CIA

Create a 6 – 8 slide MS PowerPoint® slide deck for a presentation that you will give to students just beginning their training in cybersecurity.

Your slides will need to provide enough information to these new students in order to fully explain. Include the following points:

  • The importance of confidentiality and integrity in professional IT security practice
  • How security measures in relation to system availability
  • The relationship between poor security implementation and policy to decreased levels of integrity and confidentiality

In this assignment

  

In this assignment, you will be modifying the ‘mfs’ (minix file system).

I-‐nodes in the Minix file system contain 3 times – time of file content modification, time of last access, and time that the i-‐node information has been last changed. There is no file creation time stored in the i-‐node. Modify Minix to change the meaning of the ‘last change in i-‐node information’ time to ‘file creation time’. In places in Minix where only the ‘last change in i-‐node information’ changes, make that change reflected in the file modification time. Verify your changes by creating a file, noting the creation time, then modifying the file contents and/or the i-‐node information and checking these various times, assuring that the file creation time does not change (the ‘ls’ command has the options necessary to check each of these times).

create a project

The purpose of the project proposal is to describe a project (i.e., to describe how to automate or improve the automation of a specific business process) and then to explain how completing the project will positively affect the business.

Once a project proposal is accepted, project work can begin; therefore, a successful project proposal must include all of the information necessary for stakeholders to make a go/no-go decision, including a statement of scope, a list of the benefits you expect the proposed project to provide, and a rough estimate of how long it will take and how much it will cost to complete the project.

For this assignment, you will create a 3- to 4-page project proposal for the business scenario you selected earlier this week and that was approved by your instructor. For your project proposal, be sure to:

  • Complete the Project Proposal Template based on the business scenario you selected (and that was approved by your instructor) earlier this week. If you prefer, you may re-create the template using another software application of your choice, such as Microsoft Excel®.
  • Develop a project definition and scope that defines the project and articulates the business context for the project.
  • Identify problems that the proposed system is expected to solve (or opportunities the proposed project is expected to produce).
  • Create project objectives.
  • Create the project methodology or game plan.
  • Compile a high-level schedule for completing the project scope.

website development

Can you develop a doctor appointment booking website that provides patients or any user to log in and creates an account same for the doctor? If the patient logins, then he can have access to view his details, book appointments, cancel the appointment, doctor details in the same way if the doctor logins he can view his appointments and patient id. , it is completely related to personal details of patient like patient id which is unique to each patient and includes its name, gender, phone number and age. So, by having had this patient details in the data base it will be easy for the doctor to get his previous record by his unique Id. And whenever a patient books his appointment with his id his details can be recorded.

 In the 3rd screen,which is the  main part of the project, after the patient login we are having a screen to book appointments when he opens he can enter his booking id which is his patient id and we are having categories as different patients will have different problems according to that they have to consult the doctor so inthis categoryr,y we are having different options like bone ,a  cardiac, neurologist .We willl are alsohaving the option to select the doctors by their names.

We are having a date option so the patient can book on days for supposing the appointments are filled it will display in the calendar.

Problem 14- Org behavior

1. What is work specialization? Discuss its advantages and drawbacks.

2. Describe the characteristics, advantages, and disadvantages of a virtual organization

at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Site surveys allow you to

  

Site surveys allow you to place access points in locations that provide an optimum signal without resorting to trial and error. Conducting a site survey is a critical component of properly designing and installing a wireless LAN. Every building is unique; therefore, a network consultant should always do a thorough walkthrough to analyze signal strength and to identify any objects that might cause interference. In this assignment, you will analyze five office floor plans. The data you gather will assist you in completing your final project. As you analyze each plan, consider what objects or materials affect the signal strength, why they do so, and what you can do to overcome their interference. Resource: Ch. 15 of CWNA Certified Wireless Network Administrator Official Study Guide; Analyze the five floor plans in the Floor Plan Site Survey exercise located on the student website. Each plan has only one access point placed in the data center of each building. The location of the data center may not always be ideal for optimum signal coverage, so you will use this survey to determine where to place other access points as needed. Complete Appendix E. Post your assignment as a Microsoft® Word attachment.

Case Study

Society is becoming increasingly dependent on computers and technology for functioning in every day life. Every aspect of our lives has been affected by the infiltration of computers and technology. Computers are used to conduct business from home, meet new friends and find old friends, maintain communications with distant family, and to met out some stress relief after a long day at the office. As more and more people rely on computers to succeed each day, it begs the question – are people becoming too dependent on computers, your paper should look at either the historical changes that shook up society or future changes being developed now that will shake up society?

Submission Instructions:
Please answer the question with a minimum of 500 words APA format. At least (2) APA reference. 100% original work. no plagiarism. 

Discussions and Research paper

Discussion 1:

  Discuss  the advantages and disadvantages of each type of testing. When is each  type of testing appropriate? Are there situations that preclude the use  of a particular type of testing?   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Discussion 2:

 Security awareness training is often the  first view a typical user has into information security. It’s often  required for all new hires. Think of it as the first impression of  management’s view of information security. This is management’s  opportunity to set the tone. Most individuals want to do a good job, but  they need to know what the rules and expected behavior are. That is one  of the purposes of a security awareness policy. Answer the following question(s): 

  1. What do you think are the two most important practices that should be incorporated into a security awareness policy?
  2. Why do you rank them so highly?

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Research paper:

  What  kind of user training should be conducted to deal with the issue of  noise (electrical). How do you strike a balance between being  overwhelmed with false positives and the danger of ignoring true  incidents? What effects would false positives have on an organization?  Make sure to cite your sources.   ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

Labs:

please see the attachment and answer 

Conducting and Reporting an IT Infrastructure Compliance Audit

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

1. What are the skills related to IT Auditing? List and describe 3 areas

2. What are examples of Auditor’s Standards of Practice? Which organizations have issued standards or guidance to the auditor?

3. Why are the “Equity Funding” and “Enron” events so important to computer auditing?

4. What are the differences in “auditing through the computer” versus the more traditional book and records audit?