help3

if you are not an expert on the topic don’t bid.

further guidelines will be provided on chat.

see file attached.

Discussion

Please search the internet for an answer to the following question.

  • Why did Cisco Systems transition from standalone access control systems to IP networked systems?
  • What challenges did Cisco face in order to solve the physical security problems?

SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.

Discussion (300 words)

DESCRIBE IN LAYMAN’S TERMS, WHAT DIFFERENTIATES POSITION Software Developer Engineer in Test(SDET) FROM OTHER RELATED POSITIONS THAT DO NOT REQUIRE A BACHELOR’S DEGREE

Also few words on training (INSERT DESCRIPTION OF TRAINING) that requires for role like Java, SQL, Cloud knowledge.

C programming

 

0) Random number generation. (50 pts)

Often, computer scientists, statisticians, physicists, social scientists, and mathematicians need a list of random numbers. Political pundits also find lists of random numbers useful to provide ‘statistical’ evidence of their arguments.

Implement a tool to generate and print a sequence of 10 random numbers.  Each random number should be an integer in the range from

0 to 100, inclusive (that means both 0 and 100 should have a chance of appearing). I do not expect you to implement your own random number generator. I expect you to use the standard way of obtaining randomness in a secure fashion.

$ ./grand

56 77 91 2 33 40 72 100 6 2

Augment your program to take a command line parameter specifying how many random numbers to generate. That is, if grand is invoked by:

$ ./grand 4

it will output 4 random numbers from 0 to 100, inclusive. Make sure your program does something sensible if the supplied argument is not a valid integer. There should not be an arbitrarily imposed upper limit to this number (in other words, do not have an artificial cap on the value of the argument).

Since it is easy to forget how to use programs, it is often useful to provide a well-known command line switch (or parameter) that tells the user how to invoke the program. Augment your program to recognize two more command line arguments, ‘-h’ and ‘–help’ that prints out the usage information for the program. For example,

$ grand -h

and

$ grand –help

should output the following usage information:

grand [-h | –help]       : output this usage message.

grand [n]                 : print out n random integers in [0,100]

Finally, augment your program to print out its version. Don’t forget to add this usage case to your help dialog.

$ grand –version OR -v

grand-0.0.3

1) Functions and Recursion (50 pts)

Experiment with recursion. The Fibannaci sequence is a famous naturally recursive series of numbers whose ratio approaches the Golden Ratio.

f(n) = f(n-1) + f(n-2)

Implement a program named ‘fib’ that uses recursion to calculate and print the first n Fibannaci numbers, where ‘n’ is less than or equal to 30.

Usage:

fib [n]

For example, ‘fib 4’ should output:

fib(0) = 1

fib(1) = 1

fib(2) = 2

fib(3) = 3

fib(4) = 5

Modify your program so that providing the –target or -t option will print only the nth Fibannaci number.

$ ./fib –target 3

fib(3) = 3

Add the ability for your program to calculate the Fibannaci sequence iteratively rather than recursively. Output should not change. If you execute your program with the name ‘ifib’ then it performs the iterative calculation.  If it is executed via ‘rfib’ or ‘fib’ it performs the recursive method of calculating.

$ ./fib –target 3

fib(3) = 3

$ ./ifib –target 3

fib(3) = 3

$ ./rfib –target 3

fib(3) = 3

There is an example of how to accomplish this sort of test of the program name in “C Programming Language, 2nd Edition, by Brian W. Kernighan, Dennis M. Ritchie” textbook. You can search Google for an iterative version of Fibannaci, but be sure to cite where you found it in your README.

Note:

You may want to consider using GNU getopt library for processing command line options.

Eassy(550 Words) APA format – 3 references

Write an essay of at least 550 words discussing discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. 

Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. 

Assignment paper

Review the video below and write a two page review plus cover page and reference page.  The first page of your paper should be a summary of the video.  The second page is an opinion page covering how your company does or should use these best practices.

Disaster Recovery Best Practices(Youtube.com)

https://www.youtube.com/watch?v=V4ae8cqtZHc

discussion-10

 

discuss the scope of a cloud computing audit for your business.

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

IT Project Management Topic

 

Instructions

For this assignment, your group will write an issue paper on a project management topic. The paper has to be APA style, 4-6 pages long, including references.

The paper will provide an intellectual treatment of a Project Management-relevant topic. Specific paper topics will be decided in consultation. Therefore, check with me early to discuss your ideas.

I will provide feedback on one intermediate version of the group project if the group so desires. My assessment and feedback of these versions do not count towards your grade.

My topic is the issues with the Project Management Triad of Scope, Cost, and Time and how it is no longer adequate. Explain what the PM triad is and how it is used in 3 pages. Use one page to briefly explain the issues including issues with the quality of deliverables, issues with customer service, and how it ignores end-user adoption.

ITM Capstone – Discussion 1

Question: 

How can one distinguish between an organizational weakness and a threat to the organization? 

Post should be 250 words. Add at least one reference in APA format.