I need python homework

Modify the Pi Simulation program to improve its appearance, behavior, and/or code in order to meet the quality objectives. You should implement at least 5 modifications.  Be sure to use comments to identify each of your modifications.

operations security

 

One factor often overlooked in creating and implementing information security policy is the human factor.  Your reading this week explores this factor.  One tool to help manage the human factor is the separation of duties (also called segregation of duties).  Explain what separation of duties is and why it is important.  What three functions should be separate in all transactions?  Give an example of how duties can be separated using an example you might find in an organization.

Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long.  See the links below for more information:

https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx

https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html

https://www.accountingtools.com/articles/what-is-separation-of-duties.html

https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html

https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html

Discussion: The Future of Offices

q1) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? 

q2) Will offices as we think of them today exist in the next ten years? Why or why not? 

note:1. the whole discussion should be Minimum 250-300 words. 

2. Use at least one scholarly article.

Portfolio project

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.

Digital Forensics Tools and Tech

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

300 words APA format

Research paper 15 pages subject Enterprise risk management and need PPt of 12 slides

 
•    Here’s the approach you can take for this paper:

  • Title page (ensure team members and IDs are listed)
  • Introduction – provide a background of the selected organization.
  • Risk #1
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #2 
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #3
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Conclusion
  • References (minimum of 12 reputable sources)
  • Appendix (if any)

The paper will range from 15-to-20-pages includes title page, content, and references.

Please write in APA Style.

Discussion

Incident Response Team (IRT) Policies

  • Describe the different ISS policies associated with incident response teams (IRTs).

Keywords

Use the following keywords to search for additional materials to support your work:

  • Business Continuity Plan (BCP)
  • Business Impact Analysis (BIA)
  • Containment and Minimizing Damage
  • Disaster Recovery Plan (DRP)
  • Incident Classification
  • Incident Response
  • Incident Response Support
  • Incident Response Team (IRT)
  • Incident Response Team (IRT) Charter
  • Incident Response Team (IRT) Members
  • Media Handling

Lab 15 HTML

  • Review the Multimedia PDF and the Web Development PPT
  • Download the Word document below and follow the instructions
  • HTML Lab
  • ZIP up your HTML file and your image file into a Lab15.zip file
  • Upload the ZIP file to Canvas for grading