Discussion 300 words

 Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals. 

5/3 Assignment

  1. Phase 3 of Final Project: Write a two- to four-page paper that addresses and reflects upon the following:
    1. Describe the concepts and practices of designing and implementing business continuity and disaster recovery plan.
    2. How might you test a disaster recovery plan?
    3. What should a risk management plan include?
    4. How does a change management plan impact the overall risk strategy?
    5. What are the important concepts that should be included in a security plan for developing secure software?
  2. Support your writing with at least two outside sources. The paper should be in APA format.
  3. This is the 3rd part to be submitted; please look at the previous 2 parts. 

Programming Languages, Software Development, and Deployment

Reviewing the concept of Change Windows, I want you to pick the best day and time for a regular weekly change window for a 9-to-5 business. Making sure to think about why this is a good time and justify it in your post.

Aligned Objectives

  • Identify physical and logical network components
  • Identify and describe the services and tools used in network operations
  • Describe the processes involved in running a datacenter
  • Initial post should be 250 to 350 words. Respond to at least one peer’s post by providing potential solutions to their concern.

Criteria

Discuss each group.

Discuss why the selected day and time is ideal for maintenance for a fictional 9 a.m. to 5 p.m. company.

Ransomware Attacks

 

You work as the head of the IT department for a local hospital. Another hospital in your state was recently the target of a ransomware attack. Fearing a similar attack, senior management of your hospital has asked you if your hospital is prepared for such an attack.

They have requested a 1- to 2-page memo that describes the hospital’s protections against a ransomware attack. In your memo, include a chart with columns for Authorization, Authentication, Roles, and Mitigation. In each column, list related security protections the hospital should use to protect against ransomware attacks. Additionally, based on your chart, provide a final summary on how the hospital can mitigate the risk of a ransomware attack and how the hospital can respond if it does face such an attack.

Write a 1- to 2-page memo.

Include the chart in your memo.

Discussion 13 & 14- Project HR & Stakeholder Mngt

Leadership

Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Describe leadership models that better allow for project and team success.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Managing Project Stakeholders 

ISBN: 9781118504277 

Authors: Tres Roeder 

Publisher: John Wiley & Sons 

Publication Date: 2013-04-22

Write a Java program that displays all 4-character strings in lexicographic order (also called dictionary order) on the screen. It must display a string of 4 characters per line. Only the characters a, b, c, d are allowed within character strings

 

Write a Java program that displays all 4-character strings in lexicographic order (also
called dictionary order) on the screen. It must display a string of 4 characters per line.
Only the characters a, b, c, d are allowed within character strings, but you can reuse the
same character more than once within the same string. Within the same string, the
character "b" must always be immediately followed by the character "a". The same string
cannot contain both the character "d" and the character "a". Your program should end with
the number of character strings displayed on the screen. Your program receives nothing
as input. Your program code must not include pre-calculated strings: it must generate
them at runtime. Your program should not contain more than 200 short lines of code.

CYB/ 130

n this course, you have learned that computer programming is key to computer science. The ability to program a succession of instructions to resolve a computing problem is a valuable skill that is integral to many aspects of modern life. You have also seen the versatility and distinguishing characteristics that make Python 3 a popular choice for programmers.

End-of-Course Essay

Write a 1- to 2-page essay in which you connect this course to your own career or personal life. Imagine the audience for this essay is someone who is interested in finding out about your experience with this course and the programming language.

An essay is a short composition on a theme or subject, written in prose and generally analytic, speculative, or interpretative.

Consider these questions as you write. You may answer all or some of the questions in your essay.

  • Why is object-oriented programming a valuable skill?
  • What are the benefits and limitations of Python 3?
  • Besides programming, what are some other tasks you can perform with Python 3?
  • How might you use the concepts you learned in this course in your career or personal life?
  • In what ways would you like to extend or strengthen your knowledge of object-oriented programming or Python 3 in particular?

Grading guidelines:

  • Title your essay.
  • Write 1 to 2 pages on your experience with Python 3.
  • Consider your audience as anyone interested in your experience with the course and Python 3.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

PSD3

  

My father use to tell me that “locks keep honest people honest”. What do you think he meant by that? Is there any such thing as total security?