Cloud Computing Discussion 10

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Standalone quotes will not count toward the 3 required quotes.

Research Paper on 2019 Georgia Cyberattacks

  2019 Georgia Cyberattacks

You are assigned with the task of writing a 1500-2000 word critical analysis academic paper on the incident response and disaster recovery of a specific cybersecurity incident. You will find your assigned cyberattack/breach in the list below. Your paper must analyze how the targeted/victim organization detected, responded to, and recovered from the attack. Your paper must include the following:

1. It must be 1500-2000 words not including the references (you will lose marks if you exceed or fail to meet the wordcount by). 

2. It must be an original work of your own research and writing skills, free of plagiarism. 

3. It must be in the ieee format with correct citations and references. 

4. It must be written in professional academic language free of colloquialisms but also written so that a reader with an unknown level of knowledge (such as a C level executive, a board member, or manager) can understand your meaning, argument, and purpose. 

5. You must use reliable sources. i.e. Trusted verifiable web resources (i.e. legitimate websites, news resources, white papers, peer reviewed works such as books, conference papers, reports journal articles, etc) NOT Wikipedia or personal blogs. 

6. Your paper must have an introduction with a clearly stated thesis (an argument statement that tells the reader the point you will make. For example, XYZ company’s response to the ABC cyberattack was poorly managed due to a lack of communication or 123 Corp prevented severe financial losses due to their incident response handling). The introduction is the roadmap/outline to your paper. Following the introduction there must be a body containing the history of the attack/breach and an analysis of the incident that supports and proves your thesis. Lastly, you must write a conclusion that states how you have proven your argument and why it matters to Contingency Planning (IRP, BCP, DRP). The written part of the paper must be followed by a properly formatted list of references.

extra credit

Prepare a 500 word APA style paper about plagiarism. In the paper be sure to (1) define plagiarism, (2) address why it is unethical, (3) discuss the four different types of plagiarism, and (4) discuss how proper research approaches and documentation styles prevent a student from plagiarizing. Use at least 2 sources in this paper (and please be sure to cite them in the paper). Include an introduction and conclusion and follow the writing guidelines for this course.

truncatabel prime

  

Assignment 4: Truncatable Primes

Background

A left-truncatable prime number is one where the numbers resulting from removing the left-most digits are also prime. For instance, the number 9137 is a left-truncatable prime since 9137, 137, 37 and 7 are all prime.

A right-truncatable prime number is similarly defined, but removes a digit from the right. For example, 31193 is a right-truncatable prime since 31193, 3119, 311, 31, 3 are all prime.

A truncatable prime, also known as a two-sided prime, is one that is both left-truncatable and right-truncatable simultaneously. An example of such a prime is 3797.

We will be writing a program to explore these truncatable primes.

As a side note, the property of truncatable is dependent upon the base that the number is represented in. For this program, only worry about base 10.

Analysis

First note that the property of truncatability always produces a chain of numbers that terminate in single digit prime numbers. Therefore we can identify prime numbers by starting at the end of that chain and build numbers by adding digits. That is, we should be able to identify 3797 as a truncatable prime by building it from the right as in 7, 97, 797, then 3797, all the while verifying each step is left-truncatable.

Next note that when building from the right, we can only add odd digits. If we were to add a 0, 2, 4, 6, or 8, the resulting number would be divisible by 2 and thus not prime.

Finally, all of the single digit prime numbers are 2, 3, 5, and 7. These form the basis of our search.

Approach

Based upon the analysis above, we can find truncatable primes by building primes that are right-truncatable by construction, and verify they are left truncatable as we go. This suggest the following recursive algorithm

Build Truncatable Primes(int start)

if (start is not prime)

return

if (start is left truncatable)

found one. print it out

Build Truncatable Primes (start * 10 + 1)

Build Truncatable Primes (start * 10 + 3)

Build Truncatable Primes (start * 10 + 7)

Build Truncatable Primes (start * 10 + 9)

For left-truncatable, consider testing the number 12345. We know that we need to check 12345, 2345, 345, 45, and 5. But since all must be prime, the order they are tested in does not matter. In particular, we can check them in the order 5, 45, 345, 2345, 12345. What is nice about that order is we can get those digits by modding by successive powers of 10. Therefore you can use a loop that starts at 10, and updates by multiplying by 10.

Tips

· Start by writing an is_prime function.

· Next write an is_left_truncatable function.

· Using the modulus operator with powers of 10 can cut off digits from the left side.

· Write the algorithm specified above.

· Start the algorithm with all possible single digit prime numbers.

Sample Output

The truncatable primes are:

2

23

3

313

3137

317

37

373

3797

5

53

7

73

739397

797

dba must be aware of when moving to the cloud.

 

Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

2 D.B and 1 Assignment

 I have one Assignment ( Data Mining ) + one Discussion Board (Professional Issue)

–  ( I already have answers for these but I need from you to change some sentences and method and way of answers to be ZERO plagiarism , The answers with me ( Common Answers with all Students ), Please I need full mark .. ( High Quality ) .. not change the answer because the answer is correct .. just change the way for writing … by add some sentence and change some sentences.. 

Also, I have also   Discussion Board ( Network Management ) ,, But I need from you to answer it.