Discussion 5- Legal

Assigned Readings:Chapter 6. Administrative Law.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. The Federal Aviation Administration (FAA) proposes a new rule.  During the comment period, an individual considered to one of the most experienced aviation experts in the country strongly disagrees with the rule and provides a wide variety of support for her position.  Must the FAA not pass the proposes rule based on this comment?  Must the FAA consider the comment when deliberating passing the new rule?
  2. State and explain each stage of the formal rule making process for administrative agencies. Provide examples as appropriate.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Organizational Objectives and Priorities

 

Organizations need to clearly identify risks before they become relative issues. Therefore, it is important for security professionals to comprehend what must be done to construct strategies that are considered to be proactive resources for analyzing and assessing cybersecurity threats before they become active issues.

In 750-1000words, select an area of the industry that you are interested in and create a hypothetical business. Refer to the “Business Profile Template” when completing this portion of the assignment. Define the business environment by making sure to:

  1. Describe the organization’s mission, objectives, stakeholders, and how it fits into the industry.
  2. Describe the main product, service offerings, and consumer base.
  3. Describe the main departments and their roles, including all major stakeholders.
  4. Describe the company’s information technology infrastructure to include hardware, software, networks, data centers, facilities, and related equipment used to develop, test, operate, monitor, manage, and/or support information technology services.
  5. Describe a common flow of information and decisions at the following levels within the organization: Executive, Business/Process, Implementation/Operations.

Then, in a Word document, begin implementing a cybersecurity framework. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials, focusing specifically on “Table 2: Framework Core.” Make sure to:

  1. Align the hypothetical business to the NIST Cybersecurity Framework CSF
  2. Prioritize organizational efforts and business needs.
  3. Identify individual elements of cybersecurity risk (threats to and vulnerabilities of) and how to manage them.
  4. Describe how the organization incorporates privacy principles in relation to data collection, disclosure, and retention.

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Objectives and Priorities Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

CIS 22A – Lab 6

CIS 22A – Lab 6

Credit Card Debt 

The True Cost of Paying Minimum Payment

Write a C++ program to output the payment schedule for amount owed when each month

nothing more is charged to the account but only the minimum payment is paid. The output

stops when the balance is fully paid (i.e. no longer > 0).

Input: 

Data must be done in a separate function. Input the following: credit card balance, interest rate

on your credit card, and percent of minimum payment. Test data: 624 24, 4

Data must be read from a file called lab6.txt .

Calculate: This function must be called from main() from within the loop.

For each month, calculate the amount of interest to be paid that month (adding this into

balance before calculating minimum payment), total of interest paid, amount of minimum

payment due for the month, and updating new balance.

If the minimum payment is less than $15.00 then set it at $15.00

Output: This function must be called from main() from within the loop.

There needs to be a separate function to output the table heading. Also output the information

input from the file.

There needs to be a separate function to output month, balance at the end of the month, interest

paid that month, minimum payment for that month, and the sum of amount of interest paid so

far. 

All output must be redirected to a file. (See b http://www.bankrate.com/calculators/managingdebt/minimum-payment-calculator.aspx)

Sample

output:

Balance Owing: $  624.00

APR as %  24

Percent for minimum payment as %  4

Month     Balance  Interest       Minimum      Sum of

                   this month                 interest paid

    1      611.02       12.48       25.46       12.48

    2      598.31       12.22       24.93       24.70

    3      585.87       11.97       24.41       36.67

    4      573.68       11.72       23.90       48.38

. . .

   57       31.80        0.92       15.00      388.14

   58       17.44        0.64       15.00      388.78

   59        2.79        0.35       15.00      389.13

   60        0.00        0.06        2.84      389.18

Press any key to continue . . . 

 

Check points:

 

 

? Absolutely no arrays

? Each function needs as comments Purpose, Pre & Post.

? Pass by reference only when you must.

? Your name must be as comment at the top of the source code and output to the file 

within your code.

? Must have a minimum of six meaningful comments in main.  

Calculator Server and Client Java

Calculator Server and Client  Java 

The goal: Make a client that sends simple arithmetic expressions, and a server that solves them and sends the result back to the client. 

Class design requirements: 

Your program should contain at least the following classes • CalculatorClient • CalculatorServer Important note: This is an unusual project in that it does not require a Tester class! I will run your two classes myself, calculatorolient and calculatorserver, and test them. 

Each of your classes, CalculatorClient and CalculatorServer, should have main(String[] args) methods, allowing them to be run! Thus, they will never actually be instantiated; they will just run. 

Here are the requirements for each class: CalculatorServer: • Makes a ServerSocket that awaits a connection on a port of your choice. • When a connection is made, it sends a one-time welcome message to the connected socket. 

• Repeatedly awaits data from the connected socket in the form , where is a string that can be parsed to a Java Double data type, and is a string that is either “+”, “-“, “r, or “*”, representing addition, subtraction, division, or multiplication, respectively. • When data of this form is received, representing an arithmetic calculation to be made, actually does the calculation and sends the result back to the connecting socket. 

CalculatorClient: 

• Makes a Socket that connects to some port of your choice on the host “localhost”. This port should match that of the server! 

• Repeatedly asks the user for input, and sends that input over the socket connection to the server. 

• When a response is received (which should be the solution to the arithmetic problem), prints that to the console. 

Note: It’s okay in this case for your server or client to crash if the client sends data in the wrong format (for example, if the client sent the string “5+5” with no spaces, or the string “foo”). You will not be marked down for this occurring. 

Discuss the ideas that are essential while designing an organization.

Discuss the ideas that are essential while designing an organization.

This posting should be at least 250 words. Respond to at least one other student’s initial posting. Your primary posting can end with a “tag-line” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. Secondary responses should be substantial and well-meaning, between 100-125 words. Initial postings should comply with APA format. For secondary responses, APA is optional (but good practice). 

Attached Student’s initial posting, please give a comment or reply on this

Discussion

 Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice. 

Post should be 300 words

Threat Interception Project

  

Threat Interception Project Assignment Instructions

Overview

When accessing the Internet via wireless methodologies, a certain level of protection has been granted to the users. This protection is largely due to the many types of security protocols that have been developed. Without these different security protocols, users would not be able to engage in the activity that they have become accustomed to on the Internet. In order to preserve this freedom with which users utilize the Internet, IT professionals must have both a thorough understanding of the primary forms of security protocols as well as how each security protocol functions.

One of the best methods that can be utilized to minimize security threats is by intercepting these attacks before they are successfully utilized. Three security protocols that are used to achieve this include Transport Layer Security (TLS), Secure Sockets Layer (SSL), and Private Communications Transport (PCT). Do any other security protocols exist? Research one additional modern security protocol and add this to your analysis.

Instructions

Assume that you are the information security officer of a business, and you must evaluate these four (4) security protocols in order to determine which should be implemented in your organization.  Analyze the protocols on at least two (2) different operating systems from a threat interception standpoint. Use current threat and vulnerability data when performing this assessment. US-CERT, the United States Computer Emergency Readiness Team, is one example of a U.S. Department that has information on current threats to information systems.  Regardless, many other public and private sector organizations can be used as long as they are credible.  

In order to perform this analysis, if you do not have access to two different physical workstations with different operating systems, it is recommended you use virtual machines. VMware and Oracle VirtualBox are examples. Search for either and download them free of charge. Subsequently, you can use open source pre-built images or install from the operating system ISO images. For instance, Kali Linux is a popular operating system that has the tools to do this analysis. Search “Kali Linux VirtualBox Image” to find a virtual box image pre-installed with Kali Linux.

In your analysis, be sure to assess the threats that each protocol is likely to mitigate or prevent and evaluate the strengths and weaknesses associated with each of these protocols. Be sure to include the following in your project:

· A properly formatted APA paper;

· Screenshots with visible OS dates of the network security threat assessments on the two different operating systems, at least one OS being Linux, using relevant security tools on Kali Linux or Linux alternatives;

· Justification and use of appropriate security tools to demonstrate and evaluate the vulnerability of intercepting information from each of the four (4) networking protocols;

· A review of which safeguards the organization could implement to guard against these attacks, and

· A well supported report regarding the most advantageous safeguard/mitigating factors of the network security threats your project addresses;

· Hint: Create Microsoft Excel spreadsheets that list the operating systems, security assessments, tools used, four (4) networking protocols, and findings from the threat interceptions that occurred;

· Your project must be a minimum of 1500 words and must contain at least 7 peer-reviewed sources;

· Before being graded, all code, security tool logs/reports, server logs, access control rules, and diagrams (each) must include screenshots with a valid OS date/timestamp and a unique piece of data that shows completion on the student’s Kali Linux distribution or relevant alternative security OS. Include the screenshots in appendices in your written paper.

computer science

please use this link right here to do the work on please https://colab.research.google.com/drive/1P6q5UHzdeLqUWAkRjH4u_qiMfddu2YQs?usp=sharing