ITISP W 3 D

 Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist in the next ten years? Why or why not? 

Disaster recovery-3

Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects or vision that you believe each of these stakeholders will bring to the committee.[500 words]

200 words

 Describe each of the DNS zone types that are available in Windows Server 2016. Explain why you would use each type of zone. For example, when would you use a Standard Zone versus an Active Directory Integrated Zone? Make sure you include Stub Zones in your answer. Also, include in your answer methods for securing and protecting DNS servers  and clients. 

py

  

In this assignment you will compare two implementations of storing text files:

(1) One continuous string (newline char as separator).

(2) List of strings where each string represents a line

Each of these representations has to be implemented as a separate set of functions and, of course, with separate Python file For each implementation, you will write editor functions to move the “cursor”. In each representation, you use a cursor to represent the current position. For example, for (1) the cursor is just the position (index). For (2), the cursor is a pair: the index of the line and the position within the corresponding line string. Finally, for (3) the cursor is a pointer to the node (containing the line) and the position within that line.

Write (and test) the following 10 functions (names are taken from old vi editor) for each implementation

(1) cmd_h: move cursor one character to the left 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(2) cmd_I: move cursor one character to the right

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(3) cmd_j: move cursor vertically up one line 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(4) cmd_k: move cursor vertically down one line

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(5) cmd_X: delete the character to the left of the cursor

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(6) cmd_D: remove on current line from cursor to the end

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(7) cmd_dd: delete current line and move cursor to the 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

beginning of next line

(8) cmd_ddp: transpose two adjacent lines

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(9) cmd_n: search for next occurrence of a string (assume that string to be searched is fully in one line.

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(10) cmd_wq: write your representation as text file and save it

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

Think of and implement any other 5 functions (your choice)

(11)~(15)

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

For testing, you will read the following “nerdy” poem (from the “Zen of Python”) into your “file representation”. 

Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After each command, print the contents of your file with character ‘^’ as cursor. 

Example: your initial configuration is 

^Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After executing cmd_n(‘better”), your representation should print:

Beautiful is ^better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

business intelligence

Big Data, and Robotics

Search the internet and find scholarly content on two of the topics above.
        * Find at least 5 related reference

Create a WORD document of at least 600-750 words on how these technologies work and how they can be used to support a business.

  • Include the references at the end of your paper (using APA format)
  • Include Citations for each reference (using APA format) in the text wherever they apply

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

PS

 These days, many people are working remotely and working remotely can bring new challenges. List 5 “new” physical security challenges that work remotely entails? 

Computer science

Purpose

This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:

  • The ability to discern when a risk assessment should be performed and carrying out the task
  • Understanding user or customer access requirements, whether remote or local
  • Using a layered security approach to establish and maintain access controls
  • Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel

Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.

Required Source Information and Tools

The following tools and resources will be needed to complete this project:

  • Course textbook
  • Access to the Internet
  • Access to the library
  • Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)

Learning Objectives and Outcomes

Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:

  • Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
  • Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
  • Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  • Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
  • Implement appropriate access controls for information systems within IT infrastructures.
  • Mitigate risks from unauthorized access to IT systems through proper testing and reporting.

Project Checkpoints

The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation.

Checkpoint

Purpose of the Checkpoint

Expected Deliverables

1

  • Understanding requirements
  • Clarification on project deliverables
  • Discussion on project concerns and progress up to  this checkpoint
  • A review of the course project’s outline and schedule for completion

Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO).

2

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO.

3

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO.

4

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO.

Deliverables

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

  • Develop solutions to the issues that the specified location of IDI is facing.
  • Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.
  • Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.
  • Analyze the strengths and weaknesses in the current systems of IDI.
  • Address remote user and Web site user’s secure access requirements.
  • Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.
  • Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.
  • Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.
  • Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Self-Assessment Checklist

  • I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project.
  • I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation.
  • I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior.
  • I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  • I have implemented appropriate access controls for information systems within IT infrastructures.
  • I have followed the submission requirements and necessary details for writing the report.