Principles of Facility Design

1. Your organization has a safe for storing corporate laptops when they are not being used. As part of the security plan, you must ensure that the safe engages an extra lock if the safe’s temperature exceeds a certain level. This will provide protection against drilling. Which type of lock should you implement?

A. Passive relock

B. Active relock

C. Thermal relock

2. Which intrusion detection system (IDS) uses a magnetic field to detect intrusions?

A. A proximity detector

B. A passive infrared system

C. An acoustical detection system

3. Your data center has its own lock to prevent entry. Your organization’s security plan states that the lock to the data center should be programmable. Which type of lock should you use?

A. Cipher lock

B. Mechanical lock

C. Tumbler lock

4. Which statement is true of lighting of critical areas?

A. Critical areas should use trip lighting and be illuminated ten feet in height to four foot-candles.

B. Critical areas should use standby lighting and be illuminated ten feet in height to two foot-candles.

C. Critical areas should use continuous lighting and be illuminated eight feet in height to two foot-candles.

5. Which option is NOT an administrative control for physical security?

A. Personnel control

B. Intrusion detection

C. Facility management

6. Your organization has asked that you reassess the organization’s security plan to see if it fully addresses crime and disruption prevention through deterrence. Which security mechanism covers this issue?

A. Law enforcement notification

B. Fences

C. Smoke detectors

7. Which technologies are considered remote-sensing technologies?

a. unmanned aircraft

b. manned aircraft

c. satellites

d. land-based cameras

A. option a

B. option b

C. option c

D. option d

E. options a, b and c only

F. options b, c, and d only

G. all of the options

8. You want to ensure that employees can use a code to alert the proper authorities when they are under duress. With which physical security measure can this be used?

a. cipher lock

b. security guard

c. combination lock

d. biometric system

A. option a

B. option b

C. option c

D. option d

E. options a and b only

F. options c and d only

9. What is the FIRST priority when responding to a major security incident?

A. Containment

B. Monitoring

C. Restoration

10. Although control effectiveness has recently been tested, a serious compromise occurred. What is the FIRST action that an information security manager should take?

A. Evaluate control objectives

B. Perform a root cause analysis

C. Develop more stringent controls

11. Which of the following is a key component of an incident response policy? 

A. Updated call trees

B. Escalation criteria

C. Press release templates

12. Why should an incident management team conduct a post incident review?

A. To identify the hacker

B. To identify affected areas

C. To identify lessons learned

Appcelerator Titanium

Appcelerator Titanium was released in December 2008, and has been steadily growing in functionality since its release. Starting with its Titanium Developer product, Appcelerator provides a single-point interface to run applications. Titanium Studio is a full-featured IDE which provides a single place to handle all steps of the development environment including a debugging solution.  Titanium is not a magic bullet; however, it does include a solid framework for developing a single codebase to deploy to multiple platforms.  In addition, it allows developers to use a language they are more familiar with to create apps in a domain outside of their knowledge.

  • What are some advantages to using Appcelerator Titanium?
  • Though Appcelerator is reasonably priced, why do some mobile app developers feel that the bugs don’t make it worth the effort?.
  • How is Appcelerator different from other mobile application developerment?

Module 7 Writing Assignment

 600 words

In order to find the best design for your documents or site it is important that you have a firm grasp on what your goals are for any piece of writing. Do you want to entertain, to sell, to perform a task, or to teach? You must also keep your rhetorical strategy in mind as you consider document design. Are you planning to focus mainly on logos, pathos, or ethos? Perhaps you are trying to balance all three. What is the age and demographic of your target audience? What are their needs in relation to the document? Do they have a disability? Do they come from a different culture?

Select a technology oriented site (examples: Apple, Amazon, Intel) and review the site in the light of the design principles

The assignment is based off chapter 11

Need help in Homework in Info Governance

  

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

Given Scenario:::: The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

4 page research paper

  Write a four (4) page research summary paper in APA format in which you:  

  • Investigate alternative tools and frameworks for building web services (do not use ASP.NET)
  • Talk about specific tools, ie software platforms, OSes, and computing architectures 
  • What software is needed and compare this with other common approaches for Mobile development
  • To what community/constituent group (personal or enterprise) is this type of Mobile development targeted
  • Argue the need for cross-platform Mobile development frameworks.

Programming with C++

2 different assignments. Need them finished in 10 to 12 hours. 

1-Please  complete the following assignment using visual studio and upload the project or .cpp file:

Instructions: Write a cpp program to print “Hello, World!

—————————————————————————————————-

2- Archie wants a program that calculates and displays a team’s final score in a football game, given the numbers of the team’s field goals, touchdowns, one-point conversions, two-point conversions, and safeties. First, create an IPO chart for this problem, and then desk-check the algorithm twice. For the first desk-check, use 3, 2, 2, 0, and 1 as the numbers of field goals, touchdowns, one-point conversions, two-point conversions, and safeties. For the second desk-check, use your own set of data. After desk-checking the algorithm, list the input, processing, and output items in a chart similar to the one shown in Figure 3-25(SEE ATTACHED BELOW), and then enter the appropriate C++ declaration statements.

 Save your document(cpp file) with the name football followed by your initials. Example football-rf.cpp 

quiz14

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

CIS 415 Unit 4 Assignment: Globalcom Case Study

 3 page apa  follow pdf

Read: “Globacom Invests in Its Mobile Network Infrastructure in Africa.” (Text, Chapter 4).

• In your own words, give a brief synopsis of the case.

• Answer all three questions after the case study clearly, concisely and completely.

o Each question answer should be at least 3 paragraphs.

o Each question

Questions for the Lab

  

Questions for the Lab

1. Carefully read the lab instructions in document and finish all tasks.

2. If a packet is highlighted by black, what does it mean for the packet?

3. What is the filter command for listing all outgoing http traffic?

4. Why does DNS use Follow UDP Stream while HTTP use Follow TCP Stream?

5. Using Wireshark to capture the FTP password.

Use the FTP site ftp://test.rebex.net/

The username for the FTP server is “demo”, and the password is “password”.

You will use the username and password to login the FTP server while

Wireshark is running. Note that the FTP server is a public FTP server, make sure you select the right interface for the capturing. You need to explain to me how you find the password and a screenshot of the password packet. Have fun!

Cloud Vendor Presentation

 

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • One References slide.
  • All slides must be narrated by you, the student.