Module 3

 

Adding More Event Handlers to Your Controls and Writing Utility Methods

This week we will add more event handlers and functions to the course project. View the videos provided in the Project Video Links for instructions and details to help guide you through your efforts. Links to other files you need are listed below.

For each of the following

  

CS 315  

1. For each of the following operations determine the result in $t0. The answer should either be expressed in hexdecimal or binary in 4 bit groups (nibbles). Given the following:

$t1 0x3FFF 7FFC

$t2 0XFFFF 0000

$t3 0x0000 FFFF

a.  and $t0, $t1,$t2

b.or $t0, $t1, $t3

c. nor $t0, $t1, $t2

d. xor $t0, $t1, $t3

Critical Threats to the Global Environment

 

Overview

The United Nations has continued to retain you as a consultant for a project that deals with climate and the environment. Most developed countries see the dangers of releasing too much carbon dioxide into the atmosphere and are committed to climate policies that attain a carbon-free future in the next 30 years. They already see the damaging effects that this gas alone is having on the living conditions of crops, wildlife, and humans. As a result, many member states are dissatisfied with the progress of the eight Millennium Development Goals for international development that they established in 2000. The member states see a substantial disconnect between several issues that developed and developing countries believe are priorities. For example, Burundi wants one of the goals to focus on food security, while Austria is adamant that a major global issue should be the negotiation of ceasefires in countries in the midst of civil wars. The UN wants you to work from the list below and prioritize two of the global community’s threats that it deems the most serious to environmental stability.

Instructions

Step 1

Select two threats. Listed below are eight issues that the UN feels pose the most significant threats to global security. Some of these apply to the Earth’s 7.7 billion people, while others are limited primarily to developing countries. Regardless of where these threats are concentrated, your job as a consultant is to identify two of them that you consider the most critical to the globe’s population.

Issue Options
  1. The use of fossil fuels as an energy source.
  2. Globalization.
  3. Insufficient educational opportunities in developing countries.
  4. A lack of access to technology.
  5. Civil war (NOT the U.S. Civil War).
  6. The rise in oceans’ levels.
  7. Covid-19 and the global pandemic.
  8. The dangers of poor countries remaining poor.
Step 2

Write a minimum of an 8 page persuasive paper about your two threats.

Write an introduction paragraph of at least one-half page in length identifying the two threats you have selected and the purpose of the paper. Then, for the two threats you chose:

  1. Identify the factors that make it such a serious risk to the global environment that you would choose to present it to the UN.
  2. Analyze the role that humans have played in aggravating this threat to the Earth’s environment.
  3. Suggest initiatives that the global community can take to mitigate the worst effects of this environmental threat.
  4. Write a conclusion paragraph of at least one-half page in length that summarizes your impressions of these risks for global stability.

software system design jan 27

I have mentioned several times that you will be doing a team project this semester…lots to do in the project and lots to manage…

You have all worked on team projects in the past…and some of you (okay, most of you…okay, all of you) have expressed concerns over doing a team projects…and you have talked about the many issues and problems that go along with a team project…

But we won’t let that happen this semester!…because this semester, we have the choice of managing the project as with waterfall or agile…

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think would work better in school projects – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding SPECIFIC class projects and SPECIFIC class project tasks, and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…

DO NOT GIVE ME DEFINITIONS…

Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Lab Paper

  identify the scope for an IT risk-mitigation plan, you will align the plan’s major parts with the seven domains of an IT infrastructure, you will define the risk-mitigation steps, you will define procedures and processes needed to maintain a security baseline for ongoing mitigation, and you will create an outline for an IT risk-mitigation plan 

Cyber Tactics Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

In 2014, Upsher-Smith Laboratories was targeted by cyber-criminals who employed a business email compromise phishing scam. The cyber-criminals successfully sent emails to the company’s accounts payable department requesting several wire transfers in the amount of $39 million dollars. The emails appeared to originate from the business’s CEO. When the scam was eventually discovered, Upsher-Smith Laboratories took steps to stop all of the wire transfers but were only able to recall one of nine transfers. Had the last transfer been submitted, the cyber criminals would have netted $50 million dollars from Upsher-Smith Laboratories.  The attack was extremely successful, and the perpetrators of the attack were never identified. Upsher-Smith Laboratories appears to still be in ligation with its own bank whom they are suing for facilitating the transfer. This type of phishing attack is commonly known as Whaling or CEO Fraud. This type of attack targets CEOs and the information obtained from such an attack can be used to authorize fraudulent wire transfers to a financial institution of their choice or  conduct “W-2 phishing in which they request W-2 information for all employees so that they can file fake tax returns on their behalf or post that data on the dark web.” Effective countermeasures to mitigate the impact of such an attack include setting up a multifactor authentication system so that there is not a single point of failure with respect to wire transfers. Perhaps the most effective countermeasure is targeted employee and CEO training.

Phishing Case Studies: Learning From the Mistakes Of Others. “Phising Protection”. Accessed 26 May 2021 https://www.phishprotection.com/blog/phishing-case-studies-learning-from-the-mistakes-of-others/

Bisson, David. 6 Common Phishing Attacks and How to Protect Against Them “The State of Security”. Accessed on 26 May 2021 https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/

-LAUREN

RESPONSE 2:

Phishing attacks have become very common with advancements in technology and cyber attacks. One phishing attack that was very successful is called the Pickachu virus. Pikachu virus was designed target younger generation of children by sending malicious links to anime Pikachu. The phishing attack was designed to damage the configuration files within computer and directory files once executed ( Kate Johanns June 30th 2017 ). The phishing email spread throughout all outlook and eventually infected millions of computers once executed like Worm. The pikachu virus was designed to be friendly for children but was infected with malicious intent to damage victim computer. 

The pikachu virus was very successful because it targeted less aware community by infecting their computers. The virus that spread though emails was classified as being low risk because after reboot it asked for permissions to effect the computer. The virus was considered to be worm that was attached to phishing email and was highly effective. Millions of users were infected and fell victim to this phishing email. The Pikachu virus would not take affect on victims computer until reboot and all configuration file would be deleted by Pikachu virus. The person that actually wrote the virus was never caught and still to this day is unknown. The best counter measures to Blocking this attack would have been update anti virus and essential user training to younger generation to avoid this type attack. It’s important for younger generation to understand the dangers of the internet and how it works. 

Kate Johanns ( 2017 June 30th ) “Tech Time Wrap: The Pikachu virus is not your friend” Smarter MSP 

-MICHAEL

Machine Learning – Develop a model to Measure Media Bias in News Outlets

 1. Develop a machine learning model to measure the political bias in News articles by different media houses
 

( References
 

https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0271947
 

https://www.unite.ai/mit-measuring-media-bias-in-major-news-outlets-with-machine-learning/
 

https://towardsdatascience.com/news-and-media-bias-detection-using-machine-learning-a-potential-way-to-find-fake-news-13c766aa3988
 

)
 

2. Complete working source code in Python ( Preferably should be able to  run the code in Local Machine, otherwise any cloud solution is also  fine)
 

3. Complete instructions to setup(if any) and run the code
 

4. Documentation of the code and workflow
 

5. Presentation slides 

Evidence Collection Policy

Evidence Collection Policy

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1.  What are the main concerns when collecting evidence?

2.  What precautions are necessary to preserve evidence state?

3.  How do you ensure evidence remains in its initial state?

4.  What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§  Description of information required for items of evidence

§  Documentation required in addition to item details (personnel, description of circumstances, and so on)

§  Description of measures required to preserve initial evidence integrity

§  Description of measures required to preserve ongoing evidence integrity

§  Controls necessary to maintain evidence integrity in storage

§  Documentation required to demonstrate evidence integrity

Required Resources

§  Internet access

§  Course textbook

Submission Requirements

§  Format: Microsoft Word (or compatible)

§  Font: Times New Roman, size 12, double-space

§  Citation Style: APA

§  Length: 2 to 4 pages

Self-Assessment Checklist

§  I created a policy that addressed all issues.

§  I followed the submission guidelines.

IG W 4 D2

 

Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.