Consider this hypothetical situation 300 WORDS

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim, since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document

Privacy Laws and Protection of Personal Information

  

The protection of personal and confidential information is tremendously important to U.S. citizens and organizations. The security of a private citizen’s information and personal effects is specifically addressed in the Constitution and in the Bill of Rights. In modern times, the Internet has provided a venue where information about individual users is gathered, stored, analyzed, and reported. This information is sometimes used by organizations to make better tactical and strategic business decisions. Considering the large amounts of data collected by the government and private industries, there are huge gaps in existing protection laws.

Review the article “Is Privacy Possible in 2020?” or select another case and provide the link to it in your writing and on the reference page.

Write a 3–5 page paper based on the information from the above link with supporting research activities. You may also use the information in the text (without plagiarizing), or other resources. Complete the following:

1. Identify and briefly describe 2–3 laws enacted to protect citizens’ privacy and intellectual property rights.

2. Identify the organizations responsible for enforcement or monitoring compliance with those laws.

3. Discuss 2–3 systems that gather data that citizens fear is being misused.

4. The European Union (EU) designed the General Data Protection Regulation (GDPR) to strengthen the protection of citizens’ data. Discuss the pros and cons of its use in comparison to the protections present in U.S. law or regulations.

5. Provide suggestions or recommendations of mitigations that citizens can use to protect themselves from possible loss or misuse of personal or intellectual information.

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.

update code in C++

please see instructions in the attached file.

#include

#include

using namespace std;

const int ROWS = 8;

const int COLS = 9;

//P(sense obstacle | obstacle) = 0.8

float probSenseObstacle = 0.8;

//P(senses no obstacle | obstacle) = 1 – 0.8 = 0.2

float probFalseNoObstacle = 0.2;

//P(sense obstacle | no obstacle) = 0.15

float probFalseObstacle = 0.15;

//P(senses no obstacle | no obstacle) = 1 – 0.15 = 0.85

float probSenseNoObstacle = 0.85;

//Puzzle including a border around the edge

int maze[ROWS][COLS] =

{ {1,1,1,1,1,1,1,1,1},

{1,0,0,0,0,0,0,0,1},

{1,0,1,0,0,1,0,0,1},

{1,0,0,0,0,0,0,0,1},

{1,0,1,0,0,1,0,0,1},

{1,0,0,0,0,0,0,0,1},

{1,0,0,0,0,0,0,0,1},

{1,1,1,1,1,1,1,1,1},

};

//Matrix of probabilities

float probs[ROWS][COLS];

//Temporary matrix

float motionPuzzle[ROWS][COLS];

float sensingCalculation(int evidence[4], int row, int col)

{

float result = 1.0;

//If obstacle sensed to the west

if (evidence[0] == 1)

{

//If obstacle to the west in maze

if (maze[row][col – 1] == 1)

result *= probSenseObstacle;

//If no obstacle to the west in maze

else

result *= probFalseObstacle;

}

//If no obstacle sensed to the west

else

{

//If obstacle to the west in maze

if (maze[row][col – 1] == 1)

{

result *= probFalseNoObstacle;

}

//If no obstacle to the west in maze

else

{

result *= probSenseNoObstacle;

}

}

//If obstacle sensed to the north

if (evidence[1] == 1)

{

//If obstacle to the north in maze

if (maze[row – 1][col] == 1)

result *= probSenseObstacle;

//If no obstacle to the north in maze

else

result *= probFalseObstacle;

}

//If no obstacle sensed to the north

else

{

//If obstacle to the north in maze

if (maze[row – 1][col] == 1)

{

result *= probFalseNoObstacle;

}

//If no obstacle to the north in maze

else

{

result *= probSenseNoObstacle;

}

}

//If obstacle sensed to the east

if (evidence[2] == 1)

{

//If obstacle to the east in maze

if (maze[row][col + 1] == 1)

result *= probSenseObstacle;

//If no obstacle to the east in maze

else

result *= probFalseObstacle;

}

//If no obstacle sensed to the east

else

{

//If obstacle to the east in maze

if (maze[row][col + 1] == 1)

{

result *= probFalseNoObstacle;

}

//If no obstacle to the east in maze

else

{

result *= probSenseNoObstacle;

}

}

//If obstacle sensed to the south

if (evidence[3] == 1)

{

//If obstacle to the south in maze

if (maze[row + 1][col] == 1)

result *= probSenseObstacle;

//If no obstacle to the south in maze

else

result *= probFalseObstacle;

}

//If no obstacle sensed to the south

else

{

//If obstacle to the south in maze

if (maze[row + 1][col] == 1)

{

result *= probFalseNoObstacle;

}

//If no obstacle to the south in maze

else

{

result *= probSenseNoObstacle;

}

}

return result;

}

//Use evidence conditional probability P(Zt|St)

void sensing(int evidence[4])

{

float denominator = 0;

//Calculates denominator

for (int r = 0; r < ROWS; r++)

{

for (int c = 0; c < COLS; c++)

{

if (maze[r][c] != 1)

{

denominator += sensingCalculation(evidence, r, c) * probs[r][c];

}

}

}

for (int row = 0; row < ROWS; row++)

{

for (int col = 0; col < COLS; col++)

{

//If the current space isn’t an obstacle

if (maze[row][col] != 1)

{

float currentProbabilty = probs[row][col];

float numerator = sensingCalculation(evidence, row, col) * currentProbabilty;

float result = numerator / denominator;

probs[row][col] = result;

}

}

}

}

//Use transition probability P(St|St-1)

void motion(int direction)

{

for (int row = 0; row < ROWS; row++)

{

for (int col = 0; col < COLS; col++)

{

if (maze[row][col] != 1)

{

float total = 0.0;

//north

if (direction == 1)

{

//checking west

if (maze[row][col – 1] != 1)

{

total += probs[row][col – 1] * 0.1;

}

else

{

total += probs[row][col] * 0.1;

}

//checking north

if (maze[row – 1][col] != 1)

{

total += probs[row – 1][col] * 0;

}

else

{

total += probs[row][col] * 0.8;

}

//checking east

if (maze[row][col + 1] != 1)

{

total += probs[row][col + 1] * 0.1;

}

else

{

total += probs[row][col] * 0.1;

}

//checking south

if (maze[row + 1][col] != 1)

{

total += probs[row + 1][col] * 0.8;

}

else

{

total += probs[row][col] * 0;

}

}

//west

else if (direction == 0)

{

//checking west

if (maze[row][col – 1] != 1)

{

total += probs[row][col – 1] * 0;

}

else

{

total += probs[row][col] * 0.8;

}

//checking north

if (maze[row – 1][col] != 1)

{

total += probs[row – 1][col] * 0.1;

}

else

{

total += probs[row][col] * 0.1;

}

//checking east

if (maze[row][col + 1] != 1)

{

total += probs[row][col + 1] * 0.8;

}

else

{

total += probs[row][col] * 0;

}

//checking south

if (maze[row + 1][col] != 1)

{

total += probs[row + 1][col] * 0.1;

}

else

{

total += probs[row][col] * 0.1;

}

}

motionPuzzle[row][col] = total;

}

else

{

motionPuzzle[row][col] = -1;

}

}

}

for (int r = 0; r < ROWS; r++)

{

for (int c = 0; c < COLS; c++)

{

probs[r][c] = motionPuzzle[r][c];

}

}

}

void printPuzzle(float puzzle[ROWS][COLS])

{

for (int row = 0; row < ROWS; row++)

{

for (int col = 0; col < COLS; col++)

{

if (puzzle[row][col] == -1)

cout << "##### ";

else

cout << setprecision(2) << fixed << puzzle[row][col] * 100.0 << "  ";

}

cout << endl;

}

}

int main()

{

//Initial probability matrix

for (int row = 0; row < ROWS; row++)

{

for (int col = 0; col < COLS; col++)

{

if (maze[row][col] == 0)

{

probs[row][col] = (1.0 / 38);

}

else

{

probs[row][col] = -1;

}

}

}

printPuzzle(probs);

cout << endl;

int s1[4] = { 0, 0, 0, 0 };

sensing(s1);

printPuzzle(probs);

cout << endl;

//1 = north

motion(1);

printPuzzle(probs);

cout << endl;

int s2[4] = { 1,0,0,0 };

sensing(s2);

printPuzzle(probs);

cout << endl;

//1 = north

motion(1);

printPuzzle(probs);

cout << endl;

int s3[4] = { 0,0,0,0 };

sensing(s3);

printPuzzle(probs);

cout << endl;

//0 = west

motion(0);

printPuzzle(probs);

cout << endl;

int s4[4] = { 0,1,0,1 };

sensing(s4);

printPuzzle(probs);

cout << endl;

//0 = west

motion(0);

printPuzzle(probs);

cout << endl;

int s5[4] = { 1,0,0,0 };

sensing(s5);

printPuzzle(probs);

cout << endl;

return 0;

}

as below

 

Assignment Submission

Write your solutions in a Word file, type your name and course number in that file, name it.

This the question down below:

QUESTION 1

  1. 1. To keep track of books it sells, a B Club book store uses the table structure shown below. Assuming that the sample data are representative, draw a dependency diagram in Visio that shows all functional dependencies including both partial and transitive dependencies. (Hint: Look at the sample values to determine the nature of the relationships.)Attribute NameSample ValueSample ValueSample ValueBOOK_CODE123454837519356BOOK_TITLEHistory of RomeNew LegendIntro to DatabasesGENRE_CODEH23M12F01GENRE_DESCRIPHistoryMysteryComputersAUTHOR_ID3399, 483933999375AUTHOR_NAMERobert Knut, John SmithRobert KnutDiego PriestlyBOOK_PRICE23.2512.6518.902. Using the initial dependency diagram drawn in question 1, remove all partial dependencies, draw the new dependency diagrams in Visio, and identify the normal forms for each table structure you created.3. Using the table structures you created in question 2, remove all transitive dependencies, and draw the new dependency diagrams in Visio. Also identify the normal forms for each table structure you created. If necessary, add or modify attributes to create appropriate determinants or to adhere to the naming conventions.4. Using the results of question 3, draw the fully labeled Crow’s Foot ERD in Visio. The diagram must include all entities, attributes, and relationships. Primary keys and foreign keys must be clearly identified on the diagram.
    here is the 2nd portion below with the instructions:INSTRUCTIONS
    For the database you designed in your previous assignments, write ten queries using operations of relational algebra. Queries must follow the requirements listed below.

    • Queries 1 – 3 must retrieve at least two attributes and must be based on a single table. Each query must include at least two conditions. Provide an explanation of what the query is retrieving. Use complete, coherent sentences with no database terminology.
    • Queries 4 – 6 must retrieve at least three attributes in total and must be based on two tables. Each query must include at least two conditions. Provide an explanation of what the query is retrieving. Use complete, coherent sentences with no database terminology.
    • Queries 7 – 8 must retrieve at least three attributes in total and must be based on three tables. Each query must include at least two conditions. Provide an explanation of what the query is retrieving. Use complete, coherent sentences with no database terminology.
    • Queries 9 – 10 must be based on at least two tables, include at least two conditions, and one grouping function operator. Provide an explanation of what the query is retrieving. Use complete, coherent sentences with no database terminology.
    • Note: Please include your ERD/EERD along with your solutions.

INTERNSHIP AT THE RAM & SONS AUTO INC

 

Each week you are to enter content into an online journal provided in Blackboard that briefly summarizes (1) the tasks you performed during your internship that week and (2) total hours worked with days/times. The content can be brief and in outline form and use bullet or another list styling, but keep in mind that this content will form the basis of the two major papers that you will write for this course. Therefore, the more detailed you are in your weekly journal, the easier it will be to finish the two papers. Specifically, your weekly journal should contain: 

• The days and times you worked that week, as well as the total hours, worked. (Provide this information at the top of each weekly section so this will act as a de facto heading to separate each weekly entry that you make.) 

• The skills or skillsets used/required to complete each task 

• Each task you performed along with a brief description of what you did.

 • A brief explanation of why the task needed to be done.

 • Was there an outcome? If so, what was that outcome?

 • What new terminology did you learn this week? Provide the term and its definition.

Activity 3- Executing the Project

Complete a 1-page document that explains your strategy for acquiring resources in the simulation and in real life?

  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources  from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.
  • Approach the assignment from the perspective of a project management of a company.

CYBERLAWS & ETHICAL HACKING

Enumeration is the most aggressive of the information-gathering processes in any attack. During enumeration, an attacker determines which systems are worth attacking by determining the value a system possesses. Enumeration takes the information that an attacker has already carefully gathered and attempts to extract information about the exact nature of the system itself.

Answer the following question(s):

1. If you were an IT security manager, what would you include in your security policy regarding enumeration?

2. If you worked as an attorney in the Legal department, would you want different language in the security policy? Why or why not?

Fully address the question(s) in this task in one page; provide valid rationale for your choices.

Networking (Research paper)

Literature Review

Eight Page Total without cover and reference page 

Provide a minimum of eight (8) scholarly, peer-reviewed sources in reference format.

The sources should be listed using APA format.