secure shared processing – Database Security

 Topic Name : secure shared processing in data security

Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the topic provided in the to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Make use of academic rederences such as you can find in the Danforth LIbrary research databases 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in essay format not in bulleted, numbered or other list format. 

for Dr Elahi

Oliver’s business is now growing. He built a company and has sales agents and sales supervisors working for him all over England. He realizes using google spreadsheets is not sustainable. 

He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you). 

The software engineer has to come up with a mobile app that allows the sales agents to report their sales from the app. 

The app should be connected with a data pipeline that would eventually make the data ready for analysis. 

– What would be your strategy to build a strong and reliable data pipeline and how will you structure it ? Explain the different steps for processing the data, what makes each step important? 

Mention which tools would you use for each of these steps. Feel free to argument as much as you feel it relevant You’re free to make assumptions about the mobile app e.g. The raw data is stored in a No-Sql database… 

Python Programming

 

Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

how business process as services

 

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

1-2 page paper- APA 6th standard – Describe the hashing security mechanism and its relationship to the encryption mechanism in cloud computing world.

Please describe the hashing security mechanism and its relationship to the encryption mechanism. The paper should be plagiarism free in APA 6th standard.

During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with.

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. 

how the cloud will impact future operating systems

create a post where you discuss how the cloud will impact future operating systems.  Initial posts should be a minimum of 400 words that cites sources and follows APA formatting.  Also, respond to at least three peers’ posts. Responses should be substantiative and clear and further the conversation by stating what you learned from the post and asking questions. A suggested minimum is 150 words.

Redirection & Pipelines; Linux language

 

  1. That English paper you were writing on the works of Lewis Carroll is due in a few hours and you have forgeotten the name of the text file in which you had written a number of quotations to use in your paper. Luckily, you know that the file is somewhere in your ~/UnixCourse directory or in some subdirectory directly or indirectly within it. You also know that the file name ended in ‘.txt’. You are pretty sure that you could recognize the file from just the first line.
    You seem to recall having heard that there is a Unix command head that will print the first few lines of any file and suspect that, with the proper parameters, it could be used to print just the first line. (Hint – part of your task in this question is to show that you can use the built-in Unix help facilities.)
    But you really don’t want to type that command out for every file or even every directory. What command would you give to produce a listing of the names of all the text files (as absolute paths) in ~/UnixCourse or its subdirectories (possibly nested several layers deep) followed immediately by the first line of text within that file? E.g., to produce a listing looking like this:
    /home/yourname/UnixCourse/foo.txt When in the course of human development /home/yourname/UnixCourse/Quotations/bar.txt Curiouser and curiouser!
    Note that the output format must look like the example above. (That’s not unreasonable, as one of the things you should have learned from this lesson is that the output of one command is often fed into later commands, which must be able to read it.) In particular, all files should be listed and absolute paths and solutions that add extraneous characters around the file name (e.g., << or ==>) are not correct.
  2. Every time you issue a command in Linux, a new process is launched to run that command. Some of these processes end immediately upon completion of the command. Some may hang around or may spawn additional processes of their own.
    The command ps -Af will display a listing of all processes running on the same machine as you are. This includes processes being run by lots of other people. Part of the information shown is the name of the command that launched the process. It also will show the login name of the account that launched that process. Try it now and examine its output.
    One of the most common processes that you will see is sshd, the process that accepts an incoming ssh connection like the ones that you have opened for this assignment.
    What command would you enter to get a count of the number of sshd processes running on the machine where you are logged in?