Assignment

 

For this assignment, you will need the following: Ubuntu and VirtualBox.

Ubuntu can be downloaded at https://www.ubuntu.com/download/desktop.

VirtualBox can be downloaded at https://www.virtualbox.org/wiki/Downloads.

Next, create a virtual machine or instance in virtual box and load the Ubuntu desktop software on it. You may need to do additional research to get Ubuntu loaded on the virtual machine . Next, watch the video about installing a LAMP server; install the LAMP server on your Ubuntu virtual machine. 

Use screencast-o-matic to document this assignment. Submit link to video on iLearn.

Wk#3 Research paper

 

By the end of the week, students should have a deeper understanding of:

  • Cryptographic Attacks
  • Attacks on Social Networks: Argument for Cryptography
  • Threat Modeling
  • Security Models
  • Public Key Infrastructure

Based on above topics,

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Automation Testing Script using Celenium Java

Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link

 1. Selenium WebDriver – Page Object Model:

1. Visit amazon.com Page

2. Search for Book ‘qa testing for beginners’

3. Click on 1st item in the listed results.

 

4. Before Click on add to cart Add to Cart asset price from Step3. 

5. Click on Add to Cart.

6. Before Click on Proceed to Checkout asset price from Step3.

7. Click on proceed to checkout

5. On the checkout page assert price from Step3.

 2. API automation using Rest-assured or Karate API Test

 1. Use any 2 methods(Get, and Delete) from end-points listed in

http://dummy.restapiexample.com/

2. Perform assertions for 

   – Get & Delete – Status code to be Successful.

   – Get – Return specific Employee details(Any).

   – Delete – “message”: “successfully! deleted Records”.

Polcy and ethics

 

Final Project

Your Final Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 1000 word research  paper with at least 3 sources.

You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

Discussion

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • 1. Data Gathering
  • 2. Storage and Integration
  • 3. Data Analysis
  • 4. Knowledge Discovery and Information Interpretation

overall process of developing new software

Discussion: This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Research paper

 

Select any 1 topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

 

 

Research paper basics: 

  • 8 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 

Assigment

 

Writing Assignment – WK 5

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.

 

Week 5 – Discussion

Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why?

 

Week 5 Assignment

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.