Thesis

Task-1:

Provide an outline for your Chapter 2.  Also write the Introduction to the Topic of your dissertation centered on the Problem for your research.

Task-2:

Provide 4 pages for Chapter 2 – discuss the dissertation topic and brief introduction to the literature review as well as develop a PPT for presentation

Please provide a PPT for the following information as well as

• What is the problem statement for your dissertation:
• Gaps in Literature
• What is your theory?
• Re search questions ?
• Geographical Area/Demographics
• Background information
• Importance of the topic
Which Methodology are you using? Quantitative or Qualitative

financial measure

 

(1) Identify and describe one of the financial measures of profitability, liquidity, efficiency, and leverage.

2) How can an analyst use one of these financial measures to evaluate the financial condition of a corporation?   

Lab computer science

 

For this lab you will implement a Java program that uses several different data types and operators.

  1. Start Apache NetBeans.
  2. Create a new project called Lab 3.
  3. Add a java main class called yourlastnameLab3.java with your last name to the project and csci1011.lab3 as the package name
  4. Your program must have the following comments at the top of it

//
// Sample program to calculate the value of a deposit
// after a year of earning interest.
// CSCI 1011 Lab 3

  1. It then should show a welcome message
  2. It then prompts the user to enter an initial deposit amount
  3. It reads the initial deposit value and assigns it into a double variable.
  4. Program then updates the new value of balance by using the following formula:

balance = balance + (balance * 0.049);

  1. Then the program will show a message like:

With a 4.9% APR your deposit will be worth $Y in one year.”

  1. Instead of Y you must show the value of balance variable.
  2. Run the program and test it with sample input. Do this several times.
  3. Modify the program so it uses a named constant in place of 0.049.
  4. Run the program and test it to see if it gives the same values.
  5. Modify the interest rate to 0.059.
  6. Run the program again and test it to see the values it gives have changed.
  7. Did you change the output so it now says 5.9%? If not make that change and run the program again.
  8. Since it would be easier not to have to change the program in two places, declare a new double variable called percent and set its value to 100 times the interest rate.
  9. Modify your output statement so it uses the percent variable instead of 5.9.
  10. Run the program again and test it to make sure it still works properly.
  11. Add some additional statements to compute what the balance will be after a second year of earning interest and display this result along with the original result.
  12. Run the program again and test it to make sure that the new code works.
  13. Here is an output of the program:

Welcome to (your name)’s interest calculator

Please enter your initial deposit amount:

10

With a 5.8999999999999995% APR your deposit will be worth $10.59 in one year.

With a 5.8999999999999995% APR your deposit will be worth $11.21481 in two years.

  1. Upload the file yourlastnameLab3.java to the drop box folder labeled Lab 3.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please write a 1000 words essay on the following and refer to the four attachmnets provided. 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

create a tikz graphs based on attached pictures

create a tikz based on attached pictures.

 Make sure all the content is in one tikzpicture environment.  Do
         not create more than one tikzpicture environment.
         b. Do not use section heading (section{…}) for any text.

1.a: The black words and red words in the green box should be aligned:
         one red symbol under each word, you can use a tabular environment for
         this.  Same for the last box with black and blue text.
        .

1.b:  The three boxes in the bottom row should still be aligned in one row.

2: The “axis labels” (search/discover/structured data/etc) should be
         where they are in the original picture.  And the labels should be in
         one node (Search (goal-oriented) in one node, Discover (opportunistic)
         in another node, etc)

discussion question 1

Please respond to the following:

  • According to the textbook, one of the toughest problems in investigating systems requirements is ensuring that they are complete and comprehensive. Imagine that you are a systems analyst. Decide the primary way in which you would ensure that you secure the necessary information during an interview session with a client.
  • Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.

Develop a disaster recovery plan using ISO 27031 or ISO 24762 template

 Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements: 100% original content

  • Be approximately 4 to 6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.