CIA Triad

In 80 words or more review and discuss the tutorial on the following link

https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA

Excel Grader

I have two excel graders that I need done. Please do them correctly the last guy did not and I did not pass them. 

3 Discussions S

Discussion 1.2

What is so special about GIS? Is GIS art or Science?

Discussion 2.1

What is the difference between GIS and CAD? Why GIS and CAD both exist?

Discussion 2.2

Imagine you are looking at a geodatabase that contains 50 states, 500 cities, and 100 rivers. How many feature classes are there? How many features? How many attribute tables? How many total records in all the attribute tables? 

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

Discussion Presentation. Ms Powerpoint.

Power Points/ Class Discussion Topics
  1. Discuss the importance of mutual exclusion and synchronization in the case of process cooperation. What problems could arise if the system lacks these two features?  How could semaphores help? 
  2. Compare threads and processes and discuss their similarities and differences.  
Additional Resources
  1. Concurrent processing: http://docs.oracle.com/cd/A60725_05/html/comnls/us/fnd/over.htm
  2. Multiprogramming and multiprocessing: http://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zconcepts/zconcepts_75.htm

Discussion 7

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Reverse Engineering, Vlnerabilties

This is an Android app. Please review and identify if there are any vulnerabilities in this mobile Android app.

For each vulnerability, please take a screenshot or evidence and explain why you think it is a vulnerability.

Password to extract the file: infected