IT 206 Design and analysis of algorithm

Read chapter 10 sections 10.1-10.5.

Solve this problem:

Write an algorithm for the situation below for 1 soldier. Then rewrite it for 2 soldiers.

Ferrying soldiers
A detachment of n soldiers must cross a wide and deep river with no bridge in sight. They notice two 12-year-old boys playing in a rowboat by the shore. The boat is so tiny, however, that it can only hold two boys or one soldier. How can the soldiers get across the river and leave the boys in joint possession of the boat? How many times need the boat pass from shore to shore?

book details 

Title: Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles

Author: Narasimha Karumanchi

Publication info: Career Monk Publications, 5THEdition, 2016

ISBNs: 819324527X. 978-8193245279

research paper

  

Watch the Youtube video Deming at Pontiac. Research W. Edwards Deming and the Total Quality Movement (TQM). 

Read the article Netflix vs Blockbuster – 3 Key Takeaways https://www.drift.com/blog/netflix-vs-blockbuster/ and

A Blockbuster Failure: How an Outdated Business Model Destroyed a Giant

https://trace.tennessee.edu/cgi/viewcontent.cgi?article=1010&context=utk_studlawbankruptcy

Research Blockbuster versus Netflix. Consider the effect that cloud computing has had on Netflix’s business model. Consider also how Deming and TQM would have dealt with (or avoided) the problems that occurred at Blockbuster. What does a TQM initiative look like in an IT department? How would IT support Total Quality at your company?

The paper must be at least 5 pages plus the cover and reference pages and be in APA format.

Each paper must have at least 3 academic sources. Academic sources do not include wikis, message boards, support forums, etc. Do not copy and paste large blocks of text from your sources! 

As with any research project, make sure to take a position, defend with works cited, and conclude.

Access Control discussion 2

Explain  the difference between a threat and a vulnerability and how business need to protect against each type.

500 words
no plaigarism

need APA format

properly cite the references and no grammar mistakes

I need help in completing my task

 Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6 

 

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Imoprtance of strategic planning 3

Discussion:

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

At least two scholarly sources should be used in the initial discussion thread. 

Note: Answer should be a minimum of 300 words

Research Paper: Enterprise Risk Management( 4-6 papers)

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Systematic Literature Review of Dynamic Threat Modeling

 

I have a research paper that I would like to hire you to help me out.

It is on Dynamic Threat Modeling.

I want you to do a systematic literature review on Threat Modeling on smart city. First and foremost, I want all the threat modeling techniques and methodology analysed.

The advantages and disadvantages of the various techniques should be analysed.

I want to differenciate the static threat modeling techniques from the ones that could be employed as a dynamic Threat modeling technique and used to model likely threats in a smart city.

Scenarios should be given on an attack in a Smart environment to get the risk score and how the chosen dynamic technique would be better suited to model in such scenario.

For example, there are various nodes such as computers, smart printers, switches, routers in a Smart environment. Normally, the organisation would be doing all they can to protect these devices and systems because they are always subject to attacks. Normally, a risk assessment would be performed on these nodes to get their risk score (which is to show the level of risk) to show how to protect these assets.

Most times, the level of risk of one asset is higher than others because organisations value some assets than others. For example, organisation could put more value on a Web server than an email server. Others could value their systems to people, while another organisation would place more value on their data to protect their customers information.

Now, when a risk assessment is conducted, different values are placed on the various assets in an organisation or smart environment. For example, the risk score on a Web server is 5 out of 10 while that of the payroll is 2 out of 10.

When an attack happens on the organisation and the web server is targeted, there could be a chance that it might be penetrated. If it was successfully attacked, the organisation might be informed due to the kind of security system in place that gives them signal when something have been attacked. When this happens, the risk score would be raised from 2 to 8. Now, this can only be assessed again by the risk analyst by conducting another risk assessment. This is a static way of modelling the threat level of an entity. This method is not always encouraged because one have to manually risk assess the whole system again and could take time. This is where dynamic modelling comes in.

I want you to categorise all the threat modeling techniques such as STRIDE, OCTAVE for example. There are many many others.

I want them to be analysed critically. How they work, their advantages and disadvantages.

Analyse which of them are static, dynamic or can be used as both to model threats.

Analyse why static is not really ideal because we need the risk score to dynamically change as soon as a threat occurs and not having to manually wait for the risk officer to conduct another risk assessment.

Discuss the likely best framework/technique for my threat modeling. This will be used to compare other techniques in the literature. Also explain why (with referencing) a certain methodology would be best suited to be used to dynamically model threats in a Smart city domain.

Analyse and categorise if the static threat modeling techniques and dynamic modeling techniques (Is it quantitative or qualitative) could work for the scenerio. For example, does this meet my scenerio. Using OCTAVE as an example, we could say, it works for this scenario while STRIDE does not meet this scenario because this and that.

This paper should contain academic references

Note, this is on smart city. Conducting the analysis for threat modeling for a Smart city

Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

 Please download the Assignment 3 Door and Window Lock Assessment  template (MS Word), which is already in APA 7 format, using size 12  Times New Roman font, 1-inch margins, TOC, Headings and Reference page.  If you insert images or tables in your report make sure you label them  appropriately according to APA. Once completed name your file:  YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit  to the appropriate assignment folder. Also review any additional files  attached for more information.   

700 words discussion: Carefully identify and name up to three (3) reasons for the lack of research on dynamic leadership processes? provide a clear narrative for each of the reasons to support your responses.

Chapter 13 – Our observations from the case study reading in the chapter material, Leadership and Management in Complex Systems research by Jager and van der Vegt (2005), is that leadership scholars seem to acknowledge the dynamic nature of leadership and have developed models and frameworks to organize and describe the factors that are important.  However, empirical research to test these models is scarce.  The authors have suggested the reasons for the lack of such research on dynamic leadership processes. 

700 words discussion:  Carefully identify and name up to three (3) reasons for the lack of research on dynamic leadership processes? provide a clear narrative for each of the reasons to support your responses.