Annotated Biblography

 

You will provide an annotated bibliography for each article in one page and discuss how these articles identify a gap in the literature that you wish to address in your dissertation
 

Computer Automation and Artificial Intelligence :

https://inis.iaea.org/collection/NCLCollectionStore/_Public/25/029/25029353.pdf?r=1&r=1#:~:text=Recent%20development%20in%20computer%20technology,techniques%20with%20an%20improved%20efficiency.&text=Automation%20refers%20to%20the%20act,process%20more%20automatic%20than%20before.&text=Automation%20involves%20the%20integration%20of%20tour%20types%20of%20devices.

Journal of machine learning research :

Provided attachment

Reference 

https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

https://guides.library.cornell.edu/annotatedbibliography

case study

Discussion Points

1. Some virtual teams at Boeing have discussions focused on military

aircraft. Do some Internet research on UC security mechanisms and

identify and briefly describe several that Boeing should have in

place to ensure the privacy and integrity of such discussions.

2. To what extent do the UC benefits experienced by Boeing mirror

those of other firms that have deployed UC capabilities over

converged IP networks?

3. To date, Boeing has not implemented the full range of capabilities

available through UC systems. If you were the CIO at Boeing, what

additional UC capabilities would you implement? What benefits

would you expect Boeing to derive from deploying these

capabilities?

Sources

[MICR10] Microsoft Case Studies. “Boeing Expects to Lower Costs and

Improve Productivity with Messaging Solution.” March 16, 2010. Retrieved

online at:

http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid

=4000006703.

[MICR11] Microsoft Case Studies. “Boeing Promotes Knowledge Sharing for

Global Workforce with Communications Solution.” April 29, 2011. Retrieved

online at: http://www.microsoft.com/casestudies/Microsoft-Lync-Server2010/Boeing/Boeing-Promotes-Knowledge-Sharing-for-Global-Workforcewith-Communications-Solution/4000009654.

[REED08] Reed, B. “AT&T snags big Boeing voice/data contract.”

NetworkWorld. August 12, 2008. Retrieved online at:

http://www.networkworld.com/news/2008/081208-boeing-att-contract.html

Project with presentation

I will develop a fictitious company, make yourself officers, and create a privacy policy document for said company.

 Your fictitious company must create a privacy policy document (6-7 pages). The document shall include an introductory section, such as an “Executive Summary,” a “Preamble,” or an “Introduction.”

The document will include policy statements. The policies need to focus on governing your company and its employees. This is where the work comes in. You need to give evidence in the policy section of your knowledge gained. That document provided in this folder is not meant to be an exact template.  Rather, it is designed merely to reflect what a successful policy document might look like in any given workplace.  Do not restrict yourself to this exact format, but do utilize a cohesive format  and create a document that is easy to follow. You will see in that document that I simply tried to explain more about what the Project should include by using a format that may help you understand how to organize your paper, and understand what features this governance document should include.

That includes its organization, page count, and grammar, and spelling. The form and format are important because if a policy document is disorganized, contains typographical errors, or is hard to read otherwise, employees will not respect or even use it as the guidance it is meant to be. 

Complete the Unix scripts

| Firewall // 1pt

Open the following ports and services: 443, http

| Account Management // 3 pts

From the csv, use the OS as the filter to complete the following tasks.

– Add each username and make sure to place it on the correct base dir. You can check the /etc/passwd to ensure it is correct.

roary001:x:1000:1000::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each username must be part of the right primary group. See filter below

roary001:x:1000:1020::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash

– Each home folder must contain the corresponding files. See filter below

– Add the right content to the about file.
* All text must be lower case
* Single space characters
* No extra characters at the end of the document

| MAC

– Base directory = /home/mac/

– Primary group = color

$ ls /home/mac/canada/roary001/

.DS_Store
about

$ cat /home/mac/canada/roary001/about
first last

dob

| WINDOWS

– Base directory = /home/windows/

– Primary group = fruits

$ ls /home/windows/mexico/roary002/

Thumbs.db
about

$ cat /home/windows/mexico/roary002/about
last first

shell

Ubuntu // 4pts

| Firewall // 1pt

Open the following ports and services: 21, 22, 53, 143, 443

| Apache2 // 3pt

Install Apache on the server

$ apt-get install apache2

From the csv, use the permission as the filter to complete the following tasks. 

– Create a base directory under the /var/www/html for each permission

/var/www/html/permission/   // all, create, delete, drop, execute, insert, select, update

– From the CSV, filter all users that match each permission and create a new directory for each month of the year for which your users were born. 

fh7058,forrester,hochstein,m,august 9 1998,ghana,plum,bananas,mac,/bin/tcsh,execute

gm1513,greydon,merrick,m,september 21 1992,bahrain,medium_aquamarine,grapes,mac,/bin/csh,select

iw7165,iriana,weick,f,august 20 1987,cyprus,medium_purple,plums,windows,/bin/tcsh,select

/var/www/html/select/september

– Inside of each folder above, create an index.html file and add all matching users data int the following order: country,color,fruits,os,shell,username,first,last,gender

cat /var/www/html/select/september/index.html

bahrain,medium_aquamarine,grapes,mac,/bin/csh,gm1513,greydon,merrick,m

Fedora // 2pts

// scripts

All scripts must be placed on the /root folder.

Scripts can not be executed prior to submission. This will cause issues.

Make sure to test your scripts before turning in the assignment.

* Ensure that all file references in your scripts are absolute paths.

| useradd

Create a script named useradd.sh. This script will complete the same steps outlined on CentOS, but will run them on demand.

| httpd

Create a script named httpd.sh. This script will complete the same steps outlined on Ubuntu, but will run them on demand.

* Keep in mind that to install apache2 on Fedora you need to use the command below. The folder structure for the web server is the same.

$ dnf install httpd.

etc13

 Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices. 

research paper

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

discussion

 

NIST Cyber Security Framework

For this assignment, use the Cyber Security Framework (CSF) to create a security plan for the Cloud.    Make sure the plan covers the categories and sub categories of the NIST CSF framework.  

Program Writing

 

Driving is expensive. Write a program with a car’s miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 10 miles, 50 miles, and 400 miles.

Ex: If the input is 20.0 3.1599, the output is:

1.57995 7.89975 63.198

Note: Small expression differences can yield small floating-point output differences due to computer rounding. Ex: (a + b)/3.0 is the same as a/3.0 + b/3.0 but output may differ slightly. Because our system tests programs by comparing output, please obey the following when writing your expression for this problem. First use the dollars/gallon and miles/gallon values to calculate the dollars/mile. Then use the dollars/mile value to determine the cost per 10, 50, and 400 miles.

Note: Real per-mile cost would also include maintenance and depreciation.