presentaion3

  

1. Create a presentation PowerPoint and record yourself on at least one application for dynamic programming. Make sure to give specific details of the algorithm and analyze the worst case time complexity. 4 slide excluding introduction. Give every details in powerpoint and as well as in note section.

Carhacking

 

Unit 3 DB: Carhacking

The Internet of Things includes connecting modern automobiles to networks. Many manufacturers give car owners an application to control the car from their smartphone. You can start your car to warm it up on a cold winter day or turn on the A/C before you get into it in the middle of summer. Research a new car model, and describe the software features an owner will have that control the car. Would you buy this car knowing that network communications can be easily intercepted? Why or why not?

Week 9 Assignment

 

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

 

  1. Understand the applications of prescriptive analytics techniques in combination with reporting and predictive analytics
  2. Understand the basic concepts of analytical decision modeling
  3. Understand the concepts of analytical models for selected decision problems, including linear programming and simulation models for decision support

Excel_3G_Department_Expenses_AS | Excel_3G_Administration_as

 

#Excel_3G_Department_Expenses_AS

 #Excel 3G Department Expenses_AS 

 #Excel_3G_Administration_as

Project Description:

In the following project, you will edit a worksheet that will be used  to summarize the departmental administration expenses for the City of  Orange Blossom Beach.

Open   the Excel workbook Student_Excel_3G_Administration_as.xlsx   downloaded with   this project.

In the Expenses worksheet, use   the SUM function to calculate row  totals for each Expense item in the range   F5:F9. Format F6:F9 with  Comma Style, zero decimal places. Calculate column   totals (using SUM)  for each quarter and for the Annual Total in the range   B10:F10.

In cell G5, construct a formula   to calculate the Percent of Total  by dividing the Annual Total for City   Manager by the Annual Total for  Totals by Quarter. Use absolute cell   references as necessary, format  the result in Percent Style, and then Center.   Fill the formula down  through cell G9.

Create a 3-D Pie chart to chart   the Annual Total for each item  using the ranges A5:A9 and F5:F9. Move the   chart to a new sheet and  then name the sheet Administration Costs Chart.

For the chart title, type Summary of   Administration Costs    and format the chart title using a WordArt Style—in the first row,  the second   style. Change the chart title font size to 28.

Remove the Legend from the chart   and then add Data Labels formatted  so that only the Category Name and   Percentage display positioned in  the Center. Change the data labels Font Size   to 12, and apply Bold and  Italic.

Format the Data Series using a   3-D Format effect. Change the Top  bevel and Bottom bevel to the first bevel   in the first row. Set the  Top bevel Width and Height to 50 pt and then set the Bottom   bevel Width and Height to 256 pt. Change the Material to the fourth Standard Effect—Metal.

Display the Series Options, and   then set the Angle of first slice  to 140 so that the City Manager slice is in   the front of the pie.  Select the City Manager slice, and then explode the   slice 10%. Change  the Fill Color of the City Manager slice to a Solid fill—in   the fifth  column, the fourth color.

Format the Chart Area by   applying a Gradient fill using the Preset  gradients–in the fourth column,   the first color. Format the Border of  the Chart Area by adding a Solid line   border–in the eighth column,  the first color. Change the border Width to 5   pt.

Display the Page Setup dialog   box, and then for this chart sheet,  insert a custom footer in the left   section with the File Name element.

Display the Expenses worksheet,   and then by using the Quarter names  and the Totals by Quarter, insert a Line   with Markers chart in the  worksheet. Move the chart so that its upper left   corner is positioned  slightly inside the upper left corner of cell B12. Type Annual   Administration Expenses by Quarter as the Chart Title.

Format the Bounds of the   Vertical (Value) Axis so that the Minimum is 1085000 and the Major unit is at 10000.  Format the Fill of the Chart   Area with a Gradient fill by applying  the Preset gradient—in the first row,   the third gradient. Format the  Plot Area with a Solid fill using White,   Background 1—in the first  column, the first color.

Copy the Annual Total in cell   F10 and then use Paste Special to  paste Values & Number Formatting in   cell B35. In cell C35,  construct a formula to calculate the Projected   Expenses after the  forecasted increase of 3.5% in cell B31 is applied. Fill   the formula  through cell F35, and then use Format Painter to copy the   formatting  from cell B35 to the range C35:F35.

Change the Orientation of this   worksheet to Landscape, and then use  the Scale to Fit options to fit the   Height to 1 page. From the Page  Setup dialog box, center the worksheet   Horizontally, and insert a  custom footer in the left section with the File   Name element.

Display the Contracts worksheet.   Using the data in A5:B7, insert a  Funnel Chart. Move the chart so that the   upper left corner aligns with  the upper left corner of D1. Change the chart   title to Contract Analysis  and then change the Height to 2 and the Width to 4. Make cell A1   the  active cell. Change the Orientation to Landscape, center the worksheet,    and insert a footer with the file name in the left section.

Display the County Partnerships   worksheet. Select the range A4:B8  and then insert a Filled Map chart map.   Change the Width to 4 and then  move the chart so that its upper left corner   aligns with the upper  left corner of D1. For the chart title, type Partnership   Analysis  and   then make cell A1 the active cell. Change the worksheet  Orientation to   Landscape. From the Page Setup dialog box, center this  worksheet   Horizontally, and insert a custom footer in the left section  with the File   Name element.

project2

please read all the attached instructions. The template for the project is attached

The techinical writting

 Using the information and format you obtained from the URLs provided, write a progress report about the technical report you are writing. 

A progress report is an important document given to administrators, supervisors or instructors to update the status of a project.  This report will summarize the progress that has been made to date, issues that have been solved, issues that are yet to be solved, items that need to be completed and a time table when various important features of the project will be completed.

Use the resources below for the requirements to correctly complete the assignment.

Handbook of Technical Writing; page 402

https://piktochart.com/blog/progress-report/

https://www.e-education.psu.edu/styleforstudents/c6_p10.html

https://academichelp.net/business-writing-help/write-progress-report.html

Policy, Legal, Ethics, & Cmplc week 15

  

Week 15 Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace. Write in  format not in bulleted, numbered or other list format. . Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.    It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better.  

Fundamentals of Database Management Project Final Report

Build a database with APEX based on the logical design result from Part 1; and
create and run several SQL queries on the data stored in the database. In addition, you are also
required to create an APEX application that showcase the database and data stored in it.  

Submission Date is 11/06/2021

Enterprise Key Management

  

Enterprise Key Management

As a security architect and cryptography specialist for Superior Health Care, you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted.

You’re also expected to understand health care regulations and guidelines because you’re responsible for advising the chief information security officer, or CISO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA.

You also have a team of security engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives.

This week, the CISO calls you into his office to let you know about the company’s latest initiative.

“We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration,” he says.

The CISO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations.

The plan will help create an enterprise key management system.

The SEs would be responsible for the implementation, operation, and maintenance of the plan and system.

The CISO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training.

The new web-based system needs to be running in a month. So, you’ll have a week to put together your enterprise key management plan and the accompanying policy.

Close

Project 1: Enterprise Key Management
Start Here

Transcript

In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts.

Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations.

The following are the deliverables for this project:

Deliverables

  1. Enterprise Key Management Plan: An      eight- to 10-page double-spaced Word document with citations in APA      format. The page count does not include figures, diagrams, tables, or      citations.
  2. Enterprise Key Management Policy: A      two- to three-page double-spaced Word document.
  3. Lab Report: A      Word document sharing your lab experience along with screenshots.

There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, and then continue to Step 1, “Identify Components of Key Management.”

Project 1: Enterprise Key Management
Step 1: Identify Components of Key Management

Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem.

Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care.

Review these authentication resources to learn about authentication and the characteristics of key management.

Provide a high-level, top-layer network view (diagram) of the systems in Superior Health Care. The diagram can be a bubble chart or Visio drawing of a simple network diagram with servers. Conduct independent research to identify a suitable network diagram.

Read these resources on data at rest, data in use, and data in motion.

Identify data at rest, data in use, and data in motion as it could apply to your organization. Start by focusing on where data are stored and how data are accessed.

Review these resources on insecure handling and identify areas where insecure handling may be a concern for your organization.

Incorporate this information in your key management plan.

In the next step, you will consider key management capabilities.

Step 2: Learn Key Management Capabilities

You have successfully examined the major components of an enterprise key management system for Superior Health Care. Enter Workspace and complete the “Enterprise Key Management” exercise. Conduct independent research on public key infrastructure as it applies to your organization.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC Virtual Labs Support
  • Customer Type: Student (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber (CST/DFC/CBR/CYB)
  • SubType Detail: Pick the category that best fits the issue you are      experiencing
  • Email: The email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

In the next step, you will identify the key management gaps, risks, solutions, and challenges found in corporations.

Professionals in the Field

Being able to interact with a variety of stakeholders is a skill set on which you will want to evaluate yourself and improve where necessary so that you can present that skill on paper and in person. 

As an example, consider the range of stakeholders in a health care setting: medical techs, doctors, data entry clerks, office and hospital administrators. Now consider the three technical domains that are interlinked in this setting: cybersecurity needs, the practice of medicine, and the legal requirements of HIPAA. 

Hypothetically, which of these audiences might you need to talk to before, during, and after your team of SEs implements your p

Step 3: Identify Key Management Gaps, Risks, Solutions, and Challenges

In a previous step, you identified the key components of an enterprise key management system. In this step, you will conduct independent research on key management issues in existing organizations. You will use this research to help identify gaps in key management, in each of the key management areas within Superior Health Care.

Conduct independent research to identify typical gaps in key management within organizations. Incorporate and cite actual findings within your key management plan. If unable to find data on real organizations, use authoritative material discussing typical gaps.

Identify crypto attacks and other risks to the cryptographic systems posed by these gaps. Read these resources to brush up on your understanding of crypto attacks.

Propose solutions organizations may use to address these gaps and identify necessary components of these solutions.

Finally, identify challenges, including remedies, other organizations have faced in implementing a key management system.

Include this information in your enterprise key management plan.

Provide a summary table of the information within your key management plan.

Incorporate this information in your implementation plan.

In the next step, you will provide additional ideas for the chief information security officer (CISO) to consider.

Step 4: Provide Additional Considerations for the CISO

You have satisfactorily identified key management gaps. Incorporate these additional objectives of an enterprise key management system as you compile information for the CISO.

  1. Explain the      uses of encryption and the benefits of securing communications by hash      functions and other types of encryption. When discussing encryption, be      sure to evaluate and assess whether or not to incorporate file encryption,      full disc encryption, and partition encryption. Discuss the benefits of      using triple DES or other encryption technologies. To complete this task,      review the following resources:
    1. uses of encryption
    2. types of encryption
    3. hash functions
  2. Describe the      use and purpose of hashes and digital signatures in providing message      authentication and integrity. Review these resources on authentication to      further your understanding. Focus on resources pertaining to message      authentication.
  3. Review the      resources related to cryptanalysis. Explain the      use of cryptography and cryptanalysis in data confidentiality.      Cryptanalysts are a very technical and specialized workforce. Your      organization already has a workforce of security engineers (SEs).      Cryptanalysts could be added to support part of the operation and      maintenance functions of the enterprise key management system. Conduct      research on the need, cost, and benefits of adding cryptanalysts to the      organization’s workforce. Determine if it will be more effective to      develop the SEs to perform these tasks. Discuss alternative ways for      obtaining cryptanalysis if the organization chooses not to maintain this new      skilled community in-house.
  4. Research and      explain the concepts and practices commonly used for data confidentiality:      the private and public key protocol for authentication, public key      infrastructure (PKI), the X.509 cryptography standard, and PKI security.      Read about the following cryptography and identity management      concepts: public key infrastructure and      the X.509 cryptography standard.

Keep in mind that sometimes it takes considerable evidence and research for organizational leaders to buy in and provide resources.

Incorporate this information in your implementation plan.

In the next step, you will provide information on different cryptographic systems for the CISO.

Step 5: Analyze Cryptographic Systems

In the previous step, you covered aspects of cryptographic methods. In this step, you will recommend cryptographic systems that your organization should consider procuring.

Independently research commercially available enterprise key management system products, discuss at least two systems, and recommend a system for Superior Health Care.

Describe the cryptographic system, its effectiveness, and its efficiencies.

Provide an analysis of the trade-offs of different cryptographic systems.

Review and include information learned from conducting independent research on the following topics:

  • security index rating
  • level of complexity
  • availability or utilization of      system resources

Include information on the possible complexity and expense of implementing and operating various cryptographic ciphers. Check out these resources on ciphers to familiarize yourself with the topic.

Incorporate this information in your implementation plan.

In the next step, you will begin final work on the enterprise key management plan.

The following exercise, Introduction to Cryptographic Tools, is to introduce you to or help you better understand some basic cryptographic concepts and tools for both encryption and decryption processes.

Complete This Lab

Resources

Lab Instructions

Getting Help

To obtain lab assistance, fill out the support request form.

Make sure you fill out the fields on the form as shown below:

  • Case Type: UMGC      Virtual Labs Support
  • Customer Type: Student      (Note: faculty should choose Staff/Faculty)
  • SubType: ELM-Cyber      (CST/DFC/CBR/CYB)
  • SubType Detail: Pick      the category that best fits the issue you are experiencing
  • Email: The      email that you currently use for classroom communications

In the form’s description box, provide information about the issue. Include details such as steps taken, system responses, and add screenshots or supporting documents.

Step 6: Develop the Enterprise Key Management Plan

In the previous steps, you gathered information about systems used elsewhere. Using the materials produced in those steps, develop your Enterprise Key Management Plan for implementation, operation, and maintenance of the new system. Address these as separate sections in the plan.

In this plan, you will identify the key components, the possible solutions, the risks, and benefits comparisons of each solution, and proposed mitigations to the risks. These, too, should be considered as a separate section or could be integrated within the implementation, operation, and maintenance sections.

A possible outline could be:

  • Introduction
  • Purpose
  • Key Components
  • Implementation
  • Operation
  • Maintenance
  • Benefits and Risks
  • Summary/Conclusion

The following are the deliverables for this segment of the project:

Deliverables

· Enterprise Key Management Plan: An eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

· Lab Report: A Word document sharing your lab experience along with screenshots.

Submit your deliverables to the Assignments folder in the final step of the project.

Step 7: Develop the Enterprise Key Management Policy

The final step in this project requires you to use the information from the previous steps to develop the Enterprise Key Management Policy. The policy governs the processes, procedures, rules of behavior, and training for users and administrators of the enterprise key management system.

Research similar policy documents used by other organizations and adapt an appropriate example to create your policy.

Review and discuss the following within the policy:

Discuss different scenarios and hypothetical situations. For example, the policy could require that when employees leave the company, their digital certificates must be revoked within 24 hours. Another could require that employees must receive initial and annual security training.

Include at least three scenarios and provide policy standards, guidance, and procedures that would be invoked by the enterprise key management policy. Each statement should be short and should define what someone would have to do to comply with the policy.

The following is the deliverable for this segment of the project:

Deliverables

· Enterprise Key Management Policy: A two- to three-page double-spaced Word document.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.

· 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.

· 1.4: Tailor communications to the audience.

· 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

· 2.2: Locate and access sufficient information to investigate the issue or problem.

· 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

· 2.4: Consider and analyze information in context to the issue or problem.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 5.1: Knowledge of procedures, tools, and applications used to keep data or information secure, including public key infrastructure, point-to-point encryption, and smart cards.

· 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.

· 7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost