Analyzing & Visualizing Data

 

According  to Kirk (2019), The essence of “Formulating Your Brief” is to “identify  the context in which your work will be undertaken and then define its  aims: it is the who, what, where, when and how.” It  could be formal or informal as any project you think you must make it.  This phase is where you create a vision for your work.

Reference

Kirk, A. (2019). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Initial Post

Why  is it so important to formulate your brief for a data  presentation? Discuss some ways you would implement to formulate an  effective brief. What are some advantages to your methods? What are some  disadvantages?

vulnerability assessment

 

Your boss wants you to draft a two- to three-page vulnerability process and assessment memorandum addressing the main points of a VM process for Mercury USA. You will cover the main elements of a vulnerability management process, tailored to Mercury USA’s business in the transportation sector, evaluate the OpenVAS scanning tool, and provide recommendations for mitigating the vulnerabilities found within the OpenVAS report.

The third-party pen tester used the free tool Open Vulnerability Assessment Scanner (OpenVAS) to scan Mercury USA’s network. Review the report from the OpenVAS Scan.

As you review the scan, consider some important points from Lesson 5:

  • Priority
  • Difficulty of implementation
  • Communication/change control
  • Inhibitors to remediation
    • MOUs
    • SLAs
    • Business process interruption
    • Degrading functionality

Cybersecurity Issues for Business Travelers

This week, you will “shadow” the head of Resort Operations (RO) at a Travel Security meeting attended by the company’s senior managers and executives. The focus of this meeting will be: Cybersecurity Issues for Business Travelers. The company is particularly concerned about potential identity theft and phishing attacks (including “spear phishing” and “whaling”) that could allow hackers to steal login credentials and other information. One of the outcomes of this meeting will be recommendations for improvements and/or changes to the company’s guidance to employees, managers, and executives regarding use of laptops, cell phones, and other mobile devices to access company email and databases while traveling.  

Resort Operations is involved in this meeting since the majority of employees who travel on company business work for RO. The head of RO, R. Rose Padgett, has asked you to review the Read Ahead package (see below) and then prepare a position paper for her use during this meeting. Since she, like other executives, is very busy, she has asked you to limit this paper to no more than 2 pages and 5 key points. She has also asked that you list and cite the resources used so that she can have a senior staffer can fact check your work. (APA format citations are preferred.)

Note: a “position” paper is used by staff to inform an executive and assist in preparations for meetings with other executives. The position paper should be written in the third person and usually has three parts:

    (a) statement of the issue(s) — clear and concise

    (b) the position to be taken on the issues (intentions, beliefs, attitudes)

    (c) recommendations which restate key points and provide suggested resolutions or actions.

Read Ahead Package

The read ahead package for this meeting includes the following resources:

1. https://www.cisa.gov/sites/default/files/publications/Cybersecurity-While-Traveling-Tip-Sheet-122019-508.pdf

2. https://resources.infosecinstitute.com/30-cybersecurity-tips-for-travelers/#gref

3. https://www.redzonetech.net/blog/13-mobile-device-security-tips-foreign-business-travelers-china/

4. https://www.cnbc.com/2016/09/21/travelers-beware-that-free-charging-station-could-hack-your-phone.html

Organ leader and decision making

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course ORGAN LEADER AND DECISION MAKING have been applied, or could be applied, in a practical manner to your current work environment as software developer.If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

Intro Comp

In this discussion, you are going to explore how digital computing has changed the world. You will select a specific area to research the impacts of digital computing. Feel free to choose something that you find particularly interesting or that relates to your future career goals. Since digital computing has now impacted just about every field, you have a lot of options! Some examples include robotics, agriculture, communication devices, medicine, sports, entertainment, journalism, and criminal justice. Create and share a timeline of milestones and how these milestones have changed the world. Include at least 6 milestones. For each milestone include:

  • a date (might be just a year or might be a specific day)
  • a brief description of the milestone
  • a brief description of the impact it had on society

 Should be a minimum of 300 words and all citations should be in MLA style with a link to allow for easy verification.  You must include at least 2 references. Read the timelines of at least 2 classmates. Research and comment with an additional milestone (date, milestone, impact) for the area they chose.  Include at least 1 reference with MLA citation. Write 2-3 sentences speculating about what the future might hold in the area they chose or share a personal story that relates to the area they chose.

Wk 5 – Apply: Cryptography Knowledge Base Article

Assignment Content

  1. Because of growth within your organization, information and policies are in many locations and often poorly maintained. Your company has decided to start a knowledge base for each department that can be accessed by any employee on the company’s intranet. Your manager is aware of your success at the career fair and security presentation at the high school and has selected you to author the first article from your department on cryptography, encryption, and cryptanalysis. 

    Write 2- to 3-page knowledge base article for your company’s intranet about encryption and cryptanalysis basics. 

    Define cryptography, cryptanalysis, and cryptology. 

    Explain the role and importance of cryptography for your company’s cybersecurity.

    Summarize threats to the company from cryptanalysis. 

    Identify at least 5 specific tools or techniques used in cryptography. Briefly explain each tool or technique you selected, including information like its attributes and the solution it provides.

    Format your references according to APA guidelines.

OPERATING SYSTEM

  

1. On a single-processor system, explain the benefit the better performance of multi-threaded kernel threads over single threaded kernel threads

2. But not parallelism, it is achievable to have concurrency in operating system threading?

3. The following processes are being scheduled using a priority (a smaller priority number implies a higher priority) and shortest job first all preemptive scheduling algorithms.

Process Priority   Burst   Arrival

P1  50   30  0

P2  40  35  25

P3  40  35  30

P4  45  25  60

P5  15  20  100

P6  20  20  105

i. Draw the Gantt charts that illustrate the execution of these processes using the above scheduling algorithms.

ii. What is the turnaround time of each process for each of the scheduling algorithms in part a?

iii. What is the waiting time of each process for each of these scheduling algorithms?

Which of the algorithms results in the minimum average waiting time (over all processes)? 

  

1. Consider a logical address of 128 pages of 1024 words each, mapped onto a physical memory of 64 frames.

i. How many bits are there in the logical address?

ii. How many bits are there in the physical address?

iii. What is the size of the page table?

Write a program in pseudocode that

Write a program in pseudocode that inputs from the user the number of hours worked and hourly pay rate for employees and outputs their total pay. the program should process an arbitrary number of employees : the user will terminate input by entering 0 for hours worked and pay rate. use a class called Worker with attrributes: hours rate and total. methods computetotal() and access methods sethours, gethours, setrate, getrate, settotal,, and gettotal for each of the attributes