Framework Compliance Assessment Report

  

Using  all of the previous assignment information, students will create a  Cybersecurity Risk Report that helps their proposed business manage  cybersecurity risks.

Refer to the “Framework Compliance Assessment Report Guide,” located within the Course Materials, for full instructions.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning  the assignment to become familiar with the expectations for successful  completion.

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

2.2: Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles.

2.3:  Apply the Cybersecurity Life Cycle, Cybersecurity Framework, and  Methodologies to establish a Cybersecurity Program that supports an  organization’s strategic initiatives.

BSweek5

In 250 words 

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords 
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords 
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password explain each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Prof writing & proposal Devel(DSRT)

 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.

Assignment:   
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:   
Provide a 500 word (or 2 pages double spaced) minimum reflection.   
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.   
Share a personal connection that identifies specific knowledge and theories from this course.   
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.    
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Eclipse Project Javascript

 

Using the concepts from the Concurrency Basics Tutorial I provided in Modules, write a program that consists of two threads. The first is the main thread that every Java application has. The main thread should create a new thread from the Runnable object, MessageLoop, and wait for it to finish. If the MessageLoop thread takes too long to finish, the main thread should interrupt it. Use a variable named maxWaitTime to store the maximum number of seconds to wait. The main thread should output a message stating that it is still waiting every half second.

The MessageLoop thread should print out a series of 4 messages. These messages should be numbered, as in the example below. It should wait 850 milliseconds between printing messages to create a delay.  If it is interrupted before it has printed all its messages, the MessageLoop thread should print “Message loop interrupted” and exit. Or you can let main print “Message loop interrupted”.

Your program must demonstrate that it can both output messages and interrupt the message output. To do this, place the body of main into a for loop using maxWaitTime as the index. As in the following example, it should finally output all 4 messages in the last iteration.

So in main your code will be

for (int maxWaitTime = 1;  maxWaitTime <= 4;  maxWaitTime++) {

// All of main’s processing goes here (Note that it does not say some, it says all).

}

Sample output :

maxWaitTime: 1 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-0 : 1. All that is gold does not glitter, Not all those who wander are lost
main : MessageLoop interrupted
maxWaitTime: 2 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-1 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-1 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : MessageLoop interrupted
maxWaitTime: 3 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 3. From the ashes a fire shall be woken, A light from the shadows shall spring
main : MessageLoop interrupted
maxWaitTime: 4 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 3. From the ashes a fire shall be woken, A light from the shadows shall spring
main : Continuing to wait…
Thread-3 : 4. Renewed shall be blade that was broken
main : Done!

Your class must be in a package named mypackage and be named Concurrency, as explained in last week’s videos. It should be contained in 1 and only 1 source file.

Include your name at the top of the source file.

Upload Concurrency.java

Business Intelligence – 2

Discussion 1 (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model? Your response should be 250-300 words

Discussion 2 (Chapter 6): List and briefly describe the nine-step process in con-ducting a neural network project. Your response should be 250-300 words

cloud computing

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

Visualization tool analysis on a dataset

Pick a topic from data.gov that has large number of data sets on wide variety from healthcare to education, climate to public safety.
Pick a topic and Explore the possibilities of downloading the data, use any data visualization tool to create meaning information and visualizations.
Need 1-2 Pages documentation.

5s week 7 assignment PL

In 400 words

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include references, Do not copy paste.

Assignment

 In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires two written pages to evaluate history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

research paper

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.