File

Final Project

 ttached Files:

Securing IoT Devices: What are the Challenges?Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. 

Discussion Board post: 300 words each

Reading purpose: 

https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf

Topic 1: Section 3.1.1.4 of the given link provides several examples of information privacy and security laws, as well as legal frameworks from across the world. Select one of these areas, laws, or frameworks and discuss how it would impact a US-based company storing data with a cloud service provider or doing business with an organization or individual covered under that area, law, or framework.

Topic 2: Review Domain 4 of the given link. Your organization is transitioning workload from an on-prem data center to a PaaS cloud service offering. Discuss one specific way in which your audit activities must change to address the new hosting structure. What types of impacts could this change have?

Each topic should contain 300 words in length. It should be in your own words.

Write a program that plays the game of

Write a program that plays the game of HANGMAN(guessing a mystery word). Read a word to be guessed from a file into successive elements of the array WORD. The player must guess the letters belonging to WORD. A single guessing session should be terminated when either all letters have been guessed correctly (player wins) or a specified number of incorrect guesses have been made (computer wins). A run must consist of at least two sessions: one player wins and one computer wins. The player decides whether or not to start a new session. 

Journal Assignment – 3 pages

 

What makes data, information, and knowledge an essential element to machine learning?

This assignment is to be 6-8 paragraphs APA format (7th edition), 4 references used from peer-review articles.

computer

FIRST JOB

pls follow the rubric

https://pdf.sciencedirectassets.com/277811/1-s2.0-S1877042815X0036X/1-s2.0-S1877042815042421/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjECAaCXVzLWVhc3QtMSJGMEQCIHJl3euREf2xGzfY7nGg618koWvfJQOpHm8vw%2BViUTZEAiAB%2BIUzcsseA9eKorplNEmSIxWtQwfWI2Rlh6nYZMXJACqDBAip%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAQaDDA1OTAwMzU0Njg2NSIMXZBAt49QZJRZ0NeoKtcDjabUTrXWhmrygiAgH9Cx0y4xwxJZ5NsgT4VR9mF1vPiOQu3wBLBiGc90IsL%2BqkOltID5Tt91YBfP9zxJV2hX6%2FQKPPsMeSAkpBad%2BlZ6ekhcrXOI%2FfmfgICJ%2BmAV1%2FFwEoK7AzheLOtXH0Z87FsaO5fxVyHEYuOBAL2H8AQI%2FLv01AyaIB7YSyv%2BI%2Bt1m2Pzmt4fgaSA5S4ver9tpcs8GXpDk5kFlcMzdPIEyrEkJ8kGj0SSl3DXCSQpwuUKdeWIyhjGwgjjemXMGYO3KoSCGO47v8cqmX56J9I4fYFhczUa6wcDky9KszVSG8dK8KhQguLowrpEIGEdimcAG8f2ucpqAWppldRI17rXtqYX3cOD98Ov5tR4sVkm0DZ3GfzEB06BIbve5j%2Bnv87c6A91G0C8Om1mB6i94XMj3ipA0447Ri9nat2TaMQI0XgD5cy%2BrnTQvIn5z7%2FV%2FSHvDdxYTJ4DbbP0zXotOoY1UubUhMHdj2prh4q98mrBQatlKf3Ep5Ir%2BM8yVuxa29ZEKG6jvObfePkziUIocBBbBKd0zA%2FbWg2jSmVzpUO1u62oA2kpaj6vlrFymJE85mSh6c%2FFfma96R80wsURixfBA5L0JqlKirrGr356MLqSgpIGOqYB3PGV8id70i3QJcPm9R8Zkd8IEtPIYLz98L1%2Ba5WZGQNVqQMjrDBmNR6BR5VnR9EoRGBxMOMctQuclypFsPM0SSBuB0XIN46XhUlUX5GDoem7FQcfS9iTnT7ay0tS6s0sCI2%2Bnaig9OddIP%2FpPSEMcie%2BawiasaOvzHVs0vmDsRU3cfakTIdgMd046UFO1%2Ffckpeu5I8U%2FM5%2BdwzRGU6BMUlz9dwjcQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20220327T165914Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYSRIUFEFC%2F20220327%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e78ff70a494ab94040b11ac1d5db52e44b08ef1286a24d969b2830427d1d6b42&hash=25ceece2b58d36985a19734030c81c2164072d430032edd8f293a4ed67e814a0&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S1877042815042421&tid=spdf-fc73b641-fdba-410d-a8bb-1d7b1bf11a54&sid=3f8d055237b935456668e4c11e99232264f0gxrqa&type=client&ua=5301515e040d0050565c&rr=6f29ace698742d52.

SECOND JOB

INTRUCTION EVALUATION

 

Please find below a list with each group’s prototype link. While I know many students care only about points (which you’ll earn with this work), I also think that some of you would be interested to see, learn, provide feedback, help and support their peers – and that’s the best way to learn!

For this individual heuristic evaluation assignment, please pick the group with the number your group # that comes after yours in the list (so if you are in Gr.1, evaluate Gr.2’s prototype; if you are in Gr3, evaluate the prototype created by Gr.4, if you are in Gr5, evaluate the prototype created by Gr.1, etc). You are more than welcome to look at them all and provide your feedback. However, there is max# of points that can be earned for this which can be attained with one single prototype evaluation. 

 Group 5 – https://marvelapp.com/prototype/90f3bgd/screen/85816410 

THE ATTACH FILE HEURISTICSTEMPLATE AND HEURISTICS SUMMARY IS FOR THE SECOND JOB

EE150 Project

  

EE150 Project   

Project: ADT for Complex Numbers

Project Descriptions:

1. Define an ADT for complex numbers

· The internal state of a complex number should be presented by a double precisionfloating point value for the real part and a similar floating point value for the imaginary part.

· Implement two constructors. The default constructor takes no arguments. A constructor with two double precision arguments sets both fields.

· Define pair of member functions to return real and imaginary part of the complex number.

· Define arithmetic operations of addition, subtraction and multiplication.

 

2. Based on the ADT developed above, write a main program to read in two complex numbers, calculate the sum, difference, and product of two numbers. Write two functions to calculate and display

· The absolute value of a complex number

· The square root(s) of a complex number.

Notes on complex number operations:

To find square roots of a complex number :

(1) if both a and b are 0, only one square root, 0.

(2) if only b is 0, then we will have two real square roots, and- if a > 0; or we will have two imaginary square roots, and- if a < 0.

(3) if b is not 0, we have two roots and

where , i.e., the absolute value of a complex number.

Project Requirements:

1. The program must be properly indented and documented. 

2. When submitting your project, please submit an archive of your entire project directory (i.e., complexADT.tar.gz)

3. Grading guideline:  
— Correctness  60%

— Coding conventions, documentation, and style  20%

— Tests (Diversity, Correct formulation, and Documentation)  20%

excell projest

 click on the assignment name (Excel Project #1) and download the two attached files.The first file contains the instructions for completing the project. The second file contains that data that you must use to complete the project.   

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

vuln assesment 2

 

Congratulations! Your boss, Judy “Mac” McNamara, thought you did a great job on your Vulnerability Management Process recommendation and analysis of the OpenVAS vulnerability report. However, the boss doesn’t think the free OpenVAS tool will provide the high-level presentation reporting and support needed by Mercury USA. Now, Judy would like you to evaluate the leading commercial vulnerability scanner, Nessus. Fortunately, Judy had asked someone in the IT department to install and configure a 30-day evaluation copy of Nessus. She hands you a recent Nessus report from IT that has a few more systems added, and with a wry smile adds, “It looks like there’s some really bad stuff in there!”

Judy would like you to provide an analysis of the report. You decide to highlight what you think the company should address first and how you would mitigate some of the top threats. In addition, Judy wants to know your thoughts on Nessus, since it’s expensive. You now realize that you need to ensure due diligence has been performed before making a purchase recommendation to executive management.

This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.

You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.

 

Delete the instructional text from the template before you submit.

Project overview:

 

Mercury USA is a small- and medium-sized business (SMB) in the transportation sector with 400 employees. 

You’ve just been hired by Mercury USA as the first cyber threat analyst on the team and will work within the existing Information Technology department. Mercury USA has an urgent interest in addressing security vulnerabilities.

Judy “Mac” McNamara, the manager of IT services, said the chief executive officer (CEO) recently learned via a mandatory breach disclosure that a competitor was a victim of ransomware. The firm in question lost a significant amount of intellectual property and customer data and is facing expensive litigation, government fines, and loss of customer confidence. These issues are likely to result in bankruptcy.

Thus, executive management would like to prevent Mercury USA’s critical data (e.g., order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software) from falling into the wrong hands and threatening the survival of the business.