Case study

 

Why do you believe schedule issues often cause the most conflicts on projects? 

Why is it difficult to use project management software well? 

Discuss three suggestions for improving IT project quality

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 
Content Folder

Cloud Computing

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic.

Discussion

Discuss the differences in policy requirements of the government and health care sectors. Additionally perform a quick search on the following agencies to determine similarities and differences:

  • National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Web sites for information on policy requirements for the government sector
  • The Health Insurance Portability and Accountability Act (HIPAA) and any other laws that regulate the health care sector

Please can you generate a topic on this within 24 hours because it needs to be approved by the lecturer

 In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  
Carefully, choose your domain. Give a rationale for simulating it.
Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
Think about seeding trends and patterns in your simulated data that you can “detect” later.
Use dplyr to extract the columns you need from the dataframes.
Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.
 Part 1: Analysis of the Data (70 marks)
You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.
Simulation of data (20 marks)
Transforming data (10 marks)
Analysis of data and plots (20 marks)
Write-up of the data analysis (similar format of my R tutorials) (20 marks)
Part 2: Scale-up Report (30 marks)
The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?
Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)
Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Database system

  

What is the importance of the master system database? Discuss the pros and cons of full database backup. Discuss all components of the database engine in relation to data availability, and their benefits and disadvantages in relation to server redundancy, database redundancy, and file redundancy. Provide examples to justify your ideas. (50-70 words with reference)

Entities within databases take on many forms. Provide three examples of entities you may encounter and summarize the attributes of each. Explain why entities are important and provide examples to illustrate your ideas. (50-70 words with reference)

Plagiarism report for document prepared

Requested help for my final project paper. But document prepared by writer was fully copied by another source. I was totally disappointed and it reflects on my grades. I reworked again to complete my project.

I lost my trust. Waste of time and money to deal

Implement a ramdisk as a kernel module.

 In this final project, you will implement a simple ramdisk module that you can format with “mkfs.ext2” and mount and unmount with “mount” and “umount”. The ram disk should be of a fixed size stored entirely in memory. It should appear as a block device in the system. This project is an example of a block device driver, which handles data a block at a time. Your project should satisfy the following requirements. 

– Implement a ramdisk as a kernel module. 

– Allow an ext2 filesystem to be installed onto the ramdisk. 

– Allow the filesystem to be mounted and unmounted with “mount” and “unmount” 

  

While submitting your project, please make sure you include the following:

  1. your source code,
  2. a makefile,
  3. a short report describing your work.