Assignment 2

 Two article reviews (one page each) for one quantitative article and one qualitative article  

IT-project management

 

Your team will be working together to understand the skills needed to enter into a role as a Network Administrator, Cyber Security Specialist and Database Administrator.

  1. Locate an entry level or 2 years of less experience job for each of the following: Network (or System) Administrator, Cyber Security Specialist and Database Administrator.
  2. Each team member will provide the team a copy of their resume as it should look at the point of graduation. Include the skills you will learn in classes.
  3. Identify the skill gaps (i.e. years of usage, experience level, skills, technologies, workplace skills, communication skills, etc.) for each team member.
  4. Identify how the gap should be addressed by each team member before completing the program or post graduation. Include time goals to meet the requirements.
  5. Presentation Includes:
    • Present the results of your analysis in a PowerPoint presentation.
    • 3  job descriptions, location in the Puget Sound, required skills, desired skills, and research the pay range proposed by the employer
    • Skills, certification, level of education, etc. gap analysis for each role for each team member.

project management with make

 the question is 

 

The code in project2 is for a program that plays a simple game called Chomp.

The programmers of this project have opted to package some of their code in a “module” called chomp.adt, from which the related files cookie.h and cookie.cpp files can be generated.

The steps necessary to produce this program are:

  1. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx00 to cookie.h.
  2. Run the command
    csplit chomp.adt "/Split Here/"
    and copy the resulting file xx01 to cookie.cpp.
  3. Compile cookie.cpp to produce cookie.o.
  4. Compile mainProg.cpp to produce mainProg.o.
  5. Link the the .o files to produce an executable program named playChomp

Write a makefile that will carry out these steps. Your makefile should result in only the minimum required amount of steps when any input file to this process is changed. (Note: you will probably not be able to base this makefile upon my self-updating makefile as in the earlier part of the assignment. Instead, you will probably find it necessary to write this one from scratch.

_________________________________________________

I am currently having an issuewith the question above. I am meant to create a makefile that runsthe program like stated above, and currently this is mymakefile:

all: cookie.h cookie.cpp playChomp cookie.o mainProg.o

cookie.h: chomp.adt
csplit chomp.adt “/Split Here/”
cp xx00 cookie.h
cp xx01 cookie.cpp
 

playChomp: cookie.o mainProg.o
g++ -o playChomp cookie.o mainProg.o

cookie.o: cookie.cpp
g++ -c cookie.cpp

mainProg.o: mainProg.cpp
g++ -c mainProg.cpp

However, I am receiving this error code:

Your makefile does not build playChomp in 3 distinct g++ stepswhen chomp.adt has been changed:
csplit chomp.adt “/Split Here/”
1372
8632
cp xx00 cookie.h
cp xx01 cookie.cpp
g++ -c cookie.cpp
g++ -o playChomp cookie.o mainProg.o

is there anything that I can do to fix my makefile?

computer security

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Openwhisk serverless environment

This project requires you to research and implement a openwhisk serverless  environment. You need install, write python functions for testing, research the security aspects of the environment, and write a 10-page paper for the project.

The main purpose is to learn in-depth the intricacy of a cloud service.

Requirement:

1. Implement openwhisk Serverless environments

2. Come up with a testing method (speed from cold start, to warm…)

3. Write python scripts to test

4. Provide results

 5. Write 10 page analysis paper

bi-12

 

Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.

must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Minimum 350 words

Denial of Service Attack 2.0

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    3000 words 

Security

 Using the guidelines provided Below, create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

-You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

  • Guidelines :
  • Recognizing the importance of security policies
  • Understanding the various policies and the rationale for them.
  • Knowing what elements go into good policies
  • Creating policies for network administration.

Defensive technologies

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. Provide examples of the three types of controls and how they could be used to prevent (or slow down) attackers.

week-cloudcom-4

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.