Define Group Potency and importance.
Practical Connection
This project requires you to write at 3-5 page APA formatted research paper. The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper will be submitted during the last week of the course.
CSIA
Before you begin read: https://www.energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
Our class focuses on integrating many different aspects of cybersecurity, information security, and information assurance. Recent developments in the field of cybersecurity have resulted in a number of “maturity models” which can be used by external assessors to evaluate the maturity level of an organization’s cybersecurity management program.
For this discussion paper, you will need to research the Department of Energy’s Cybersecurity Maturity Model and then compare it to the NIST Cybersecurity Framework and other frameworks listed in the course readings. After you have done so, write a position paper in which you recommend a cybersecurity framework or maturity model as the basis for assessing the cybersecurity program for Padgett-Beale Financial Services. Assessments will be performed on an annual basis beginning one year after the company launches its new operations.
Your 5-7 paragraph position paper must answer the following questions (at a minimum). (You will need to write clearly and concisely to fit all required information into this restricted length.)
- What approach should the organization take in developing the Cybersecurity Management program? (What standards or frameworks should be used?)
- What laws and regulations must be addressed by the Cybersecurity Management Program in a financial services firm?
- What are the best practices that should be put into place to assess the maturity of PBI-FS’s cybersecurity management program?
Post your position paper as a reply to this topic. Remember to cite your sources and place your reference list at the end of your posting.
week 4 individua;
Length: Minimum of 600 words
This assignment should be in APA format and have to include at least two references.
Golang chat server using Go Rpc Package
Requirements of Chat Server Go program:
1. The program must be written in Go.
2. The server should be able to read short messages from clients concurrently (at the same time) and enable other participants to respond quickly. The communication should be similar to that of a spoken conversation, unlike apps such as those for forums and email.
3. Let multiple people talk at the same time on the Chat server.
4. Anything said is seen by everyone unless the sender specifies that the message is a PM (private message) and names the receiver.
5. Make the chat app extensible. To add more features we should be able to implement and export a server-side method and write a client stub which calls the exported method over RPC.
6. Test your program to see that the Request and Reply, and the PM work. Use the Go Testing program for doing this.
7. User Requests should include a Request to join the Chat Room, get and display unseen messages including PM.
8. Use the Go RPC package for implementing remote procedure calls in Go including the implementation of a client-server interface with the server by the client.
9. Register the program with an HTTP handler in the RPC package and turn the terminal program into a Web Service that handles HTTP requests through a TCP Listener. See HandleHTTP and DialHTTP in Go RPC package.
Submit the Go source code, a ReadME file with the compile and run options that you use, and submit a file containing the sequence of input strings that you use as client messages to the Chat server. Zip the files submitted into one .zip file using 7-zip.
python Coding
For this lab, and every lab: comment your code. If you use/adapt code from the internet, you must add a comment with the source of the code.
Reading: Chapter 3 https://automatetheboringstuff.com/2e/chapter3/
Activity – Python Tutor: Try at least one program in Python Tutor http://www.pythontutor.com/
Question 1: Greetings Function! (4 points)
Start with the greeting program, the first program with functions we used in Python Tutor. This time, the computer is very happy to meet you. Modify the function to return the user’s name in uppercase, with !!!! after it. So, if the user’s name is Miriam, the greeting function will return ‘HELLO MIRIAM!!!!’
Question 2: Quiz question function (6 points)
Write a function that takes two arguments – a quiz question and the correct answer.
In your function, you will print the question, and ask the user for the answer. If the user gets the answer correct, print a success message. Else, print a message with the correct answer. Your function does not need to return anything.
Call your function with two example quiz questions. Here’s some suggestions,
- Q: What year did Apollo 11 land on the moon? A: 1969
- Q: Who painted the Mona Lisa? A: Leonardo da Vinci
Question 3: Windows 10 Upgrade (10 points)
When installing Windows 10, a user can either wipe everything from their computer and do a clean install. Or if their computer meets system requirements, the user can upgrade to Windows 10 without erasing their current operating system.
To do the upgrade, according to Microsoft, a computer needs to have at least 1GB of memory, and at least 1GHz processor, and either Windows 7 or Windows 8 currently installed. All three requirements must be met.
Write a program that asks the user for
- The current memory in their computer, in GB. (For example, a user with 8GB of memory would enter 8)
- The current processor speed, in GHz. (For example, a user with a 2.6GHz processor should enter 2.6)
- The name of their current operating system. (For example, a user could enter Windows 8 or Windows 7 or Windows XP)
Write a can_upgrade function that takes three arguments, the amount of memory, the processor speed, and current operating system.
In can_upgrade, use conditions to figure out if the user’s computer can be upgraded to Windows 10 or not. Your function should return one of the Boolean values True (if the computer can be upgraded) or False (if it can’t be upgraded).
Call your can_upgrade function from main(), and use the return value to print a message to the user telling them if they can, or can’t, upgrade.
Extra Credit Question: (+5 points)
Start with the College ID card program from https://gist.github.com/claraj/b993219477d015d58341c4f3c1950a22. This has no functions but it would benefit from being re-organized into functions. Refactor this program. Suggestions – functions for validation, functions to help print the college ID card, for example printing a line of —-, printing centered text, printing text in color.
assignment
CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS
This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios:
THE SUBJECT: Texas Department of Criminal Justice
Scenario A: A pro-capital punishment (local/national) newspaper reporting on the milestone of the 500th execution (pretend it is 2013, there have now been more than 500)
Scenario B: Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations
Scenario C: A campaign group looking to influence the debate about the ending of capital punishment
Website reference: Executed Offenders dataset
Assignment Link: http://book.visualisingdata.com/chapter/chapter-3
Assignment Length (word count): At least 500 words (not including direct quotes).
References: At least three peer-reviewed, scholarly journal references.
HIPAA Compliance Planning
Assignment Content
- Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.
Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:
- A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
- An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
- An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
- Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur.
Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide
- Accurate information on the HIPAA requirements for securing PHI
- FISMA and HIPAA requirements for a security plan
- Scope of the work you will perform to meet the Health Coverage Associates’ requests
- Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.
Write a 1- to 2-page concise outline of the contents of the security management plan. Include
- Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
- The recommended risk management framework Health Coverage Associates should adopt
- Key elements Health Coverage Associates should include in its plan of actions and milestones
- Cite all sources using APA guidelines.
Wroting parposal
Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question.
Brevity and being concise are important as this analysis is intended to be a brief summation of the research.
Each abstract must therefore consist of the following in this order:
1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
2. Author Qualifications – name and qualification of each author conducting the research
3. Research Concern – one paragraph summary of the reason for the overall research topic