computer science

For the final phase of the project, please do the following. 

  • Complete the final written report as an accumulation of work done in Phases 1-3. It should be submitted as a final document including recommended revisions all compiled as one document. The paper should be six to eight pages long, in APA style. Include a cover page, table of contents, and list of references.
  • You will also create a narrated PowerPoint presentation and submit it separately. It should be addressed to the CEO or CIO of the company. Your final presentation file should include slides for each of the main topics of your research, as well as including title and references. Your PowerPoint presentation should be approximately 6-8 minutes long. The presentation should be done in a professional manner with the notes section containing the “speaker’s notes” on the content.

Both parts of this assignment are due by Sunday at 11:59 PM CT. Submit the Final Written Report as well as the PowerPoint  You will submit these two items separately.

Software engineering

  

Paper topic proposal should not exceed 2 pages and should include the following:

1- Paper topic

2- Brief description

Describe in 1-2 paragraphs the topic of the paper and the approach you will take to address the topic. If you have developed an outline, you can include that in this section.

3- Preliminary list of references.

Include 3-4 references, in the APA format, that you plan to use for the paper.  

Case Project 8.3

You work for a mid-size corporation known for its inventions that does a lot of copyright and patent work. You’re investigating an employee suspected of selling and distributing animations created for your corporation. During your investigation of the suspect’s drive, you find some fileswith the unfamiliarextension .xde. The network administrator mentions that other xde files have been sent through an FTP server to another site. Describe your findings after conducting an Internet search for this file extension.

Identifying Threats and Vulnerabilities in an IT Infrastructure

 

Risk Management Fundamentals Lab #1: Identifying Threats and Vulnerabilities in an IT Infrastructure

Critical infrastructure vulnerability assessments are the foundation of the National Infrastructure Protection Plan’s risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards post-event situation.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

latest video surveillance technology

  

Identify and research the latest video surveillance technology. For example, you can research “edge-based video surveillance,” or another new technology.

1. Find a resource–a scholarly article, security organization article/whitepaper, or web article. Give the article’s APA style reference information.

2. Summarize the article. Include all major points.

3. Explain how this surveillance technology could be used. What kind of location, organization, level of needed security, etc., would need kind of surveillance technology? Justify your choice.

4. Explain the advantages of using this new technology over the older technology options.

 Expected length is 2 pages. 

Course Research Project part 2

  

Part II – Investigation and Review

In part II, you will closely study the materials found on the topic and conduct research to fully understand the relevant details. Based on your research and investigation, you are going to describe your understandings in the review. For example, if you chose “An investigation on Facebook privacy issues” as your topic, you should describe its privacy policies in detail and present different ways to enforce privacy in Facebook. As a result, at least 800 words are expected for this part. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. If you have used additional references in this part, be sure to include them at the end with the references from Part I. The second submission of the course project is due by 11:59 p.m. (ET) on Sunday of module/week 6.

IT Leaders IT Managers

 

*APA Format and Plagiarism Free. Answer below three questions separately with References and In-Text citations for every response. Attached Text.

Review chapter 12 course text. Atleast 900 Words.

  1. 1. In your own words, discuss the guiding principles for effective innovation.  

Review Chapter 12 in the course text – privacy and data quality must be managed properly in order to ensure a successful business model.

  1. 2. Discuss the recommendations that the IT managers group collectively provided.

  Review chapter 14 in the course text.

  1. 3. In your own words, discuss the steps to improving customer experience.

Analyze how advanced security concepts are applied to develop secure code

You are tasked with examining Artemis Financial’s web-based software application by conducting a vulnerability assessment. Implementing what you have learned so far and using the supporting materials provided to assist you, review and analyze the security vulnerabilities specific to Artemis Financial’s web-based software application and document the following in the Vulnerability Assessment Report Template.

  1. Interpreting Client Needs: Review the scenario to determine your client’s needs and potential threats and attacks associated with their application and software security requirements. Document your findings in your Vulnerability Assessment Report. Consider the following regarding how companies protect against external threats based on the scenario information:
    • What is the value of secure communications to the company?
    • Are there any international transactions that the company produces?
    • Are there governmental restrictions about secure communications to consider?
    • What external threats might be present now and in the immediate future?
    • What are the “modernization” requirements that must be considered, such as the role of open source libraries and evolving web application technologies?
  2. Areas of Security: Use what you’ve learned in Step 1 and refer to the Vulnerability Assessment Process Flow Diagram provided. Think about the functionality of the software application to identify which areas of security are applicable to Artemis Financial’s web application. Document your findings in your Vulnerability Assessment Report and justify your reasoning for why each area is relevant to the software application.

*Please note: Not all seven areas of security identified in the Vulnerability Assessment Process Flow Diagram may be applicable for the company’s software application.

  1. Manual Review: Refer to the seven security areas outlined in the Vulnerability Assessment Process Flow Diagram. Use what you’ve learned in Steps 1 and 2 to guide your manual review. Identify all vulnerabilities in the code base by manually inspecting the code. Document your findings in your Vulnerability Assessment Report. Be sure to include a description identifying where the vulnerabilities are found (specific class file, if applicable).
  2. Static Testing: Integrate the dependency check plug-in into Maven by following the instructions outlined in the tutorial provided. Run a dependency check on Artemis Financial’s software application to identify all security vulnerabilities in the code. Specifically, record the following from the dependency check report in your Vulnerability Assessment Report:
    1. The names or vulnerability codes of the known vulnerabilities
    2. A brief description and recommended solutions provided by the dependency check report
    3. Attribution (if any) that documents how this vulnerability has been identified or documented previously
  3. Mitigation Plan: Interpret the results from the manual review and static testing report. Identify steps to remedy the identified security vulnerabilities by creating an action list that documents how to fix each vulnerability in your Vulnerability Assessment Report.

*Please note: You do not need to fix these vulnerabilities in this project.

Assignment 2

write a research paper that explains how Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples. 

Requirements:

You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) 

So in summary, here are the research paper requirements:

2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment)

Paper MUST address: How Information Technology (IT) promotes getting people who are affected by policies involved in the policy-making process. Cite specific examples.

Cited sources must directly support your paper (i.e. not incidental references)

At least 500 words in length (but NOT longer than 1000 words)

If you are not sure how to identify peer reviewed papers or articles, please visit the following resources:

http://diy.library.oregonstate.edu/using-google-scholar-find-peer-reviewed-articles
http://libguides.gwu.edu/education/peer-reviewed-articles