Discussion Emerging threats

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.

Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

CPU Utilization,Overloads

 

  1. Transient Overloads: One drawback of RM algorithm is that task priorities are defined by their periods. Sometimes, we must change the task priorities to ensure that all critical tasks get completed. With average execution times, all the critical and non-critical tasks may be RM-schedulable. But, if we consider worst-case execution time we wish to schedule so that all critical tasks meet the deadline and the non-critical task may miss the dead line. The solution is to boost the priority of some critical tasks higher than the non-critical tasks. This is done by altering the “Period” of some critical tasks so that their priorities increase. For example: If we reduce the period of a task by k and have k number of tasks each small sub task will have period divided by K, and execution time divided by k. When the period is smaller, the tasks automatically get higher priority. We can also lengthen the period of non-critical tasks and make it larger than the largest critical task and increase the non-critical task’s execution time also.Carry out a period transformation for this task set to ensure that all the critical tasks will meet the dead line even with worst case execution timing.
    Draw for your modified table of tasks, timing diagram to show schedulability for average execution time and another diagram to show for worst-case execution time. Identify if any tasks miss the dead line.
  2. Give explanation of your period transformations and solution.
  3. What is CPU Utilization for average and worst-case execution times.
  4. Considering Context switch time to be 1 ms, redraw the execution time line for this system for both average and worst case timing.
  5. What is the system time-loading (CPU utilization) factor with the context switching included?Consider a set of 5 tasks with the following characteristics Period Task number Worst-case execution time 1 30 2 10 3 20 4 80

Discusssion

Read chapters 1 and 2 describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

At least one scholarly source should be used in the initial discussion thread.

ERD vaariables

 

There is a use case associated with  the assignment. You need to incorporate ALL requirements into the ERD,  not just some components into the ERD Diagram. There are various  examples that I have provided throughout the semester. I have pointed to  another one so you know what I am explicitly expecting to see. 

About the ERD Diagram

Deliverables

  • An ERD Diagram (PDF File ONLY)
  • A Word / PDF Document that  describes exactly what is in your ERD. This helps me make sure you know  what you modeled! Also, on that document, please tell me who did what  for the assignment. 
  • Please provide me example screen  shots to a working prototype of your database and/or access to the  database. Make the dataset realistic, not scrap data. I will need to  have access to the database if that is your preferred option until  December 11, 2020 at 11:59pm EST unless I ask otherwise. 

Discussion-4 ME

 

1.  Read the short explanation of the 4 basic types of economies. Research two of these types further.  

Here is the link for 4 types of economies

 https://www.intelligenteconomist.com/economic-systems/ 

2. Locate one journal article for each of your two chosen economic types. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.

2-3 pages

 Explain how Cloud Service Models (IaaS, SaaS, PaaS) and How Microsoft Office 365, Azure Fit In?

Explain the AWS?

Read SP 1800-4 DRAFT Mobile Device Security: Cloud and Hybrid Builds then write a summary for this publication

bi assignment 9

 1. How does prescriptive analytics relate to descriptive

and predictive analytics?

2. Explain the differences between static and dynamic

models. How can one evolve into the other?

3. What is the difference between an optimistic approach

and a pessimistic approach to decision making under

assumed uncertainty?

4. Explain why solving problems under uncertainty sometimes

involves assuming that the problem is to be solved

under conditions of risk.

5. Investigate via a Web search how models and their

solutions are used by the U.S. Department of Homeland

Security in the “war against terrorism.” Also investigate

how other governments or government agencies are

using models in their missions.

2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) 

qa

 you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.