Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

20200902

1. Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safeassign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

2. Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words.

3. Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords 

o such as common names, real words, numbers only

o require special characters and a mix of caps, lower case and numbers in passwords

2.  Reauthenticate before changing passwords 

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

4. Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 200-300 words. 

Use your own words and do not copy the work of another student.

Attach your WORD document here.

5. You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

6. Do a bit  if research into File Inclusion Vulnerability.

· What is it?

· Why is is dangerous?

· What is the difference of low and remote inclusion?

· What methods can me employed to prevent a security breach?

· What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

7. You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

· Who is likely to attack your site?

· When are attacks likely to occur?

· What sort of attacks might take place?

· How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Use your own words.

8. Do a bit of research on penetration testing techniques. Investigate and document the following

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration tesing

Please write between 200 and 300 words

9. Do some research on Threat Response software. Find one particular software package to investigate.

· What does the software do?

· What are it’s major features?

· What kind of training is required?

· How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words and submit in a WORD document here.

10. Research the Dark Web.

Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

Write between 200 and 300 words.  

Use your own words.

Public Key Infrastructure (PKI)

“Report Template,” write a 250-word essay describing:

  1. The basic elements of a cryptographic system to include privacy/confidentiality, authentication, integrity, non-repudiation, and key exchange.
  2. Two techniques used to preserve message confidentiality: Symmetric and Asymmetric Encryption Algorithms. Specifically address the differences between the two.
  3. How cryptography can be used for data security or infiltration, focusing on strengths and weaknesses, modes, as well as issues that must be addressed in an implementation.

R5

Submit a 5 page paper (APA style) describing the issue of Blockchain transaction speed: how can speed be increased and how will loyalty programs becomes more innovative?

This  is an essay assignment. 

Business Intelligence

Prescriptive Analytics, Big Data, and Robotics

Search the internet and find scholarly content on at least two of the topics above.
        * Find at least 5 related reference

Create a WORD document of at least 500-750 words (2-3 pages) on how these technologies work and how they can be used to support a business.

  • Do not include a cover page
  • Enter your name and lab assignment # in the heading of your paper
  • Include the references at the end of your paper (using APA format)
  • Include Citations for each reference (using APA format) in the text wherever they apply

Cloud Computing technologies

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. Once you have chosen an organization, this will be the organization you use throughout the remainder of the course. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history
  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)
  • Goals
  • Achievements

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in the text. APA requirements for this class include:

12-point Time New Roman font

Your paper should be typed and double-spaced with 1″ margins on all sides

The first sentence of each paragraph should be indented one tab space

All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.

Computer Security Assignment

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Post between 200 and 300 words.

 Must have – critical thinking , scholarly Articles/References required. APAformat in-text citations with page number required.

Deliverable Length: SPSS 0utputs and 500–1,000-word analysis

 

Use the Explore command to compare the income levels (rincdol) for both genders (sex). Go to the Resources area of the class to download the files that you will need to complete your assignments each week. Open gss.sav in SPSS, and complete the following calculations to determine the differences in the income level between males and females.

Compute the following for each group:

  1. Mean
  2. Median
  3. Quartiles
  4. Range
  5. Variance
  6. Standard deviation
  7. Skewness
  8. Kurtosis

The Explore command will also produce several different types of plots. Click on the Plots button, and create the following plots for each group:

  1. Histograms (include the normal curve on the histogram)
  2. Box plots
  3. Stem-and-leaf plots

Use the calculations and plots to answer the following questions. When discussing a calculation, include the value in the text to bolster your analysis.

  1. What can you determine from the measures of skewness and kurtosis relative to a normal curve?
  2. What are the mean and median?
  3. Does the mean or median seem better to represent the scores? How have extreme scores impacted these values?

Submit your output from all SPSS analysis as an SPSS output file and your Word document.

quiz

2. Name and explain the eight hats/roles of data visualization.

4. Summarize/discuss at least 6 key things discussed in this course that influence one’s Design Choices.

5.What is the importance of RegEx or Regular Expressions in data analytics? Discuss the differences between the types of regular expressions. Choose two types of regular expressions and discuss the differences between the two. Please be sure to include two or three differences for each. Include how they help manipulate data.

6.Excel provides many features that make it useful for data visualization. It is a tool still widely used despite its limitations. Newer versions of Excel have addressed some of the limitations. What are 3 or 4 cons (limitations) to using Microsoft Excel for data visualization?

10. Three storytelling techniques are discussed in the text (pages 161-209) in which data is presented and stories are being interpreted. The techniques are described as inheritant characteristics of some charts and graphics. What is the importance and the advantages of using these techniques? Provide an example of each technique.

14. List and Describe 3 or 4 myths that are described in chapter 11 of Andy Kirk’s book. Then state what is Kirks response to these myths.

week 6

s

Part 1: Beta

Visit the following web site or other websites:

Yahoo Finance : https://finance.yahoo.com/

1.  Search for the beta of “Carnival Corporation & plc”

2.  In addition, find the beta of 3 different companies within the same industry as Carnival Corporation & plc 3.  Explain to your classmates what beta means and how it can be used for managerial and/or investment decision

4.  Why do you think the beta of Carnival Corporation & plc and those of the 3 companies you found are different from each other? Provide as much information as you can and be specific.

Part 2: Capital Budgeting

Before you respond to Part 2 review the following information on Capital Budgeting Techniques

Capital Budgeting Decision Methods (LINK) —– https://www.youtube.com/watch?v=hfZ6lznPf2U&ab_channel=MichaelNugent

To avoid damaging its market value, each company must use the correct discount rate to evaluate its projects. Review and discuss the following:

• Compare and contrast the internal rate of return approach to the net present value approach. Which is better? Support your answer with well-reasoned arguments and examples.

• Is the ultimate goal of most companies–maximizing the wealth of the owners for whom the firm is being operated–ethical? Why or why not?

• Why might ethical companies benefit from a lower cost of capital than less ethical companies?

CAPITAL BUDGETING (PRINCIPLES & TECHNIQUES) —- https://www.scribd.com/doc/37253036/Capital-Budgeting-Principles-Techniques