Authentication systems in an organization.
Assessment
inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.
Instructions: Attached Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.
Java – Process Synchronization
In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data.
Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5.
Information Sec System
At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that
1. Users are authenticated with password-based method
a. discuss the method,
b. how to technically implement it,
c. advantages and limitation,
d. Include any sources you are using to answer including websites, books, and papers from conference and journals.
2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification–
a. discuss the potential method,
b. how to technically implement it,
c. advantages and limitation,
d. Include any sources you are using to answer including websites, books, and papers from conference and journals.
3. Compare both password and biometric based method in terms of advantages and disadvantages.
PhD Dissertation
Choose A topic
Identify a topic. What is the problem you want to address (must come from the literature and be cited). Who are saying there are problems? What has been done so far about the problem? Locate peer-reviewed articles related to your topic. What was the research questions in the studies? What findings were reported? Identify a gap in literature to justify your research. What is the purpose of your proposed study (be specific and clear)? What is the population you would like to address? What methodology are you planning on using? i.e. quantitative or qualitative?
Compare common methods to find which is most successsful in reducing the prevalence of social engineering. Why: “The development and implementation of robust counter…….. Kaabouch, 2019). What: What is the question you are looking to answer? Which is most successful?
Which measures are you wanting to compare?
How: Address how you will answer this? By doing what? Gathering what data
HomeWork Paper
Discuss how information is classified and how it can be used in a competitive situation.
Length, 2 – 3 pages.
All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.
Please reference the rubric for grading.
All paper are checked for plagiarism using SafeAssign, you can review your score.
Please use the attached APA template to get started.
Demonstrating the Gap
Proper network design provides for compliant security, not only isolating users and their traffic, but also preventing attackers from easily traversing a network.
Using Microsoft Visio or another online network diagramming tool, diagram the network that was analyzed in the Topic 1 “Quantify the System” assignment.
Then, create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework.
Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure will be using Layer 3 switches and layered routing to provide separation of subnets.
Your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
APA style is not required, but solid academic writing is expected.
Refer to “Demonstrating the Gap Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
ALSO PLEASE READ INSTRUCTOR ASSIGNMENT TIP
Hi Class, the link below can help you with week 4 assignment. The link is not an endorsement or affiliated in any way to GCU. However, you are welcome to use whatever application or site that will produce the end results for what is being asked.
Also, I don’t except to see 50-100 servers on your diagram. However, your diagram, at a minimum, should include the following secure network design elements: Firewalls, IDS/IPS, DMZ, Vlans, Border and Gateway routers, private IP addressing, Isolated Server Subnets, Network Access Control, and VPN concentrator.
This is an assignment that many students forget to label or include what is required. That said, I want everyone to do their best and get the best possible grade.
Based on this weeks lectures take an inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.
Please download the Assignment 3 Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.
Discussion
Discussion (Chapter 7): What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 100-300 words.
Operational Excellence
Article Find and Summary 1
Using the University online library (EBSCOhost, Proquest, etc.), research and locate an article relating to the integration of IT in business strategy. After reading the article, provide a brief summary of what you have learned. DO NOT quote the article–only describe what you learned from reading it. Your summary should be at least 150+ words. Provide a citation at the end of your summary and the full reference using APA 7 format. Write your paper using the APA 7 template.