Emerging Information Tech

 

This week I would like you to write a 4-page reflective paper on what you have learned so far in this course and how you will be able to apply the lessons learned.

Paper Requirements 

  • 4 pages (including title page, 2 pages of content,  and reference page) 
  • 1 Inch Margins 
  • Running Header
  • 12 pt font
  • double spacing
  • References from the text
  • Use of outside references 

Some questions to consider to help you draft your response 

  • What are the main lessons that have resonated with me?
  • Why did these lessons resonate with me?
  • What concepts were easy to learn and why?
  • What concepts were more challenging to understand and why?
  • How could I use this in now and in the future?
  • What lessons do I have direct experience with and why?

Module 6 Case Project 9-1

As a part of the duties of a digital forensic examiner, creating an investigation plan is a standard practice. Write a paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files, such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1.

Please only use online references, not journals or books.

Preventing attacks on web applications

 Propose and defend about Preventing attacks on web applications  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey.

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Write in essay format not in bulleted, numbered or other list format. 

Business Process Redesign – Strategic Planning

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment 2

 Two article reviews (one page each) for one quantitative article and one qualitative article  

IT-project management

 

Your team will be working together to understand the skills needed to enter into a role as a Network Administrator, Cyber Security Specialist and Database Administrator.

  1. Locate an entry level or 2 years of less experience job for each of the following: Network (or System) Administrator, Cyber Security Specialist and Database Administrator.
  2. Each team member will provide the team a copy of their resume as it should look at the point of graduation. Include the skills you will learn in classes.
  3. Identify the skill gaps (i.e. years of usage, experience level, skills, technologies, workplace skills, communication skills, etc.) for each team member.
  4. Identify how the gap should be addressed by each team member before completing the program or post graduation. Include time goals to meet the requirements.
  5. Presentation Includes:
    • Present the results of your analysis in a PowerPoint presentation.
    • 3  job descriptions, location in the Puget Sound, required skills, desired skills, and research the pay range proposed by the employer
    • Skills, certification, level of education, etc. gap analysis for each role for each team member.

project management with make

 the question is 

 

The code in project2 is for a program that plays a simple game called Chomp.

The programmers of this project have opted to package some of their code in a “module” called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated.

The steps necessary to produce this program are:

  1. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx00 to cookie.h.
  2. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx01 to cookie.cpp.
  3. Compile cookie.cpp to produce cookie.o.
  4. Compile mainProg.cpp to produce mainProg.o.
  5. Link the the .o files to produce an executable program named playChomp

Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch.

_________________________________________________

I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile:

all: cookie.h cookie.cpp playChomp cookie.o mainProg.o

cookie.h: chomp.adt
csplit chomp.adt “/Split Here/”
cp xx00 cookie.h
cp xx01 cookie.cpp
 

playChomp: cookie.o mainProg.o
g++ -o playChomp cookie.o mainProg.o

cookie.o: cookie.cpp
g++ -c cookie.cpp

mainProg.o: mainProg.cpp
g++ -c mainProg.cpp

However, I am receiving this error code:

Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed:
csplit chomp.adt “/Split Here/”
1372
8632
cp xx00 cookie.h
cp xx01 cookie.cpp
g++ -c cookie.cpp
g++ -o playChomp cookie.o mainProg.o

is there anything that I can do to fix my makefile?

computer security

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Openwhisk serverless environment

This project requires you to research and implement a openwhisk serverless  environment. You need install, write python functions for testing, research the security aspects of the environment, and write a 10-page paper for the project.

The main purpose is to learn in-depth the intricacy of a cloud service.

Requirement:

1. Implement openwhisk Serverless environments

2. Come up with a testing method (speed from cold start, to warm…)

3. Write python scripts to test

4. Provide results

 5. Write 10 page analysis paper