Discussion

 

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

  •  (please cite properly in APA)

Real time systems

Many systems in organizations especially the service organizations are moving to a real time system – where data is captured on a real time basis. For example, traffic light/signal data are recorded continuously (actually triggered by an event) and when a driver disobeys the light, the data is recorded and then used to send tickets to the driver with 

a link in the ticket for a video clip of the incident where the traffic law was broken.

In 80 words or more what other real time systems that are important to organizations?

Termpaper on Rockwell Automation – Factory Talk (SCADA)

 

Term Paper Requirements

REQUIREMENTS AND GRADING

Each student will be required to write their own research paper – no teaming, partnering, or study group papers are permitted. This is an individual assignment and copying or plagiarizing will not be tolerated and will be subject to University disciplinary action up to and including a failing grade for this course. 

The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. 

The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.

All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

A template has been provided meeting these requirements.

A list of 11 different vendors and systems have been offered. Selection begins on October 6, 2020 (Week 7) and is expected to be completed by November 17, 2020 (Week 13). You are free to change your selection until the cut-off date. No more than three (3) students can choose the same vendor and system topic, so all selections may not be available at any given time. Failure to complete the selection process early could reduce the number of choices available and not provide sufficient time to complete the term paper and associated presentation.

You will also be required to prepare a short PowerPoint presentation summarizing your paper suitable for presentation. This presentation is expected to have no more than one (1) slide summarizing each of the subject areas aligning with the paper and should be limited to 15 minutes. A PowerPoint template has been prepared and is available for download.

Your paper must be submitted by 7:00pm (end of class) on Tuesday, November 24, 2020 (Week 14), and your presentation must be submitted by 8:00am on Tuesday, December 1, 2020 (Week 15). Eight (8) students will be randomly selected to present their presentation via Zoom Meeting during class time on Tuesday, December 1, 2020. Drawing will occur on December 1, and students will be notified by 10:00am.

The term research paper and associated presentation comprise 20% of your overall course grade and will be assigned a numerical percentage grade based on the following scale:

     A = 90% – 100%
     B = 80% – 89%
     C = 70% – 79%
     D = 60% – 69%
     F = 59% or less

Grading for term research paper and associated presentation will be based on the following metrics:

     20% = Ideas and Analysis
     20% = Organization
     20% = Development and Support
     10% = Style
     20% = Mechanics
     10% = Presentation

Spelling and grammatical correctness will be used as marking against Mechanics. Use of current review editors such as those included with Microsoft Word are strongly encouraged.

 

CONTENTS AND STRUCTURE

The term research paper and associated presentation should be logically divided into sections that follow sound research paper style and address each of the following areas. You are free to organization the paper and presentation as appropriate, however a template has been provided for both the paper and presentation to help start the initial paper structure. The section titles (paper) and slide titles (presentation) in the templates are for reference only.

Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Operating Systems Project Due in 48 hours

Please Inbox me If you understand and can do it on time. Please Only Bid if you fully Understand the Project and can Deliver the requirements in 48 hours.

 In this final project, you will implement a simple ramdisk module that you can format with “mkfs.ext2” and mount and unmount with “mount” and “umount”. The ram disk should be of a fixed size stored entirely in memory. It should appear as a block device in the system. This project is an example of a block device driver, which handles data a block at a time.  This project should satisfy the following requirements. 

 – Implement a ramdisk as a kernel module. 

– Allow an ext2 filesystem to be installed onto the ramdisk. 

– Allow the filesystem to be mounted and unmounted with “mount” and “unmount”.  

While submitting your project, please make sure you include the following:  

your source code, 

a makefile, 

a short report describing your work, 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Practical Connection Assignment

     

Writing Skills, Grammar, and APA Formatting

Assignment strongly demonstrates   graduate-level proficiency in organization, grammar, and style. 

  Assignment is well written, and ideas are well developed and explained. Demonstrates   strong writing skills. Student paid close attention to spelling and   punctuation.  Sentences and paragraphs   are grammatically correct.  

 

Proper use of APA formatting. Properly and   explicitly cited outside resources. Reference list matches citations.

 

Maintains purpose/focus

Submission is well organized and has a tight   and cohesive focus that is integrated throughout the document 

 

Understanding of Course Content

Student demonstrates understand of course   content and knowledge. 

 

Work Environment Application

Student strongly demonstrates the practical   application, or ability to apply, of course objectives within a work   environment.

Need JoB Duties related to PhD IT to be included in PhD IT

Need strong job duties to be included in my resume to match with PhD IT satisfying the following :

  

Doctorate of Philosophy, Information Technology (PhD IT)

Program Description

The Doctorate of Philosophy in Information Technology at University focuses on the advanced practice

role of the use of predictive analytics to identify cyber threats, employ big data analytics to improving healthcare, and

empower smart cities in making data-driven policy changes critical for societal well-being. This program is designed to meet

the aggressive demand for qualified data scientists in virtually every sector of the economy, with classes in computer

science, data intelligence, analytics, security, strategic planning, governance and global economy.

Students can earn the PhD, Information Technology in either a fully online format or an executive format combining online

and on-site study. The Executive format program requires attendance at weekend residency classes. Further, the Executive

PhD, Information Technology Program meets the needs of international graduate business students. This program provides

both in-seat and online coursework. Graduate students joining the Executive PhD, Information Technology program will be

employed or conduct projects in business-related positions and participate in Applied Learning Practicum, in which students

apply what they are learning in their program to the real world via work or internship experiences.

Program Sensitivity

While the program’s schedule requires considerable independent learning and preparation on the part of the candidate prior

to each session, the schedule nevertheless enables in-depth, active learning based on critical and reflective thinking. The

format allows assignments to be handled comfortably, while candidates maintain their continuing professional

responsibilities. The program is designed with an applied learning component that is an integral (essential) part of the

established curriculum. This allows students the opportunity to apply their studies to their place of employment.

PhD IT Program Requirements

Research Students will formally identify a dissertation topic and write the review of the literature in fulfillment of the

requirements for DSRT 736-Dissertation Seminar. The remaining sections of the first three chapters of the dissertation will

be written while enrolled in DSRT 839- Advanced Research Methods. Candidates will carry out their research to complete

the dissertation.

Comprehensive Exam Candidates sit for the Comprehensive Examination prior to enrolling DSRT 930. The specific

content, structure, and scheduling of this examination is determined by the Program Director. Tailored to each student’s

program of study, questions on the Comprehensive Examination are generated by the program’s four content-related goals:

• Goal 1: Expand information sciences through advanced study.

• Goal 2: Promote critical thinking and problem-solving skills to include leadership at the organizational and system level

and the ability to evaluate and improve the quality and safety of Information Sciences.

• Goal 3. Afford structured and supervised research experiences so that students develop the technical, conceptual and

communication skills that are required to conduct high quality, independent research.

• Goal 4: Provide training in basic and advanced information systems theory and practice so that students master the

technical and conceptual tools needed for conducting high quality research.

• Goal 5: Instill ethical leadership, service, and values

The Comprehensive Examination is normally completed in one four-hour session scheduled during the operating hours of

the department. It is graded by contributing members of program faculty, with passing marks required on all sections of the

examination before a candidate can graduate. A student failing any or all parts of the Comprehensive Examination has one

opportunity to retake these sections within one month of the original testing date. A student who fails the exam or a portion

of it a second time must sit out for 16 weeks before taking it a third time. Students failing the exam a third time must retake

relevant courses. Once the student has successfully retaken relevant courses, the cycle of testing begins anew.

The Dissertation

The dissertation is the capstone experience in the PhD program of Information Technology. A dissertation is a researchbased

project that may use a wide-range of statistical, quantitative, and qualitative methods. However, in the University’s

practitioner-focused program, the dissertation is conceived as a reality-based project in which the candidate engages in

authentic professional problem-solving to extend best practices in the field. Specific details on dissertation requirements are

included in the Dissertation Handbook.

All program features highlighted above combine to make the doctoral program at the University 

rigorous academic experience focused on strengthening the skills of information technology professionals.