Case study

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Analyzing and Visualizing Data course have been applied, or could be applied, in a practical manner to IT work environment.

Requirements:

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course.

Course description: This course is intended to introduce students to modern programs and technologies that are useful for organizing, manipulating, analyzing, and visualizing data. We start with an overview of the R language, which will become the foundation for your work in this class. Then we’ll move on to other useful tools, including working with regular expressions, basic UNIX tools, XML, and SQL.

Research about (Smart Meter)-(Theft Detection)

  ((What I need is a comparison table between papers))

– Papers should be about:

· The Systems Developed in Smart meters  

· The Systems Developed in Theft detection

– Papers not older than 2018 

– (NOT LESS THAN 6 papers)

Sum-Wk-3

Assignment 1

After reading chapter 4 (attached) – 

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 2 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Sources: Use a minimum of three scholarly articles to complete the assignment.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Incident Response Plan

 

Review and analysis the provided Incident Response Plan in comparison to what you have read in the Incident Response Planning section of this week’s reading.

Prepare a 350- to 1,050-word paper that fully discusses the topic questions

Format your paper consistent with APA guidelines. Format your paper consistent with APA guidelines.

Exp19_Access_Ch02_ML1 – Game Collection 1.2

 

Exp19_Access_Ch02_ML1 – Game Collection 1.2

 

Project Description:

You have cataloged your vintage video games in an Access database. In  this project, you add two tables to a database you have started? One to  identify the game system that runs your game and the other to identify  the category or genre of the game. Then you will join each table in a  relationship so that you can query the database.

Start Access. Open the downloaded   Access file named Exp19_Access_Ch02_ML1_Games.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Open   the Games table and review the fields containing the game information. Close   the table.
 

  Create a new table in Design view. Add the field name SystemID and select AutoNumber as the Data Type. Add the caption System ID. Set the SystemID field as the primary   key for the table.

Add   a second field named SystemName   with the Short Text Data Type.   Change the SystemName field size property to 15.   Add the caption System Name.   Save the table as System.

Switch   to Datasheet view and enter the following system names, letting Access assign   the System ID:
 

XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
 

  Double-click the border to the   right of the System Name column to set the column width to Best Fit. Save and   close the table.

Create   a new table in Design view. Add the field name CategoryID   and select AutoNumber as the Data   Type. Add the caption Category ID.   Set the CategoryID field as the   Primary Key for the table.

Add   a second field named CategoryDescription   and accept Short Text as the Data   Type. Change the field size property to 25.   Add the caption Category Description.   Save the table as Category.

Switch   to Datasheet view, and enter the following Category Description, letting   Access assign the Category ID:
 

Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
 

  Close the table.

Establish   relationships in the database by adding the Category, Games and System  tables to the Relationships   window. Close the Show Table dialog box.  Create a one-to-many relationship   between the SystemID field in the  System table and the SystemID field in the   Games table, enforcing  Referential Integrity. Select the option to cascade   update the related  fields.

Create   a one-to-many relationship between the CategoryID field in  the Category table   and the CategoryID field in the Games table,  enforcing Referential Integrity.   Select the option to cascade update  the related fields. Save and close the   Relationships window.

Create   a simple query using the Query Wizard. From the Games table, add the GameName and Rating fields (in that order). Save the query using the title Ratings. Switch to Design view. Sort the   Rating field in ascending order.

Click   the gray column selector at the   top of the Rating field, then click and drag the column to move it to the first position of the query design grid.   Add a Total row, click in the Totalrow   of the GameName column, click the arrow,   and then select Count.  The records   will be grouped by rating, and the number of games will  be counted for each   group. Run, save, and close the query.

Create   a new query in Design view. Add the Category,   Games, and System tables to the query design window. Add the following   fields to the query (in this order).
 

GameName

CategoryDescription
   Rating
   SystemName
   DateAcquired

Sort   the query in ascending order by GameName and run the query. Save the query as   Game List and close the query.

Copy   the Game List query in the   Navigation pane and paste it with the name PS3 Games.   Modify the query in Design view by using PS3    as the criteria for SystemName. Remove the sort by GameName and sort  in   ascending order by CategoryDescription. Save and run the query.  Close the query.

Create   a new query in Design view. Add the Category,   Games, and System  tables to   the query design window. Add fields (in this order) to  display the name of   the game, its rating, the category description of  the game, and the system   name. You only want to display Wii games with  a rating of Everyone or Teen.    Because the system name is the same for the games you plan to pack and  share,   hide this value from the results. Save the query as Thanksgiving Games and run the query. Close the query.

SECURE INTERNET OF THINGS TOPIC Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03 Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the

  •                                                 References
  • Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03
  • Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the secure use of dynamic identity for the internet of things—Using the secure remote update protocol (SRUP). Future Internet, 12(8), 138. https://doi.org/10.3390/fi12080138
  • Prasad, G. S., Lal Chhagan, Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., & Kose, U. (2020). Reliable and secure data transfer in IoT networks. Wireless Networks, 26(8), 5689-5702.https://doi.org/10.1007/s11276-019-02036-0 

git, GitHub and version control

  

Version Control Using Git and GitHub

Discuss using appropriate commands for the following 

1. Getting started on GitHub 

2. Configuring Git 

3.  Creating a Git repository 

4. Creating and editing files 

5.  Adding files to your Git repository 

6. Finding out what’s happening 

7.  Making changes and tracking them 

8.  Synchronizing your local Git repository with GitHub 

9.  Deleting and renaming files

10.  Undoing changes 

11. Before you commit

12. After you commit

13. Being more selective 

14.  Retrieving an old version 

15.  Branching 13

16.  Checking differences between branches 

17.  Merging branches 

18.  Deleting branches 

19. Managing multiple copies of a repository 

20.  Dealing with simple conflicts (give examples)

21.  Dealing with more complex conflicts (give examples)

Instructions:

Commands should be formatted as a picture that is, include your own picture codes/command.

Please use attached documents or link as guide and do not plagiarize

LINKS:

http://www.bioinf.org.uk/teaching/splats/git.pdf

https://www.cdslab.org/MAPCP2019U/homework/1-version-control-using-git-github

Impact analysis- Prevention and Response strategies

  

Impact Analysis Part 3: Prevention and Response Strategies

Prior to or when security measures fail, it is essential to have in place several response strategies. In 1,250-1,500 words:

1. Explain how negotiations with accreditors on compliance should be dealt with. Provide an example.

2. Present appropriate response strategies that can be put into action (i.e., breach notification policies).

3. Present employee training recommendations for creating awareness of the organization’s security measurements.

4. Explain how to obtain feedback on the effectiveness of security policies from stakeholders. Provide an example.

5. Explain how to identify new threats, vulnerabilities, or any countermeasures that may not have been present/available when the initial security measures were first implemented. What mechanisms could be in place to catch any oversights? Explain how this would be reported/communicated. Example, an IT professional explains why a specific device is configured, why if it is compliant it will NOT work, or why if it is NOT compliant it does work.

6. Explain how operational managers, stakeholders, and/or individuals affected will be notified. Provide examples for each.

7. Identify organization management techniques to respond quickly to new challenges. Explain with supporting details.

Testing Framework and Basic Security Controls

THE DETAILS OF THIS ASSIGNMENT ARE IN THE ATTACHED FILE.

Develop a testing framework with these phases as guidelines for your organization or an organization you would like to work for in the future. 

• Before development begins 

• During definition and design 

• During development 

• During deployment 

• Maintenance and operations

You will need to fill in the details for each phase by 

1) describing what each phase encompasses and 

2) 3 or more activities you will engage in for each phase. 

In addition, you will apply part of this framework in the phase “During development” by engaging in three tests/security controls.

 1. Fingerprint Web Server (OTG-INFO-002)

 2. Review webpage comments and metadata for information leakage (OTG-INFO-005). Manually review the sample HTML/PHP application provided in the zip file attached in this project.  

 3. Test HTTP Methods (OTG-CONFIG-006) – See which HTTP methods are available on the sample website. 

Deliverables: You should submit your source testing framework document along with the results testing the three security controls listed above. Your document should be well-organized, well-written using paragraph style that includes page numbers, includes all references used and contains minimal spelling and grammar errors.