Concept of Tokenization

Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols. 

Python Assignment

Write a Python program to read the item name and quantity of each item included in a shopping list using a loop. 

Assume a shopping list will include only following three items: 
Item name
Item unit price
Pencil
$1
Eraser
$2
Box
$3
The program should ask the user to enter the item name and quantity of each item. Assume user enters valid input. You are NOT required to do validation checks of the data input.
Your program must find and display the itemised cost and the total cost of the items in the shopping list using a loop.
Sample program run (user input is given in italics):
Enter item name: pencil
Enter item quantity: 2
Enter item name: box
Enter item quantity: 1
Enter item name: eraser
Enter item quantity: 2
Sample output:
*************************************************************************************
Item No Item Name Unit Price Quantity Item Price
*************************************************************************************
1 pencil 1 2 2
2 box 3 1 3
3 eraser 2 2 4

Security Architecture and Design

  

Please read the Document attached:

The Questions:

List and describe the required tools needed for an effective assessment. What are some common mistakes and errors that occur when preparing for a security assessment?

Describe in depth the role in which organizational risk tolerance plays in relation to systems under assessment. 

Identify and describe what threat agents should be avoided in preparation for an assessment. How do we effectively screen out irrelevant threats and attacks in this preparation? 

Identify when to use architecture representation diagrams and communication flows. Define and illustrate when decomposing of architecture would be used. Provide an example of architecture risk assessment and threat modeling. 

Whiteboard Animation

Stock market knowledge is a plus. Please follow all instructions, failure to follow instructions will result in refund request.

Video is uploaded with audio. Starting at 6:59 until 8:42 the animation needs to describe the example provided for Bank of America buying 100,000 shares of Boeing using Market Order vs Limit Order. Please use company transparent logos in animation (attached).

*Note: There is a minor discrepancy with the numbers but the example should be explaining buying 100,000 shares with 20k at $250, 20k at $260, 20k at $270, 20k at $280, 20k at $280 with Market Order.

Problem solvng

  • What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
  • What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
  • What are the requirements for Buster and LuEllen?

Practical connection paper -Analyzing & Visualizing Data

Subject: Analyzing & Visualizing Data 

This is (Executive Program Practical Connection Assignment )  that you may saw in other courses. In each course, you are expected to write a short paper to indicate to knowledge/skills in this course will be related to your work/professional environment. Read the instructions in the attached document. You can submit any time, but the firm deadline for submission is Saturday midnight Oct 3rd 

 

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Research Paper

Topic: Disaster recovery plan development

Format: around 320-350 words along with 2-3 references in apa format

Headings required: Introduction, literature review, findings, conclusion, references

Note: no plagiarism please

Business Process Redesign

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.