W8:D

  

Discuss some key terms in business.  Please define what a business process is and note the tools of documentation within business processes and why they are important to understand.

Write 3 different independent scenarios for the above topic. The main scenario needs to be 300-350 (from the text books provided) words and the other 2 for 200-250 words. This submission should be between 750 and 850 words (The word count does not include the title and reference page). Deductions will apply if the word count is not observed. Chapter 7(Does It Matter) in the attachment.

Wk-10 Assig

  

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Answer:

DQ requirement: 

1. I want two pages for the above topic. 

2. With three references and proper APA format. This post must contain a properly formatted in-text citation and scholarly reference.

Security and Architecture Design Course -Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:

  •  The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures. 
  • The SANS Institute hosted three “What Works in Security Architecture” Summits. 
  • The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet. 
  • Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book. 
  • Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 2 or 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the develoment. 

Answer the following

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two reference.

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

Dice Rolling Simulator

 

For your final project, you must find a project that you will use Python to complete. There are several websites with Python projects so I leave that to you to Google for them and select a project. I expect this project to be between 50 and 100 lines of code and include functions and classes. It must be submitted in a Jupyter notebook UNLESS you give me an extremely good reason why it can’t be. Preferring Python scripting is not a good reason, it must be technical reason.

You will keep a Word document that acts as a “journal” for all the work you do on your project. That first entry will be the submission, and approval or denial, of your project. When you submit your project, you must discuss the following topics:

1) How many lines of code do you think the project will take

2) The website or book where you got the suggestion. If you got the idea from several sites, list them all. If you are doing a project that is work related, state that then describe how it will help you. You will get some bonus points if you are picking a project that you are truly interested in. As an example, if you are interested in disinformation work and want to develop a program to help you scrape data from Twitter, I will look favorably on the project. However, you need to describe why you’re interested in the area as well as describe how the program will help you.

3) How many hours a week you will commit to working on your project. Be honest. This will let me know if I think you can actually get your project done.

4) An honor statement that says that you will do all of your own work, that you will list in your journal all sources of help you received such as a classmate or stackoverflow. If you use a site like stackoverflow, you must post the link for any question you asked or post that helped you solve your issue. Finally, your statement must say that you will only ask a fellow classmate for help. Yes, if you want to earn extra credit, you can help your classmates with problems they are having with their project. However, there’s a catch. You can only use the Final Project discussion board to ask and answer questions. If I feel that someone is asking too many questions, they will be restricted from asking more until they have correctly answered/helped a fellow student. If someone is giving complete answers, they will be removed from the board and will not be able to ask or answer questions. The idea is that you help each other, not do each other’s work. Giving links to answers, giving short answers or pointing out errors without giving the way to solve the error is what is expected. The discussion board can be found here – Final Project

foresnisc-3

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words

ITS

 Define and relate these different terminologies and Information Governance (IG), Data Governance (DG) and Information Technology Governance (ITG), E-Discovery, Digital Assets; how do you see IT Governance evolving in the next 5 years? What framework will you adopt to in implementing the IT Governance Initiative, and demonstrate its applicability.  

Discussions: InfoTech In A Global Economy (ITS-832)

Discussion 1: Chapter 13- Management of Complex Systems:  Toward Agent-Based Gaming for Policy

Discussion 2: Chapter 15 – Visual Decision Support for Policy-Making: Advancing Policy Analysis with Visualization

word count: 300+ words each

Text book: Janssen, M., Wimmer, M. A., & Deljoo, A. (Eds.). (2015). Policy practice and digital science:  Integrating complex systems, social simulation and public administration in policy research (Vol. 10). Springer. (Included through library subscription) 

Things to be included in the discussion:

Address the four sections below. Your contributions should be in your own words; quote very sparingly.

1. CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.

2. SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 

3. EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.

4. SOURCES: Include citations with your sources. Use APA style citations and references. 

please do Plagiarism check aswell.

Discuss sqlmap, an automated tool for sql injection and database takeover in 500 words or more. How does it work? Where do you get it? How much does it cost? Who developed it? For what purpose? Are there other 'tools' like this available?

Discuss sqlmap, an automated tool for sql injection and database takeover in 500 words or more. How does it work? Where do you get it? How much does it cost? Who developed it? For what purpose? Are there other ‘tools’ like this available?

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Please do not use attachments unless requested.