure to site your references as well.
Discuss the characteristics of ArrayList, LinkedList, and Vector, and when to use them. You are strongly encouraged to use code to elaborate on your answer.
spd3
please see document
Computer 1
Write one full page about internet of things(IoT).
find at least two scholarly articles about IoT.
Prepare a summary of issues related to IoT.
Make sure to include the followings:
1) the impact of IoT on organizations and society
2) government regulations on IoT
3) Be sure to give attribution to your sources.
Physical security
Perform a Vulnerability Assessment of your place of employment or living area.
lab
please see all documents
Python Programming
Assignment Rules:
Open book and notes assignment
- This homework tests your knowledge of File Handling, use of String methods, and use of Sets.
- Adhere to the naming conventions discussed in class for variable names, program name and function names
- Use meaningful names for variables, functions etc
- If there are two words in the variable use first word lowercase and first letter of second word upper case i.e., firstName or underscore between 2 words i.e first_name
- Include appropriate comments in the code
- Output should be displayed similar to as mentioned against each problem
- Indent the lines of code appropriately
1. char_analysis.py (40 points)
Write a program that reads the file’s contents and determine the following:
- The number of Uppercase letters in the file
- The number of Lowercase letters in the file
- The number of digits in the file
- The number of whitespace characters in the file
HINTS:
Define main():
Declare Local variables
Open file text.txt for reading. Use ‘text.txt’ file available under the Modules section in Canvas.
Use for loop to step through each character in the file.
Determine if the character is uppercase, lowercase, a digit, or space, and keep a running total of each.
Close the file.
Display the totals of uppercase, lowercase, digits, spaces.
Sample Output:
Uppercase letters: 29
Lowercase letters: 1228
Digits: 30
Spaces: 260
2. unique.py (30 points)
Write a program that opens a specified text file (text2.txt) and displays a list of all unique words found in the file.
HINTS:
Define main():
Declare Local variables
Open file text2.txt for reading. Use ‘text2.txt’ file available under the Modules section in Canvas.
Use ‘set’ method to find the unique words in the file and store each of them as an element of the set.
Close the file.
Display all the unique words from the set.
Sample output:
These are the unique words in the text:
management.
name
been
later,
canceled,
is
Eastern,
delay
Eight
1,820
at
it
1867
official
world
and
company,….
3. name.py (30)
Write a program that gets a string containing a person’s first, middle, and last names, and displays their first, middle, and last initials. For example, if the user enters Susan Smith Miller, the program should display S.S.M.
Define main():
Declare Local variables
Prompt user to enter the full name
Use ‘split’ method to split the full name
Use for loop to get first character of each name as an initial
Convert the first character to upper case if it is already not in upper case
Display output
Sample output:
Enter your full name: Susan Smith Miller
S.S.M.