Security Architecture and Design solution as a diagram or diagrams with annotations

Length: Minimum of 900 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Access control Assignment 8

Discuss the best practices for access control for information systems and how implemented by business.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Questions

Question 1

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

 Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 2

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Week 4 Research Paper – Info Tech Import Strat Plan

This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

 • Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

• Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Need help in home work 111120

you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s the strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Discussion

https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/

Read the article in above link,  discuss whether you think the premise of the  article is correct and that people are more aware of privacy concerns.   

Use at least three sources from https://libguides.nec.edu/az.php .   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. 

Download the CMST_301_Final Examination.docx file attached to this assignment.

  • Type your responses to the essay questions directly in the attached exam and save the file as: CMST_301_Final Examination.docx.
    • Submit the completed document to the Final Exam assignment folder 
  1. You must answer 4 of the 8 essay questions. Should you answer more than 4, only the first 4 will be graded. Each essay is worth 25 points for a total of 100 points for the exam. The exam is worth 20% of your final grade. Be sure you organize your response covering all the aspects of the questions.
  2. Length Requirement: Each essay response is required to be at least 500 words in length. Essay responses that are shorter will receive deductions based on how many words under (the farther from the designated length, the higher the deduction). Between 400-499 words, you will lose 5 points, under 400 words, you will lose 10 points.  Direct quotes do not count toward the word total. Please keep direct quotes to a minimum. Your response should be at least 90% original thought.   Also, I am expecting to see analysis and the synthesis of ideas in your essays (not just a manipulation of direct quotes with your words spliced in between). 
  3. Content Requirements: Content must be comprehensive, accurate, and persuasive. Your response should be at least 90% original thought.  Must use data from a minimum of two scholarly sources to support statements and draw a thorough and convincing conclusion from the data. 
  4. Bibliographical Requirement: Please do not use unprofessional sources such as Wikipedia, About.com, Answers.com, Dictionary.com, How.com, or anything remotely similar.  Examples of scholarly sources include our course content (e.g. Read & Watch resources), textbooks, journal articles, trade magazines, and conference proceedings. UMUC has a top-notch, extensive online library. You can find many scholarly sources there. Note: “Personal communications (e.g. Twitter Posts, Blogs, and YouTube Videos)” are not considered professional or scholarly sources.  Include at least TWO in-essay citations in EACH essay and a reference list at the END of each essay.
  5. Formatting Requirements
    • The paper must follow APA guidelines throughout.  See Course Content>Course Resources>Sample Paper to Show Appropriate Document Formatting.
    • Double-spaced (including the reference page) with the first line of each paragraph indented.
    • 1-inch Margins
    • 12 point professional font 
    • Begin each essay on a separate page
  6. This exam is **not** a group project. Your answers should be yours alone.
  7. Please spell-check your work.

500 words: Practical Connection Assignment – Written Assignment where students will reflect on course concepts and their practical connection to a working environment.

  

Practical Connection Assignment – Written Assignment where students will reflect on course concepts and their practical connection to a working environment.

Course Name: Organization Leadership & Decision Making

Working Environment: Health Care Industry. 

Course Description

One of the most important skills a business leader needs to have concerning technology involves effective decision making and governance. This class will consist of a case study approach presenting different scenarios that require decisions to be made on technology issues that are relevant to today’s business environment. Students will develop the skills for understanding the components and elements of these technology decisions, and assess associated risks. This course will draw upon a cross section of technology, finance, security, project management, leadership, and other aspects of effective decision making.

Course Objectives

Upon completion of this course:

1. Develop IT strategy for business value,

2. – Explain the principles of business metrics and its application in the business setting,

3. – Explore and explain the principles of communications with business managers.

Learner Outcomes

Compare and contrast the difference between leadership and management in a digital world

Understand how innovation assists organizations with transformation principles and practices

Understand how organizational culture impacts productivity

Articulate what ethical leadership is and how it impacts culture

Evaluate leadership traits that are most influential and impactful in strategic business decisions.

C++ / Python

 

Check the slides “OS Security II,” pg. 4-8. You are to implement a Dictionary Attack with and without Password Salt program in either C/C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Industry selection

Please check the attached doc and answer to the questions in it.

Industry to focus: commercial banking industry ( NAICS code – 522110)

 

Note that this code is for the Commercial Banking Industry. Is this what you intended? There doesn’t appear to be an industry called the Finance Industry. So you may want to really get specific on the industry that you are going to focus upon.)

Note: in-text references and cite references are needed. 

maximum words 400