CC W 14 A 2

 Clond computing can create huge competitive advantages if applications and services are correctly architected to satisfy the business requirements. In this assignment, identify and describe briefly four factors that should be considered when choosing a cloud service model (CSM). Select two out of the four that you think are very important for implementation. This should be a 250 words assignment. Plagiarism will be checked as well as APA style and format. 

Discussion

 Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber-attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.  

2 to 3 Paragraphs with In text Citations and References.

 Note, list your reference and then properly APA format the citation with all author’s last name and year (Holbert, 2020).  Every reference must be cited within every sentence that you use it in.  When using less than 6 references list all of them the first time then use et al.  You must also properly APA format your reference.  

paper

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

700 word discussion– What are these three sectors? identify and name those three sectors, and provide a brief narrative for each sector by keeping the proper headings for each sector.

Chapter 18 – According to literature review and the EU Energy Security and ICT Policy, the authors indicated that, the points of departure of the EU’s (European Commission 2007) energy policy was threefold: combating climate change, limiting the EU’s external vulnerability to imported hydrocarbons, and promoting growth and jobs, thereby providing secure and affordable energy for consumers. The main focus of the EU’s policy ideally was to move towards a single global regime and the mainstreaming of climate into other policies; and hence receiving a 20% portion out of the entire 2014–2020 EU budget.  The focus at the urban level was to produce the greatest results in an energy-efficient effort that will integrate three sectors.

700 word discussion– What are these three sectors? identify and name those three sectors, and provide a brief narrative for each sector by keeping the proper headings for each sector.

Hexadecimal Calculator

Please check the attached file.

Hexadecimal Calculator Implement a hexadecimal calculator for iOS. Requirements: • The calculator should support 4 basic arithmetic operations: + – * and / • The calculator will operate on hexadecimal numbers, not decimal numbers • The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions. • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. • The calculator should handle overflow and underflow gracefully. The app must not crash. • The calculator should handle division-by-zero error gracefully. The app must not crash. • The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. Hint: • To convert a string to a hex number, use “radix: 16” as an argument. For example: var s:String? s = “1A” var intHex:UInt = 0 intHex = UInt(s!, radix: 16)! print(intHex) // shows 26 intHex = 90 s = String(intHex, radix: 16).uppercased() print(s!) // shows 5A • It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. • Strings may be concatenated by using + operator. E.g. var s1 = “1234” var s2 = “5” print(s1 + s2) // shows 12345 You may want to do string concatenation in the action of each digit button. • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. • To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. • To support different devices and orientations, use stack view, scroll view, or both. • Design your algorithm first! Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interfaces worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why. The screenshots of a sample program are shown below. Your UI does not have to be the same as the sample program. As long as it has a pleasing-looking, it should be fine. 

discussion-5

 

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

4 discussion

Best Practices for IT Infrastructure Security Policies

Discuss at least four (4) best practices for IT infrastructure security policies in domains other than the User Domain. Pick one domain outside the user-domain to focus on. Address the following topics using your own words:

  • IT framework selection
  • When to modify existing policies that belong to other organizations versus creating your own policies from scratch
  • Policy flexibility
  • Cohesiveness
  • Coherency
  • Ownership

Explain your answers. 350-400 words must.