In 3 pages, discuss the article and explain how blockchain has impacted the financial world. What immediate changes have been made? What is yet to come? Is this change a good thing for the profession? Explain.
Computer Forensics
Assignment: Denial of Service ToolsLearning Objectives and Outcomes
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:
- Tribe Flood Network
- TFN2K
- Trin00
For this assignment:
- Search the Internet for information about these three tools.
- Provide a description of each of the three tools.
- Describe the damage or impact of denial of service attacks.
- Summarize the efforts used and solutions found to combat these attacks.
Required Resources
- Course textbook
- Internet
Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist
- I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
- I described each of the three tools.
- I described the damage or impact of denial of service attacks.
- I summarized the efforts and solutions found to combat these attacks.
Dis13
Describe the current trends in information systems as well as how technology changes impact society and culture.
Case Study help (300+ words)
Read the case study “Communication Failures” starting on page 329-331 and answer the below questions.
Questions
1. How important are communication skills in project management?
2. Was Herb the right person to be assigned as the project manager?
3. There were communications issues with Alice, Bob, Betty, and Frank. For each communication issue, where was the breakdown in communications: decoding, feedback, and so on?
Book pages 329,330,331 screen shots attached here.
Book Author: Harold R. Kerzner
Book Title: Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th Edition, ISBN: 9781118022276
CSIA 459
The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness.
Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?
Post your briefing paper as a reply to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end of your posting.
Reference
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4679168&site=ehost-live&scope=site
Uses of Efficient Frontier Analysis in SRM
Chapter 22 presented a case study in creating value from uncertainty, and chapter 25 presented the use of efficient frontier analysis in SRM. Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?
To complete this assignment, you must do the following:
A) Create a new thread. As indicated above, assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25. How would you explain the results of the analysis to non-technical decision makers? What recommendation would you make, assuming the risk appetite presented in chapter 25?
PCI
In 80 words or more why is customer PCI (payment card information) data important to safeguard. What are the consequences for breach of a customer’s PCI?
programming
1. A starter solution has been provided to you as zip file. When submitting your own unit test methods, zip the contents of the src directory into a single zipped file. Make sure the zipped file has a .zip extension (not .tar, .rar, .7z, etc.).
#2
Obstacle Warrior
Objectives: Create a Java program using programming fundamentals (file I/O, loops, conditional statements, arrays, functions)
Problem: In an effort to win a coding competition, you decided to create an awesome Obstacle Warrior game. The game is played on a 2-dimensional board similar to a Chess board, but the dimensions may be different. The minimum size of the board is 2×2. The board will have a Start square and an Exit square that are not stored on the board. Start and Exit squares cannot be the same. Other board squares may contain obstacles in the form of an integer that will define how the warrior position and score will be affected. The obstacle squares can have values from 0 to -10 only. The Start square is always a clear square. All clear squares are marked with # on the board. The Exit square may contain an obstacle that is not a zero. The size of the board, number of obstacles, and Start and Exit squares are all unknow to your code prior to running. This information is stored in a file that your code will read at the beginning of the game. The board.dat file must be read into a 2-D array.
A warrior must start at the Start square and find their way to the Exit square. The warrior can move on the board in any direction including diagonally, one square at a time. A warrior has a running score (integer) maintained from the start of the game until the warrior exits the board. If the warrior lands on an obstacle square with a value of zero, the warrior is sent back to the starting position and the obstacle square will become a normal square (obstacle removed). If the obstacle square has a negative number, that number will reduce the warrior’s score by the value of the obstacle, and the obstacle square will become a clear square (obstacle removed). Each VALID move that the warrior makes without landing on an obstacle will earn the warrior one point. The moves for the warrior are randomly generated by your code in the form of a direction (0-UP, 1-DOWN, 2-LEFT, 3-RIGHT, 4-UPRIGHT, 5-DOWNRIGHT, 6-UPLEFT, 7-DOWNLEFT). If the warrior is at the boundary of the board and your code generates an invalid move, that move will be ignored. Your code will keep generating moves until the warrior exits at the Exit square. Once the warrior exits, your program will store the updated board information to a new file ResultBoard.dat as single-space separated data. The program will also display the total number of valid moves, the total time elapsed in milliseconds since the first move until the warrior exited the board, the final score of the warrior and the formatted board information (right aligned columns with total of 5 spaces).
Output Format:
- Each column in the final board display must be of total width of 5 spaces
- Data in each column must be right aligned
Enter the board data file path: C:board.dat //Repeat prompt until valid file OR show error and exit.
Type “Start” to start the game or “Exit” to exit the game: exit //Your program must exit
Enter the board file path: C:board.dat
Type “Start” to start the game or “Exit” to exit the game: start //You may display the moves and the running score after each move but it is not required
The warrior made 270 valid moves in 503 milliseconds. The final score is 175 points.
# # # # #
# # # 0 #
# # # # #
# -3 # # -4
# # # # #
Press any key to exit!
Program Structure: Your code should be modular and easy to understand. In addition to the main method, the following methods are required to be in your code. These methods will be used by the unit testing to test the accuracy of your code.
public static String[][] ReadBoardFromFile(String fileName, Position startPosition, Position exitPosition)
public static boolean WriteBoardToFile(String fileName, String[][] boardArray)
public static int GenerateDirection()
public static boolean MoveWarrior(int direction, String[][] boardArray, Position currentPosition)
public static int CalculateWarriorScore(int currentScore, Position currentPosition, String[][] boardArray)
public static String DisplayResults(int currentScore, int numberOfMoves, int timeElapsed, String[][] boardArray)
Program Flow:
- Program starts in main() method
- Prompt user for Board.dat file path
- Read board from file
- Generate a direction
- Move the warrior
- Calculate new score
- Check conditions and clear square if needed
- Repeat until the warrior is at the exit square
- Display the results
- Prompt user to exit game
Board.dat file format:
- The data in the file will be separated by one space
- Assume that all data in the file is valid
- Clear and Start squares (no obstacles) will be marked with # in the file
- The first line of the file contains the dimensions of the board (rows and columns) e.g. 3 7
- The second line contains the Start square indexes (rowIndex, columnIndex)
- The third line contains the Exit square indexes (rowIndex, columnIndex)
- The rest of the lines represent the contents, including obstacles, of a row on the board
- Example of a Board size 5×5 data file:
5 5
2 2
4 3
# -5 # # #
# # # 0 #
# # # # #
# -3 # # -4
-10 # # # #
**ResultBoard.dat file format: **
- Data must be separated by a single space
# # # # #
# # # 0 #
# # # # #
# -3 # # -4
# # # # #
Grading:
- Coding standards, style and comments (10 Points)
- Unit testing methods x6, one for each of the methods mentioned above (10 Points)
- ReadBoardFromFile (10 Points)
- WriteBoardToFile (10 Points)
- GenerateDirection (10 Points)
- MoveWarrior (20 Points)
- CalculateWarriorScore (20 Points)
- DisplayResults (10 Points)
Notes:
- The “Position” class has been provided to you. You may add new methods/constructors to this class, but don’t change existing methods
- Part 1 deliverables: Unit Test methods only – Submit on eLearning
- Part 2 deliverables: Functioning program – Submit on zyBooks (You may resubmit your Unit Test method on eLearning)
Research Paper: Business Process Redesign
If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.
Your paper should meet the following requirements:
• Be approximately 4-6 pages in length, not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Research Paper
Please see the attachment for question and follow the instructions. Need it by 5pm EST