Implementing Security Audits

 Discuss whether internal security audits are enough for an organization or do they need to perform external audits as well. Also discuss in which scenarios the external audits are mandatory to perform. 

Evaluating Research Articles

 Assignment:

  • Find and then evaluate a Research article – Mobile technology preferred; but any technology topic is acceptable (must follow APA and these formatting requirements:)
    • Write a four – six (4-6) page paper that evaluates a research article that you found – your paper should be: typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. See hand-outs provided on graduate and APA style research papers.
    • State the name of the article you found, use the questions below as context for evaluating your article; discuss what this article about; cite this article and include it in your reference list.
    • Use at least four different quality resources in this assignment. Note: Wikipedia, Blogs, Info articles, and similar Websites do not qualify as quality resources for research writing.
    • Include a cover page containing: the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference pages do not count toward the page count. Review the Helpful Information provided related to critical thinking and also follow the hand-outs provided in this folder.

Please use the example “Guidelines for Evaluating your Research Article” as your guide in addressing the questions below: 

  • What is an Information Technology Project?
  • What makes research writing different that ordinary information/observation writing? 
  • Identify & explain the major components of a research paper format.
  • What components of a research format is included in your article, and
  • How does this format contribute to the purpose of the writing?
  • Why use Peer Reviewed journals in research?
  • Why are keywords used during the Literature Review process?
  • Why use/apply APA basic citation style in your writing assignments?
  • Why is academic integrity important (see syllabus)?

You are tasked with creating

  

Coding Assignment # 5 – Recipe Hunter 

You are tasked with creating a Rails app that will display a recipe index based on a keyword entered. 

1. Create a rails app called recipe_hunter 

2. Generate RecipesController (recipes_controller.rb) that will have an index action 

3. The above-mentioned controller should check if a request parameter keyword was passed in. 

4. If it was – it should use it, and if not – it should use a default value of “chocolate” instead. 

5. Create a model, Recipe (recipe.rb) that will contain a for class method that will take a 

keyword to query and query the Recipe Puppy API. (You should already have the Recipe class 

from the previous assignment. Remember, that unlike the previous assignment – you will not 

need to require ‘httparty’ gem in your code, since loading HTTParty gem should be the Bundler’s 

job.) 

6. Create your view (with CSS – use your imagination) that might look something like this: 

7. I should be able to click on either the title or the thumbnail and go straight to the actual recipe 

(out there on the web). Look at image_tag helper for defining an img tag and use this helper 

as the first argument to link_to helper. 

8. Rails automatically escapes HTML in your strings (mainly to avoid XSS attacks 

http://en.wikipedia.org/wiki/Cross-site_scripting). Because of this – some of your titles will look 

wrong. 

Rails has a sanitize (or raw) helper that will help you display HTML characters properly 

9. Instead of having to go to http://localhost:3000/recipes/index all the time – you want this page 

to be the default. So, you should be able to go to http://localhost:3000/?keyword=apple%20pie 

and see the following 

Submission Guidelines 

1. Commit all the files to your local repo and push your repo out to your private team repo on 

github creating a remote branch called assignment5. 

2. For this assignment, it might make the most sense to work on a master branch of a newly 

created repo and then do $git push remote_alias_github

master:assignment5 to push it out to github. 

3. Deploy your homework to heroku (WARNING: Heroku only allows pushing to a remote master 

branch) using a URL pattern of jhu-spring17-teamX-recipes.herokuapp.com (where X is your 

team number). 

4. Feel free to include a README.txt with any comments, as well as your deployed assignment URL 

wk-8 discussion

 Describe some ways that an organization can recover it’s IT resources from a natural disaster (fire, flood, hurricane, tornado etc.). What controls should have been in place in order to be able to retrieve this data? 

Cloud computing

 

cloud computing: Week 6 Executive Practical Connection Assignment

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?

• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 2 (Chapter 24): What are the main characteristics of NOSQL systems in the area related to data models and query languages? OR What are the main characteristics of NOSQL systems in the area related to distributed systems and distributed databases?  Pick ONE questions to answer for your initial contribution. 

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Discussion Reply!!! About 50 words

  

  • Review  contributions to threats and  vulnerabilities on a home network and determine if they have gaps in  their understanding.
  • Provide feedback on a classmate’s home  network security measures they are not currently using. Do you have any  other suggestions or recommendations for them?

What threats do you need to be concerned about on your home network?

Some threats that you should be concerned about are Ransomware,  Information Theft, Data Breaches, Malicious Ads, and Remote Access Tools  (RAT). Some of these threats you would think are targets for just big  companies.  There might be a young hacker trying to make a name for  themselves or wanting to settle a score with somebody.  Every threat  needs to be taken seriously and guarded against you never know who the  next victim of a hack will be.

What are the vulnerabilities of each of your devices on your home network

Almost every device has a vulnerability one way or another.  The more  devices you have on your network the more vulnerable you are. Opening  the wrong email on either a smartphone, computer, or even a smart tv can  infect your network.  Depending on what IoT devices you have on your  network your whole house could be vulnerable.  For example, you have an  attached garage to your house, and you never lock the door between your  house and the garage.  You have your garage door opener linked to your  network and you get hacked with a RAT they can now gain access to your  house while you are away and rob you and there would not be any form of  forced entry into the house.  You would just think you forgot to lock a  door somewhere and that is how they got in; little do you know they used  the garage door to gain access into the house.  

What techniques can you use to protect your devices on your home  network? (Make sure to discuss how you will protect your network traffic  on your wireless network.)

Some good techniques to use to protect your devices is having a good  virus scanning software that scans your computers and network throughout  the day and will alert you of any possible treats that tried to gain  access to your network.  Keeping your software up to date will keep you  safer while on the internet and on your network; everyday there are new  ways to attack you if you do not keep up with the updates the software  will look past it as something that is vicious and can hurt your  network.  Change passwords from time to time, and never make it close to  the old password.  I have noticed a lot of online services requiring  you to come up with a more complicated password to keep your information  safe with using special characters. Do not use the same password for  everything.  You can use a VPN to help disguise your network and make it  harder to find and hack.

Discuss some home network security measures you are not currently using but may consider using.

I should change my passwords more often than what I do, and I am also  guilty of using almost the same password for everything because it is  easier to remember.  I know by doing this I put myself at risk of a lot  of things being hacked but with so many online services and accounts I  have it makes it easier to access them for me and not have to reset my  password every month.

References:

Trend Micro, (2017, February 20). Common Threats to Home Users and How to Defend Against Them

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/threats-to-home-users-and-how-to-defend-against-them

Portfolio Assignment

 

This week discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work

data management

 Question 4 – Theory (15 marks) 

(a) Briefly explain any three data analysis and presentation software.

 (b) List any five issues faced by a data analyst in the process of analyzing the data. 

(c) Briefly explain Google Colab. Use Python and any dataset of your choice and explain one example (analysis/visualization) done using Colab.