IN 250-300 words
Describe some ways that an administrator can harden a system on a network
Assignment
Question 1
Do a bit of research on JSON and AJAX.
How do they relate to the the Same-Origin policy?
Using WORD, write several short paragraphs on each. A total of 200-300 words.
Use your own words and do not copy the work of another student.
Question 2
Use the Web to search for methods to prevent XSS attacks.
Write a brief description of more than one method.
Use your own words and supply references.
Post between 200 and 300 words.
Question 3
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. what do each of these terms refer to: copyright, patent, trademark, trade secret?
2. Why is intellectual property entitled to legal protection?
3. Why did copyright laws become stricter and more punishing in the late 20th century?
4. What is the Fair Use doctrine?
5. Make an argument for legalizing the copying of music or software.
6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?
7. What was the 1984 Sony Supreme Court case about?
8. Was Napster responsible for the actions of its users?
9. Why did the court find in favor of Diamond in the Rio case?
10. What is Digital Rights Management?
Question 4
Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan. Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school.
Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
operating system design
please follow instruction very carefully.
Cloud Computing
Platform as a service(paas) and infrastructure as a service(Iaas)
Projects Algorithm
Projects
- Compile a list of algorithms employed in today’s operating systems to avoid deadlocks.
- Conduct research to determine which algorithms check network states for a deadlock. Submit your findings in a report.
Additional Resources
- Deadlock: http://www.computer-dictionary-online.org/?q=deadlock
- Deadlock and Starvation: https://www.studyblue.com/notes/note/n/ch6-deadlock-and-starvation-ppt-13/deck/8173602
Research paper
7 pages
Executive Program Practical Connection Assignment
- At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism). - By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
program in c++ An integer number is said to be a perfect number if its factors, including 1 (but not the number itself), sum to the number. For example, 6 is a perfect number
An integer number is said to be a perfect number if its factors, including 1 (but not the number itself), sum to the number. For example, 6 is a perfect number because 6 =1 + 2 + 3. Write function perfect that determines if parameter number is a perfect number. Use this function in a program that determines and prints all the perfect numbers between 1 and 1000. Print the factors of each perfect number to confirm that the number is indeed perfect. Challenge the power of your computer by testing numbers much larger than 1000.
program in c++
Week8
Instructor: Dr. Brian Bertrand
Class: ISOL536-Security Architecture and Design
Length: Minimum of 600 words
Review a Security Breach which occurred over the past year and present a research paper providing the below point!!
• Describe the incident• Provide Specifics about the incident.• What data or information was impacted?• Describe threat modeling techniques which could have assisted in the mitigation of breach.• How can the organization be better postured for future attacks?
This assignment should be in APA format and have to include references.
Final Project
NIST Publications and Outcomes
Assignment Content
1.
Part 1
The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries (https://csrc.nist.gov/publications/sp800) deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies.
Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.
Include the following column headings:
o SP number
o SP name
o SP purpose
Include the following row headings:
o SP 800-30
o SP 800-34
• SP 800-37
• SP 800-39
• SP 800-53
Part 2
You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule.
Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes.
Cite all sources using APA guidelines.
Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.