Problem solvng

  • What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
  • What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
  • What are the requirements for Buster and LuEllen?

Practical connection paper -Analyzing & Visualizing Data

Subject: Analyzing & Visualizing Data 

This is (Executive Program Practical Connection Assignment )  that you may saw in other courses. In each course, you are expected to write a short paper to indicate to knowledge/skills in this course will be related to your work/professional environment. Read the instructions in the attached document. You can submit any time, but the firm deadline for submission is Saturday midnight Oct 3rd 

 

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Research Paper

Topic: Disaster recovery plan development

Format: around 320-350 words along with 2-3 references in apa format

Headings required: Introduction, literature review, findings, conclusion, references

Note: no plagiarism please

Business Process Redesign

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

Assignment2020

 Follow the instructions outlined in the attached PowerPoint presentation.  Use the information to write a 5-page paper conducting a risk assessment based on the information from the presentation.  Remember proper APA formatting, cite and paraprhase your sources. 

Discussion question, 350 words 4 references.

Review at least 4 articles on Balanced Scorecard and complete the following activities:

1.  Write annotated summary of each article. 

2.  As an IT professional, discuss how you will use Balanced Scorecard to manage IT resources efficiently.

Information security

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. 

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Enterprise Security Plan Strategic Objectives

 

Assignment Content

  1. An enterprise security plan is a document that explains the security exposure that an entity would encounter in a specific marketplace. A committee of people typically writes this document over a span of a few months. Many times the drafts begin with developing a high-level overview of strategic objectives that address how to secure the enterprise inside and outside the enterprise.

    The CEO asks you to explain the core principles of enterprise security and respond to five strategic objectives as part of the overall enterprise system security plan draft. They are:

    • Data-loss prevention
    • Access controls
    • Data management
    • Risk management
    • Cloud technology
    • For each of the five strategic objectives, write a response that addresses the following:
    • Key initiative: Why is this topic important to Auburn Regional?
    • Objectives: What is the desired outcome to this effort?
    • Description: What is the specific strategic objective? Provide a high-level explanation.
    • Benefits: What will be the benefits of this effort?
    • Outcome: What will be done to meet this objective?
    • Include any charts, graphics, or infographics created in previous weeks that support your findings.

      Compile your response with the following:

    • An updated executive summary
    • A final recommendation
    • At least three new references throughout your plan overview, cited according to APA guidelines.
    • Incorporate feedback and use previous assignments as a resource. As a guideline, an overview of this nature is typically 3 to 4 pages long.