If you can do an assignment with coding & more later please contact
Identifying Threats and Vulnerabilities in an IT Infrastructure
Risk Management Fundamentals Lab #1: Identifying Threats and Vulnerabilities in an IT Infrastructure
Critical infrastructure vulnerability assessments are the foundation of the National Infrastructure Protection Plan’s risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards post-event situation.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
rewrite my stor
base on my story (attached file below)
Rewrite your story for clarity/structure/grammar/etc. Also make sure you address any issues we discussed in the storytelling lecture.
Make the stories more fun to read. If there is anything about a story that is boring or confusing, rewrite it. This may include unnecessary or missing scenes, too many characters, tedious or confusing parts, etc. Additionally, point out any issues of clarity (all the material covered in the clarity lectures). Point out any grammar issues you notice too, but don’t focus on them.
Do not change the main idea of the story.
Tips:
The story is their story, not yours:
+ the story is definitely not about the interview process
+ the story probably doesn’t even involve you
Stories can take place over a lifetime, but cant be the same as describing the lifetime (think of history class)
Stories should let us understand the characters
+Give them a voice, don’t just describe what happened to them
Dont end the story with a moral lesson: it doesn’t feel like real things happing to real people.
computer information
Module 2: Portfolio Project Job Title Submission
You will start the portfolio project process by documenting the job title or career that you will explore in your brochure and an explanation of at least 40 words discussing why the selection appeals to you. Submit this assignment in Blackboard. choose, Nursing or manager job
Module 3: Annotated Bibliography
You will be required to submit an annotated bibliography for four (4) separate articles or resources. The annotated bibliography is comprised of an APA citation, a summary of the resource, and your evaluation of the credibility of the source. Please refer to the specific instructions and example provided below for more information on writing Annotated Bibliographies. Double-click the icons below to see the examples.
Module 5: Brochure Content Outline
You will create an outline that applies the research from your annotated bibliographies. In the outline you will illustrate your main topic sentence and bullet points for each of your 3 content paragraph topics, outline which source or sources you’ll cite to give information about that topic, and include a reference page. See the content outline by double-clicking below for an example.
Module 6: Rough Draft Submission
You will submit the rough draft of your three (3) career development brochure panels. Once submitted, you will receive feedback from your instructor so you can revise your work for your final submission in Module 7.
Module 7: Final Submission to ePortfolio
You will submit the final draft of your three (3) career development content paragraphs, including any edits or feedback supplied by the instructor on the Module 6 draft submission.
Module 2: Portfolio Project Job Title Submission
You will start the portfolio project process by documenting the job title or career that you will explore in your brochure and an explanation of at least 40 words discussing why the selection appeals to you. Submit this assignment in Blackboard.
Module 3: Annotated Bibliography
You will be required to submit an annotated bibliography for four (4) separate articles or resources. The annotated bibliography is comprised of an APA citation, a summary of the resource, and your evaluation of the credibility of the source. Please refer to the specific instructions and example provided below for more information on writing Annotated Bibliographies. Double-click the icons below to see the examples.
Module 5: Brochure Content Outline
You will create an outline that applies the research from your annotated bibliographies. In the outline you will illustrate your main topic sentence and bullet points for each of your 3 content paragraph topics, outline which source or sources you’ll cite to give information about that topic, and include a reference page. See the content outline by double-clicking below for an example.
Module 6: Rough Draft Submission
You will submit the rough draft of your three (3) career development brochure panels. Once submitted, you will receive feedback from your instructor so you can revise your work for your final submission in Module 7.
Module 7: Final Submission to ePortfolio
You will submit the final draft of your three (3) career development content paragraphs, including any edits or feedback supplied by the instructor on the Module 6 draft submission.
Querries
1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).
2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence? Why or why not? (300 Word)
Hypothetical Situaton
Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Cloud Computing Discussion 6
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. DO not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Risk Management in a Business Model
Learning Objectives and Outcomes
- Create a report documenting various aspects of how risk management impacts the business model.
Scenario
You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.
You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements.
Assignment Requirements
Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.
Submission Requirements
- Format: Microsoft Word
- Font: Times New Roman, 12-Point, Double-Space
- Citation Style: Your school’s preferred style guide
- Length: 2–3 pages
Incident Detection 2.0
select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.
Please respond to the following in a post of 100 words:
- Distinguish between incident detection precursors and incident detection indicators.
- For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.
Assignment 5
You shall write a C++ program that:
- Reads an arbitrary number of whitespace-delimited tokens from standard input.
- Determines and prints (to standard output) two decimal integer values:
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
/srv/datasets/scrabble-hybrid
. - The total number of points that all those words would be worth in Scrabble, according to the letter values in
/srv/datasets/scrabble-letter-values
.
- The number of input tokens that are valid Scrabble words (case-insensitive), i.e. those that can be found in
Specific Requirements
- You may assume that the number of valid words and the total number of points will not exceed the range of an unsigned 64-bit integer.
- Open and read the contents of each relevant data file exactly once.
- Make sure to use STL components that will avoid any gross inefficiencies (excessive computation and/or storage) in your program. Your program should at least be able to process each of the example inputs below in no more than 5 seconds, on our server.
- Print the two integer values in the order specified above, and make sure your output contains no other numeric decimal values. Otherwise, the format of output is up to you.
Sample Executable and Expected Output
A sample executable named cs19_scrabble_total
is available on the server, which demonstrates expected behavior of your program, e.g.:
$ cs19_scrabble_total <<< 'spinnaker'
1 word worth 15 points
$ cs19_scrabble_total < /srv/datasets/many-english-words.txt
519135 words worth 7566688 points
$ cs19_scrabble_total < /srv/datasets/shakespeare-othello.txt
17531 words worth 105915 points
$ cs19_scrabble_total < /srv/datasets/king-james.txt
650865 words worth 4305807 points