password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

Monte Carlo Method

 

Assignment Content

  1. The organization you chose in Week 1 is hosting a National Convention for all the executive staff members from all 25 international locations next week. 

    The CIO requests your team of Risk Management Analyst to create and deliver the presentation on the topic, “Deterministic versus Probabilistic Risk in IT Risk Management.” As the representative of your team, you will create and deliver the presentation with an Executive Summary at one of the Executive Round Table Meetings at the convention. Additionally, the CIO stressed you use creativity to make the presentation as interesting as possible.

    Research information about your chosen organization to complete this week’s assignment.

    Part A:
    Create a media-rich, 10-slide (does not include title or reference pages) Microsoft® PowerPoint®  (with Speaker Notes) presentation. Include the following:

    • Monte Carlo planning analyses
    • Building and running Monte Carlo models
    • The deterministic risk assessment method 
    • The probabilistic risk assessment method 
    • How does the NIST risk management framework 3-tiers ensure information security (NIST SP 800-53, revision 4)? 
    • How are data and information systems categorized? 
    • Do not use research quotes or acronyms. You must use your own words.
    • Part B: 
      Create a 1- to 2-page(does not include title or reference pages) Microsoft® Word Executive Summary on this presentation. Include the following:
    • Goals and objectives of the presentation in summary form
    • Adequate references to support your findings, information, and opinions
    • Note: Media-rich presentations should include multimedia such as graphics, charts, pictures, drawings, video clips, or audio.

      Include APA-formatted citations when necessary.

       

Swift Programming

**The programming needs to be done in Swift language. . The program is about implementing an app that shows the biography of each character of the game.**

IT206 Design and analysis of Algorithms

Assignment Question :   Design and write an algorithm to find all the common elements in two sorted lists of numbers. For example, for the lists 2, 5, 5, 5 and 2, 2, 3, 5, 5, 7, the output should be 2, 5, 5. What is the maximum number of comparisons your algorithm makes if the lengths of the two given lists are m and n, respectively?

Organ Leader and Decision Making

 After completing the reading this week, we reflect on a few key concepts this week:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Access control discussion 7

Discuss how human nature affects Access Control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.

cloud computing

What is one significant data breach through the cloud that has occurred in the field you are interested in?  How was this breach launched, what was lost and how could that breach have been prevented? Minimum 700 words

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

 In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format.