Cyber Security planning & management

 

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). 

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

It is essential that you use your own words (do not just copy and paste from the Internet).

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

Research Current Legal Rulings

 

Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.

In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action. 

For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.

  • Go to:  the Federal Register. https://www.federalregister.gov/.
  • Use the Search bar to find rulings related to your topic.
  • Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
  • Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization. 
  • Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).

Possible topics for your search:

  • Anti-malware
  • compliance/auditing
  • forensics
  • ID management
  • Intellectual property
  • Managed security service providers (MSSPs)
  • Messaging safeguards
  • Patch management
  • Perimeter defenses
  • Security information management (SIM)
  • Security event management (SEM)
  • Incident response
  • Transaction security
  • Wireless security

Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the following chart format for your summary. 

c++

all i need is these two files

Create VectorContainer.hpp

Create SelectionSort.hpp 

Test SelectionSort.hpp using the VectorContainer.hpp class you made

# Strategy Pattern

In this lab you will create a strategy pattern for sorting a collection of expression trees by their `evaluate()` value, which you will pair with different containers to see how strategies can be paired with different clients through an interface to create an easily extendable system. This lab requires a completed composite pattern from the previous lab, so you should begin by copying your or your partner’s code from the previous assignment into your new repo, making sure it compiles correctly, and running your tests to make sure everything is still functioning correctly.

You will start this lab by creating two expression tree containers: one that uses a vector to hold your trees (class `VectorContainer`) and one that uses a standard list (class `ListContainer`). Each of these container classes should be able to hold any amount of different expressions each of which can be of any size. You will implement them both as subclasses of the following `Container` abstract base class, which has been provided to you in container.h. You should create each one independently, creating tests for them using the google test framework before moving on. Each container should be it’s own commit with a proper commit message. Optionally you can create each one as a branch and merge it in once it has been completed.

class Container {

    protected:

        Sort* sort_function;

    public:

        /* Constructors */

        Container() : sort_function(nullptr) { };

        Container(Sort* function) : sort_function(function) { };

        /* Non Virtual Functions */

        void set_sort_function(Sort* sort_function); // set the type of sorting algorithm

        /* Pure Virtual Functions */

        // push the top pointer of the tree into container

        virtual void add_element(Base* element) = 0;

        // iterate through trees and output the expressions (use stringify())

        virtual void print() = 0;

        // calls on the previously set sorting-algorithm. Checks if sort_function is not

        // null, throw exception if otherwise

        virtual void sort() = 0;

        /* Functions Needed to Sort */

        //switch tree locations

        virtual void swap(int i, int j) = 0;

        // get top ptr of tree at index i

        virtual Base* at(int i) = 0;

        // return container size

        virtual int size() = 0;

};

Notice that our Container abstract base class does not have any actual STL containers because it leaves the implementation details of the container to the subclasses. You **must use the homogeneous interface above for your sort functions, and you are only allowed to manipulate the containers through this interface, not directly**. This will allow you to extend and change the underlying functionality without having to change anything that interfaces with it.

## Sorting Classes

In addition to the containers you will also create two sort functions capable of sorting your containers, one that uses the [selection sort](https://www.mathbits.com/MathBits/CompSci/Arrays/Selection.htm) algorithm and one that uses the [bubble sort](https://www.mathbits.com/MathBits/CompSci/Arrays/Bubble.htm) algorithm (you may adapt this code when writing your sort functions). They should both be implemented as subclasses of the `Sort` base class below which has been provided. You should create each one independently, creating tests for them using the google test framework before moving on. Each sort class should be it’s own commit with it’s own proper commit message. When creating tests for these sort classes, make sure you test them with each of the containers you developed previously, and with a number of different expression trees.

“`c++

class Sort {

    public:

        /* Constructors */

        Sort();

        /* Pure Virtual Functions */

        virtual void sort(Container* container) = 0;

};

sort.hpp

#ifndef _SORT_HPP_

#define _SORT_HPP_

#include “container.hpp”

class Container;

class Sort {

public:

/* Constructors */

Sort();

/* Pure Virtual Functions */

virtual void sort(Container* container) = 0;

};

#endif //_SORT_HPP_

base.hpp

#ifndef _BASE_HPP_

#define _BASE_HPP_

#include

class Base {

public:

/* Constructors */

Base() { };

/* Pure Virtual Functions */

virtual double evaluate() = 0;

virtual std::string stringify() = 0;

};

#endif //_BASE_HPP_

container.hpp

#ifndef _CONTAINER_HPP_

#define _CONTAINER_HPP_

#include “sort.hpp”

#include “base.hpp”

class Sort;

class Base;

class Container {

protected:

Sort* sort_function;

public:

/* Constructors */

Container() : sort_function(nullptr) { };

Container(Sort* function) : sort_function(function) { };

/* Non Virtual Functions */

void set_sort_function(Sort* sort_function); // set the type of sorting algorithm

/* Pure Virtual Functions */

// push the top pointer of the tree into container

virtual void add_element(Base* element) = 0;

// iterate through trees and output the expressions (use stringify())

virtual void print() = 0;

// calls on the previously set sorting-algorithm. Checks if sort_function is not null, throw exception if otherwise

virtual void sort() = 0;

/* Essentially the only functions needed to sort */

//switch tree locations

virtual void swap(int i, int j) = 0;

// get top ptr of tree at index i

virtual Base* at(int i) = 0;

// return container size

virtual int size() = 0;

};

#endif //_CONTAINER_HPP_

Example

#ifndef _LISTCONTAINER_HPP_

#define _LISTCONTAINER_HPP_

#include “container.hpp”

#include

#include

#include

class Sort;

class ListContainer: public Container{

public:

std::list baseList;

//Container() : sort_function(nullptr){};

//Container(Sort* function) : sort_Function(function){};

//void set_sort_funtion(Sort* sort_function){

// this -> sort_function = sort_function;

//}

void add_element(Base* element){

baseList.push_back(element);

}

void print(){

for(std::list::iterator i = baseList.begin(); i != baseList.end(); ++i){

if(i == baseList.begin()){

std::cout <<(*i) -> stringify();

}

else{

std::cout << ", " << (*i) -> stringify();

}

}

std::cout << std::endl;

}

void sort(){

try{

if(sort_function != nullptr){

sort_function -> sort(this);

}

else{

throw std::logic_error(“invalid sort_function”);

}

}

catch(std::exception &exp){

std::cout << "ERROR : " << exp.what() << "n";

}

}

//sorting functions

void swap(int i, int j){

std::list::iterator first = baseList.begin();

for(int f = 0; f < i; f++){

first++;

}

Base* temp = *first;

std::list::iterator second = baseList.begin();

for(int s = 0; s < j; s++){

second++;

}

*first = *second;

*second = temp;

}

Base* at(int i){

std::list::iterator x = baseList.begin();

for(int a = 0; a < i; a++){

x++;

}

return *x;

}

int size(){

return baseList.size();

}

};

#endif //_LISTCONTAINER_HPP_

bubblesort.hpp

#ifndef __BUBBLESORT_HPP__
#define __BUBBLESORT_HPP__

#include "sort.hpp"
#include "container.hpp"

class BubbleSort: public Sort{
public:
void sort(Container* container){
memContainer = container;

               int flag = 1;
               int numLength = memContainer->size();
               for(int i = 1; (i <= numLength) && (flag == 1); i++){
                       flag = 0;
for(int j = 0; j < (numLength - 1); j++){
if(memContainer->at(j+1)->evaluate() < memContainer->at(j)->evaluate()){
memContainer->swap(j+1, j);
flag = 1;
}
}
}
}
};
#endif // __BUBBLESORT_HPP__

Risk Management and Mitigation Planning

 

Assignment Content

  1. You are the new IT Project Manager for the organization you chose in Week 1, and the CFO is needing a risk assessment for migrating from SQL Server 2008 r2® database to SQL Server 2016. The migration will lead to the expansion of the cloud data centers worldwide.

    The CIO feels the risk is too high and wants you to develop an Information Guide Handout and Risk Information Sheet for upper management to describe the risks and management of the risks for the impending migration.

    Part A:
    Create a 1- page (does not include title or reference pages) Information Guide Handout to present to upper management, comparing risk management practices to use in the migration that includes:

    • How risk mitigation strategy planning can reduce the likelihood and/or impact of risks
    • How often risks will be reviewed, the process for review, and who will be involved
    • The roles and responsibilities for risk management
    • Adequate references to support your findings, information, and opinions
    • A recommendation for the best risk management practice for this migration
    • Part B:
      Using the sample shown below, create a 4- to 5- page (does not include title or reference pages) Microsoft® Excel® Risk Information Sheet for at least five potential risks which might be encountered during the conversion. At least three of the five risks you choose should be project-management related.

      Risk Information Sheet

    • Risk Description
    • Probability
    • Impact
    • Rationale
    • Risk Mitigation
    • Details/Outcome
      Please note the following:
    • The risk description should fully describe the risk.
    • The probability is the likelihood which the risk will occur (i.e., low, medium, or high).
    • The impact is how the organization will be affected if the risk does occur (i.e., low, medium, or high).
    • The rationale should explain the reasons for your probability and impact assessments.
    • The mitigation strategy should explain how each risk will be addressed.
    • There should be one risk information sheet for each risk identified.
    • Include APA-formatted citations when necessary.

BI_Assignment_2

 

Complete the following assignment in one MS word document:

Chapter 2 – Exercises 4 and 15

Exercise 4:

In 2017, McKinsey & Company created a five part video titled “ Ask the AI Experts: What Advice Would you give to executives About AI” View the Video and summarize the advice given to the major issues discussed.

Exercise 15:

There are a few AI applications for tourism, such as Bold360 and AltexSoft, for dealing with customers and offering consultancy services. Discuss these in a report.

Include an APA cover page and include at least two APA formatted references

5s week 10 assignment PL

Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, eliminates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contractor under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship between BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Include references, do not copy paste. Use your own words.

article

 

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”.

The six pending research areas mentioned in the article are:

1) Fosters disintermediation

2) Aids in combatting click fraud,

3) Reinforces trust and transparency,

4) Enables enhanced privacy protection,

4) empowers security, and

6) Enables creative loyalty programs.

After reading the article in full, select on of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;

1) Describe and provide the overall research area mentioned in the article in a synopsis

2) What did the article state in how Blockchain can benefit that marketing area overall?

3) What further research did the article recommend?

4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?

5) What is an example of a company that you believe would benefit from this type of research and why?

6) Outside of Blockchain, what other piece of marketing technology can help this area?

7) What do you recommend is the best way to approach for a company to implement this area of research into their company?

Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 3 references, to include the article required. The title page and references page do NOT count towards the minimum.

Business intelligence Discussion Questions

Question 1:

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Question 2:

Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

-each question with 500 words and 2 references in apa format

Emerging threats_5.2

Discussion: 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Note: Answer should be a minimum of 300 words