Assignment 4

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered (2 pages maximum). Once again, it is essential that you use your own words (do not just copy and paste from the Internet). Add References. 

These two links may offer some additional information for this assignment but you are encouraged to use additional sources for your project/assignment.

https://aws.amazon.com/security/introduction-to-cloud-security/

https://azure.microsoft.com/en-us/

SE493 week 6 Di

Due: Please post your initial discussion No later than Thursday or Friday of this week. (80 Points)

Due :Peer/Classmate review/comment: Provide comments to other class members No later than Friday or Saturday of this week. Please mention the classmate/s name.(20 points )

Please take a few minutes and check the discussion board on Sunday and make sure to reply to peer comments OR my comments/query.

Please read IGU Grading Rubric  and late participation grading policy for discussion posted under policy section course modules.

Discussion Topic

Software systems are not isolated systems but are essential components of broader systems that have a human, social or organizational purpose.

Read Chapter 10  and review Lecture slides (posted under week 5), and reputable articles/journals and List and discuss The Sociotechnical Systems Stack. 

Part B: Memo to the CEO

 

Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts:

  • Part 1: Analysis of Components of Information Security that does the following:
  • Categorizes the components of information security
  • Analyzes the components of information security as it applies to the scenario presented in Vampire Legends
  • Contains a breakdown of the budget report
  • Discusses your allocation strategy based on the risks and expenses involved
  • Describes your choice for the best advertising campaign
  • Outlines the course of action in handling information security threats in the future
  • Part 2: Role of Ethics that does the following:
  • Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organization
  • Describes the consequences of the conflict
  • Discusses the solution to the conflict
  • Discusses the impact of ethics on revenue

This project focuses on demonstrating

  

This project focuses on demonstrating your understanding of GUI and event programming. Before attempting this project, be sure you have completed all of the reading assignments listed in the syllabus to date, participated in the weekly conferences, and thoroughly understand the examples throughout the chapters.   The project requirements include:

1. Enhance the form you created in homework 3 to add a JCombobox to select the user’s State of birth, and a JRadio buttons to indicate their gender. Also, add a JTextArea to the form. Once the user clicks on the JButton (created in homework 3) the application will display all of the user’s information in the JTextearea. You should use an appropriate layout manager to provide an attractive and neat interface. 

a. A possible GUI is shown below:

csffff

 11 PART 

Include a short paragraph describing your project(car hacking) and how you intend to research it.

12 PART

 

create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

————————————————————————————————————

Please write abstract for PART 11

Attaching links for instructions.

https://www.scribbr.com/apa-style/apa-abstract/

Building Secure and Web Applications

 

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

Here is a list of your upcoming project deliverables:

*  Submit final project.

* Submit a brief abstract describing your final project.

 * Submit final project materials.

  • 500 word, double spaced, written in APA format, showing sources and a bibliography

Power Point Instructions – 10 slides for the topic already given

https://www.skillsyouneed.com/present/presentation-tips.html

for the same topic

DQ due in 48hrs

1. label each response as DQ1, DQ2, DQ3, DQ4. 

2. APA format 

3. Minimum 1 resources

4. Minimum 150 words each DQ

5. no plagiarism it is checked

Discussion Questions: 

DQ1: SQL Standard

What are some of the advantages and disadvantages to an SQL standard?

DQ2: Dynamic & Embedded SQL

Briefly discuss dynamic and embedded SQL. Cite an example of how either enhance database design and performance .

Discussion Questions: 

DQ3: Data Joins

In your own words, explain the difference between and outer and inner join.  Use an example.

DQ4: Triggers

How can triggers and stored procedures be used to enhance database design and performance? Are there hidden dangers in using triggers and stored procedures? 

module 5

 

Module 05 Content

  1. As a portion of security compliance, one of the board members used SANS security controls at a former business and was very pleased with its outcomes. Based on this knowledge and to meet the needs of the board members, you have decided on implementing a few monitoring rules to help meet the requirements of five of the SANS Top 20 Controls.
    For this part of your project, you will be addressing the following SANS Security Controls:

    • Asset Inventory of Authorized and Unauthorized Devices
    • Software Inventory of Authorized and Unauthorized Devices
    • Malware Defenses
    • Boundary Defense
    • Controlled use of Administrative Privileges
    • For each of these controls below, create a document that details the following information for each monitoring rule:
    • Brief description of the monitoring used and the alerting processes
    • Devices to pull log data from in order to satisfy the monitoring rule.
    • Frequency of the log data collection: (Real-Time, Hourly, Weekly, Monthly, Annually)
    • At least two ways this monitor could be tested to validate any false positives or negatives
    • Your reports should use professional tone and vocabulary, APA format, and proper spelling and grammar.
      Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.
      Save your assignments as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
      Jstudent_exampleproblem_101504

Practical Connection

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

 Requirements: 

Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. 

Subject: Project risk & Quality management
Working as a supply chain consultant in an automovtive compamany. so something relatible can be written.