Access control discussion 9

What technology can a business use to assist in the access control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!

Research project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

Intro to programming responses

Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

An if-then script simply takes an argument from a variable and checks to see if it is true. If it is true, then it executes the parameter. If it is false, then it executes a different parameter which can be another defined variable or an exit condition. Loops repeats the processed if-then program as many times as indicated within the set parameters until an exit condition is reached. The loop needs an exit condition that can be met or it can become an endless loop, or infinite loop. An infinite loop can accidentally use up 100% of your CPU usage that will lock up your device or cause it to crash. Ways to avoid an endless loop is to always make sure to set an exit condition that can be met, or makes sense to the language you are programming in. There may be a “continue” statement with another variable that could be out of place preventing the code to move on and continuously loop. Another way to prevent infinite loops is to set timeout conditions in your code. Also, if you are working with complex loops that have the potential to be endless, you may consider testing your code first through a walk-through program, such as the Python Tutor we will be using in this class and others such as Google Chrome Dev Tools. This will allow you to step through and visualize what your program is doing.

Endless loops can create a denial of service (DOS). You may accidentally DOS yourself! In fact, you can set up a simple script that throws specific types of packets to a single router or switch interface (IP and port range) over and over again causing a denial of service effect. You can also overwhelm firewalls by doing this, especially if they are doing deep packet inspections. There are several quirky vulnerabilities out there listed in the MITRE CVE that has exploits like this already written and tested. Building a virtual range to test these out is a lot of fun and you learn networking quickly.

RESPONSE 2:

This week we learned about variables along with creating loops and if-then scripts. Our textbook, Microsoft WSH and VBScript Programming for the Absolute Beginner, 4th Ed. by Jerry L. Ford, defines a variable as “an individual piece of data such as a name, number, or date that is stored in memory” (2014, p. 85). Variables are the numbers, dates or names in which you are looking for or defining in your scripts. For example, in this week’s practice scripts, fnum, snum, and total were the variables that were being defined. Once we defined are variables, we were able to look more into loops and if-then scripts.

Loops are “collection of statements repeatedly executed to facilitate the processing of large amounts of data” (Ford, 2014, p. 144). Loops could be used to repeat a certain function until the end condition is met. For example, in this week’s practice loop script, we set a up a loop where the program would produce numbers between the first variable, fnum, to the second variable, snum. Once the computer reached snum, the condition was met and the loop ended. The if-then script we learned included a loop, however, the loop would only run if the second number we typed was greater than the first number we chose. If the first number was larger than the second number, the loop would not run. In order to run the loop, the condition must be met prior to the program running the script. The whole purpose of the if-then script is to determine if the argument depicted in the script is accurate based off the variables provided. If the variables make the script accurate then it runs; if not, then it doesn’t run the script.

When creating loops, individuals might incorrectly type an “exit function” or create an improper condition to stop the loop. If this happens, an endless loop could be created. Based off initial research, endless loops are not necessarily dangerous, but rather annoying. Most people can exit an endless loop by doing a hard-exit of the program, or even shutting down their computer. However, some individuals might create an endless loop in order to create a DoS (Denial of Service) attack. DoS attacks are meant to prevent a person from using a certain program, and if someone was stuck in an endless loop, they would not be able to use that program until they manage to exit or stop the loop.

the time complexity of algorithms.

Researchers from the School of BioSciences have requested our help with one of their

experiments. They are performing behavioural experiments with zebrafish. At any one instance in

time there are a large number of zebrafish in the aquarium. For their particular experiment, the

biologist take a snapshot of the aquarium and then need to find the longest series of zebrafish such

the length of each fish along the horizontal direction in the aquarium is increasing. They also need

to know the number of zebra fish in this series.

For example, the snapshot of the aquarium resulted in fish lengths of [2, 5, 3, 7, 11, 1, 12, 4, 15, 14, 6, 16].

One possible longest series of increasing lengths in this case is [2, 3, 7, 11, 12, 14, 16] with 7 zebrafish.

We say one possible longest series of increasing lengths here because it is not necessarily unique.

For example, the length 14 in the output could be replaced with 15: [2, 3, 7, 11, 12, 15, 16] and also

be valid.

In this question you will consider algorithms for finding the longest series of increasing lengths

via the function LongestIncreasingLengths(A[0, · · · , n − 1]), as well as the size of this output

array.

(a) [1+2+1 = 4 Marks] Consider a recursive algorithm:

i [1 Mark]Write down a recurrence relation for the function LongestIncreasingLengths.

ii [2 Marks] Using this recurrence relation, write a recursive algorithm in pseudocode for

LongestIncreasingLengths that only calculates the array size of the longest series of

increasing lengths. You do not need to output the actual array containing the longest

series of increasing lengths in this part of the question. For the example above with input

A = [2, 5, 3, 7, 11, 1, 12, 4, 15, 14, 6, 16], the output should just be 7. The pseudocode should

be about 10 lines of code.

iii [1 Mark] What is the time complexity of this recursive algorithm? Justify your answer.

(b) [5+1+1 = 7 Marks]

i [5 Marks] Building on from your recursive algorithm in part (a), write down a dynamic

programming implementation in pseudocode for the function

LongestIncreasingLengths(A[0, · · · , n − 1]) to find the longest series of increasing

lengths. This should also output the size of the longest series of increasing lengths. The

pseudocode should be about 20 lines of code.

ii [1 Mark] Explain how the recurrence relation used for your dynamic programming imple-

mentation involves overlapping instances.

iii [1 Mark] What is the time complexity of your algorithm and how much auxiliary space

was required. Justify your answer.

(c) [1+2 = 3 Marks] The time complexity of the recursive algorithm for LongestIncreasingLengths

was exponential, while the dynamic programming algorithm lead to a polynomial

time complexity (note, you need to determine that polynomial above). Here we will investigate

an algorithm for the function LongestIncreasingLengths that has a time complexity of

O(n log n).

Consider building a set of arrays for the input array A[0, · · · , n − 1]. As we scan along A, we

will compare A[i] with the final element in each array in this set. This comparison will satisfy

the following conditions:

(1) If A[i] is smaller than the final element in each array, start a new array of size 1 with A[i].

(2) If A[i] is larger than the final element in each array, copy the longest array and append

A[i] to this new array.

(3) If A[i] is in between, find the array with the final element that is greater than A[i] and

replace that element with A[i].

i [1 Mark] Write down the set of arrays that satisfy these rules for the input array

A = [0, 8, 4, 12, 2, 10, 6, 14, 1, 9, 5, 13, 3, 11, 7, 15].

ii [2 Marks] Building from these conditions, explain how an algorithm for the function

LongestIncreasingLengths could run with time complexity O(n log n). You may make

use any algorithm introduced in the lectures to help you with your explanation. Note: you

do not have to write this algorithm in pseudocode. We are expecting that you write a short

paragraph or a short list of bullet points describing the important steps of the algorithm

to explain the time complexity.

Hint: what if you only consider the final elements of this set of arrays as a single array?

Software Models

4 questions

Draw a UML Class Diagram and Activity Diagram.

Draw Class Dependancy graphs and write a contract.

 Book chapter attached.

Cloud Computing

 

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

Research Paper

** RESEARCH PAPER** 

please address the following in a properly formatted research paper:

1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

2. Are there other frameworks mentioned has been discussed in the article that might be more effective?

3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

ERP System

You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two or three alternative strategies, and explore related examples of situations for which each approach would be preferred and required.
500 words