Discussion 300 words

 

Read the section in this week’s reading assignment on secure passwords.

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t

 Read Chapter 3 of the Sullivan text, Authenitcation.Primary topics:

  • Fundamentals
  • Authentication Models
  • Passwords

 

dq

Q2:

This week our topic shifts to working with data.  In this week’s discussion post, please note a system that you work with frequently that has a major data component.  Note the type of data, how the data is managed and maintained, and any other important factors regarding the data in the system.

IP – 3 – 4 pages

 

Audit Checklist

Based on what is in your risk assessment, policies, and monitoring plans, create your audit checklist. An audit tells you if you did what you said you were going to do. This checklist should include at least 20 items that will be checked during a standard audit. Create a table with four columns. The title for each column should be as follows:

  • Audit Item (under this header, list the 20 items that will be checked)
  • Item Described
  • Source
  • Audit Criteria

For the Item Described column, include a sentence or two about the item being audited. The Source should describe where this control came from (such as a policy, monitored control). For the Audit Criteria, include what the auditor should look for, including acceptable ranges.

Assessment Plan

Determine if there is any improvement possible on the existing controls and processes. As you create the assessment plan, keep in mind that an assessment looks for ways to continuously improve.

Determine if there is any improvement possible on the existing controls and processes. Provide a 10-step high-level assessment approach. An assessment looks for ways to continuously improve.

Provide 10 bullet points describing the approach the company would go through to conduct a self-assessment.

The following is an example:

  • Review what tools may be available that may offer security controls in a better fashion.
  • Review what tools may combine one or more existing tools.
  • Review trends in incidents or user requests to suggest different processes.

Submit all sections of your Enterprise Security Strategy Plan.

Assignment

Part 1: 

Big Data Analytics: Complete a review of the article by writing a 2-3 page overview of the article and another that substantiates the findings in(1-2) the article you are reviewing. 
Total Pages: 4
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Include at least 3 scholarly references

Part 2:
Discuss an organization’s need for physical security. What methods,  approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
Total Pages: 2
APA7 guidelines with at least two references

Part3:
The job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Total Pages: 4
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. The plan should reflect the business model and corporate culture of a specific organization that you select.
Include at least 4 scholarly references

Wk 4 – Apply: Risk Register

 

Assignment Content

  1. Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

      Resources

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Written research paper

  • Why the predictive analytic component is going to be implemented by noting the problem that you are trying to solve, noting how your team will solve the problem with the selected method (this must be a thorough in-depth analysis), and also present your findings using a power point presentation.
  • Note any Big Data Challenges or other technology or cultural challenges you may face and how you will mitigate these challenges in your presentation.

C++ Program

 Program 1:  Shipping Fees

The Acme Company sells Widgets at $2.00 each.  A customer has the following options for shipping:

  1. Ground Delivery:  7 to 10 days          $  5.00
  2. Express Delivery:

    3.  2 days                                             $ 10.00
    4.  Overnight                                       $ 20.00

Write a program using the steps in the lecture titled “Even More Algorithm Practice” from this module.
Be sure to do the following:

  1. Prompt the User for how many Widgets they wish to purchase.
  2. Error check the input to make sure that it’s not zero.
    1. Use an outer IF/ELSE where the IF is used to display an error message if the input is zero and the ELSE is used for steps 3 through 12 below and for printing the receipt.
  3. Prompt the User for the delivery option.
  4. Compute the sub-total cost of the Widgets.
  5. Compute sales tax on the sub-total cost of the Widgets.  Use 8%.
  6. Compute the total cost of the Widgets.
  7. Determine the delivery cost.
    1. Use an IF/ELSE structure to determine Ground or Express fee. 
    2. Nest an inner IF within the Express option to determine the 2 day or overnight fee.
  8. Once the shipping fee has been selected, add it to the total cost of the Widgets. 
  9. Format all dollar amounts with two decimal places and add a dollar sign to each one.
  10. Format the sales tax with two decimal places.
  11. Only print out the receipt if the number of widgets is valid.
  12. Print out the receipt showing the following:

Number of Widgets:
Sub-Total Cost:
Sales Tax:
Sub-Total with Tax:
Shipping Fee:
Total Cost:

You will also need to do the following for the prologue section:

  1. Create an initial algorithm of the basic steps.
  2. Develop the refined algorithm from the initial algorithm.

Be sure to include with your program as documentation: 

  1. The Program Prologue
  2. The Input data
  3. The Output data
  4. Any Formulas you may have.
  5. The Initial Algorithm
  6. The Refined Algorithm
  7. Line-by-line documentation within the body of code.
  8. The code to pause your output screen.

NOTE 1:

  • DO NOT use the “return” code, end, break, continue, or exit to force an exit from within your IF/ELSE structure.
     

    • Let the program progress to the end of the main function. 
    • The end of the main function is the only place that the “return” should be placed. 
    • A switch statement is the only place that the break command should be placed.

NOTE 2:
1.  Declare all variables within the data declaration section of each class and method.  (-5)
2   Do not get input on the same line as a variable declaration.  (-5)
3.  Do not place an equation for computation on the same line as declaring a variable.  (-5)
4.  Do not place an equation for computation on the same line as input.  (-5) 

Write a project to display the flags of four different countries

  

ASSIGNMENTS

1. Write a project to display the flags of four different countries, depending on the setting of the radio buttons. In addition, display the name of the country in the large label under the flag picture box. The user also can choose to display or hide the form’s title, the country name, and the name of the programmer. Use check boxes for the display/hide choices. 

Include keyboard access keys for all radio buttons, check boxes, and buttons. Make the Exit button the Cancel button. Include a Print button and ToolTips.

You can choose the countries and flags. (The StudentDataImages MicrosoftIcons folder holds flag icons for four countries, which you can use if you wish.)

Hints: When a project begins running, the focus goes to the control with the lowest Tablndex. Because that control likely is a radio button, one button will appear selected. You must either display the first flag to match the radio button or make the focus begin in a different control. You might consider beginning the focus on a button.

Set the Visible property of a control to the Checked property of the corresponding check box. That way when the check box is selected, the control becomes visible.

Because all three selectable controls will be visible when the project begins, set the Checked property of the three check boxes to true at design time.

  

2. Complete the following programming exercise. You will use the MenuStrip object and the Checked and Font properties. You already have a head start with this assignment, since you already developed this with the required assignment in Lesson 3. See the section “Basing a New Project on an Existing Project” on page 243 of the textbook to help you get started. 

Update the previous mandatory assignment – DISPLAY THE FLAGS OF FOUR DIFFERENT COUNTRIES – to use a menu instead of radio buttons, check boxes, and buttons. Include check marks next to the name of the currently selected country and next to the selected display options.

Use a message box to display the program name and your name as programmer for the About option on the Help menu.

Menu: 

  

File

Country

Display

Help

 

Print

United States

Title

About

 

Exit

Canada

Country Name

 

Japan

Programmer

 

Mexico

  

Make sure you close your project when complete. Make a copy of the project folder, compress it to a single file, and submit it. 

After your project is graded, you will receive an evaluation report. Be sure to include your name and student ID number in the comments at the top of your code. Your assignment will not be accepted without this requirement.

This is the second of two programming assignments in this course. You cannot receive a final grade for the course until both assignments have been received and graded as acceptable.