How does organizational diversity influence the accepted ethics of decision making in the organization? Explain.
How does organizational diversity influence the accepted ethics of decision making in the organization? Explain.
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
You have three attempts.
explain the different security measures that each version of SNMP uses. What is the different between SNMPv1, v2c and v3?
In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:
Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.
Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.
Once you have a complete database, do the following:
As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:
Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.
.sql
file of your table schemata..sql
file of your queries.Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs(300 words) in length and uploaded as a TEXT DOCUMENT.
We studied the network criteria: performance, Reliability, and security. In the very early days of the network technologies, in your opinion, which of the three criteria was more considered, and how the other criteria started to get considered as well?
A.) FINAL WRITTEN PROJECT
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Some useful links and resources for your research:
https://resources.workable.com/email-usage-policy-template
https://www.sans.org/security-resources/policies/general/pdf/email-policy
https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref
https://www.techrepublic.com/article/download-our-wireless-policy-template/
B.) Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not.
JAVA Programming
Scrabble Help: The file dictionary.txt contains all of the words in the Official Scrabble Player’s Dictionary, Second Edition. Note: this list contains some offensive language. Write a class, WordLists, in Java that generates useful word lists for scrabble players using this list.
Your class should contain the following methods:
Use the included template for your WordLists.java file. Write your own test class for your WordLists class that tries these methods out and writes the word lists (the ArrayLists of strings) to text files.
What to hand in:
A Template for the WordLists.java file is in the Assignment 5 workspace on Codio. You must create your own test class (separate file with main method) that tests each of your methods and writes the results to a text file. In addition to the source files include a text file named readMe.txt with an explanation of how your program works. That is, write in plain English, instructions for using your software, explanations for how and why you chose to design your code the way you did. The readMe.txt file is also an opportunity for you to get partial credit when certain requirements of the assignment are not met.
The dictionary.txt file contains like this:
aa
aah
aahed
aahing
aahs
aal
aalii
aaliis
aals
aardvark
aardvarks
aardwolf
aardwolves
aargh
aas
aasvogel
aasvogels
aba
abaca
abacas
abaci
aback
abacus
abacuses
abaft
abaka
abakas
abalone
abalones
abamp
abampere
We studied Apache Pig in lecture # 4. You are supposed to do online research and find out one case study where Apache Pig was used to solve a particular problem. I am expecting 4 page write-up. Please provide as much technical details as possible about solution through Apache Pig. Please draw technical diagrams to explain the solution.
I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up.
Please draw your own diagrams and don’t go more than 4 pages in total.
Discuss the difficulties in measuring the intelligence of machines.