Cloud Security

 Describe four proven data protection strategies a company can use to protect their data stored in the cloud. Use your textbook and quality external resources for your writing assignment. Remember to cite your sources. APA format is preferred. However, MLA or Chicago (Turabian) would be fine as well. The important part to me is that you cite your sources consistently. This assignment should be 3-5 pages in length 

Own work easy words no plagarism

 Using the industry where you currently work or have worked before, write a 3 to 5-page proposal recommending your choice between Android or iOS?  From a user and developer’s perspective, which would you recommend to your company and why? Your assignment must follow these formatting requirements:

  • Please provide peer-review references to substantiate your viewpoint. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment.

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work  together to safeguard the integrity and confidentiality of data  resources. But, how does an organization know that it has enough people  in the right roles performing the right tasks to ensure that digital  assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various  roles and responsibilities required to provide this protection. For this  discussion, you will prepare a RACI matrix that outlines roles of key  players in the organization who have data protection responsibilities  (i.e. asset security and data protection). Your matrix should  specifically address executives (C-level), managers, supervisors,  employees. The tasks that you should address are: generating  information, using information, classifying information, and managing /  using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of  responsibilities for each role listed in the rows of your chart. Each  role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a  briefing paper for a working group that has been charged with reviewing  and improving the company’s data classification business processes. Post  your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative  sources. Put the reference list at the end of your posting. Use a  consistent and professional style for your citations and reference list  entries. (Hanging indent is NOT required.)

Wk 4 – Apply: Project Documentation [due Day 7] Wk 4 – Apply: Project Documentation

 The assignment will be based off of the project plan that is attached for Lowkey Inc.

To complete this assignment, you will create the below based on the attached proposed project for Lowkey Inc:

  • A system diagram that shows, in graphic form, the components of your project.
  • Your system diagram should follow the system description you submitted in your Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your system diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A network diagram that shows, in graphic form, the flow of data within your project.
  • Your network diagram should follow the network description you defined in the Week 2 project plan (but may differ based on the research you have conducted since Week 2).
  • You may create your network diagram in Microsoft PowerPoint or a graphics program of your choice.
  • A database design document, including an entity-relationship diagram, a data dictionary, and table definitions, representing all of the data that must be stored and maintained within the context of your project and how that data is organized.
  • A clearly articulated cybersecurity plan that explains how you plan to secure project data and processes.
  • Source code (may be partial) for at least one software application.
  • Your source code may be implemented in HTML/JavaScript, Java, C++, or another programming language.
  • Download and unzip the HTML/JavaScript/CSS sample code files for an example of a partial software application implementation.
  • A quality assurance and software test plan.
  • Download the Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.

Note: All deliverables must be portfolio ready, which means as complete and error-free as possible.

Submit your assignment.

Data Structures

 Please answer the following with a minimum of at least 200 words. Be sure to site your references as well.

Discuss the characteristics of ArrayList, LinkedList, and Vector, and  when to use them. You are strongly encouraged to use code to elaborate  on your answer. 

Computer 1

Write one full page about internet of things(IoT). 

find at least two scholarly articles about IoT. 

Prepare a summary of issues related to IoT. 

Make sure to include the followings: 

1) the impact of IoT on organizations and society

2) government regulations on IoT

3) Be sure to give attribution to your sources.

Python Programming

Assignment Rules:
Open book and notes assignment

  1. This homework tests your knowledge of File Handling, use of String methods, and use of Sets.
  2. Adhere to the naming conventions discussed in class for variable names, program name and function names
  3. Use meaningful names for variables, functions etc
  4. If there are two words in the variable use first word lowercase and first letter of second word upper case i.e., firstName or underscore between 2 words i.e first_name
  5. Include appropriate comments in the code
  6. Output should be displayed similar to as mentioned against each problem
  7. Indent the lines of code appropriately

1. char_analysis.py (40 points)

Write a program that reads the file’s contents and determine the following:

  1. The number of Uppercase letters in the file
  2. The number of Lowercase letters in the file
  3. The number of digits in the file
  4. The number of whitespace characters in the file

HINTS:

Define main():

Declare Local variables

Open file text.txt for reading. Use ‘text.txt’ file available under the Modules section in Canvas.

Use for loop to step through each character in the file.

Determine if the character is uppercase, lowercase, a digit, or space, and keep a running total of each.

Close the file.

Display the totals of uppercase, lowercase, digits, spaces.

Sample Output:

Uppercase letters: 29
Lowercase letters: 1228
Digits: 30

Spaces: 260

2. unique.py (30 points)

Write a program that opens a specified text file (text2.txt) and displays a list of all unique words found in the file.

HINTS:

Define main():

Declare Local variables

Open file text2.txt for reading. Use ‘text2.txt’ file available under the Modules section in Canvas.

Use ‘set’ method to find the unique words in the file and store each of them as an element of the set. 

Close the file.

Display all the unique words from the set.

Sample output:

These are the unique words in the text:
management.
name
been
later,
canceled,
is
Eastern,
delay
Eight
1,820
at
it
1867
official
world
and
company,….

3. name.py (30)

Write a program that gets a string containing a person’s first, middle, and last names, and displays their first, middle, and last initials. For example, if the user enters Susan Smith Miller, the program should display S.S.M.

Define main():

Declare Local variables

Prompt user to enter the full name

Use ‘split’ method to split the full name

Use for loop to get first character of each name as an initial

Convert the first character to upper case if it is already not in upper case

Display output

Sample output:

Enter your full name: Susan Smith Miller
S.S.M.