Help3

 

Using MS PowerPoint, create a 7- to 10-slide presentation to communicate the goals and objectives of the security program described in your “Enterprise Security Program” assignment to the fictitious company previously selected.

The presentation must include:

  1. An appropriate cover slide and title that represents the company and the purpose of the presentation.

  1. Design elements from your “Enterprise Security Program” assignment.( Help2)

  1. Implementation Timelines: Use a phased approach for the various characteristics described (see “ITT-430: Security Program Roadmap Timeline Example”). (SEE ATTACHMENT)

  1. Roles and Responsibilities: List the titles and/or departments responsible for the implementation and management of each characteristic.

  1. Include in your presentation all security controls that have been deployed (e.g., polices, cryptographic protocols, etc.) in your enterprise security program.

  1. Describe the maintenance that is necessary to ensure effective and efficient information technology (IT) system performance and security within your enterprise security program.

  1. Analyze any security failures, and identify specific design principles that would be violated for incorrectly deployed security controls.

  1. Additionally, review the previous assignment’s controls, laws, and standards established to supplement the presentation.

Exp19_Excel_Ch07_HOEAssessment_Employees

 

Exp19_Excel_Ch07_HOEAssessment_Employees

 Home>Computer Science homework help

Exp19_Excel_Ch07_HOEAssessment_Employees

Project Description:

You work for a clothing distributor that has locations in Iowa, Minnesota, and Wisconsin. You will use date and logical functions to complete the main employee data set, use database functions to calculate key summary statistics and create a map, and use financial functions to complete a loan amortization table.

Start   Excel. Download and open the file named Exp19_Excel_Ch07_HOEAssessment_Employees.xlsx. Grader has automatically added   your last name to the beginning of the filename.

The 1-Data worksheet contains   employee data. You will insert several functions to complete this worksheet.   Column C contains the actual hire dates for the employees. You want to   extract only the year in column G.
 

  In cell G9, insert the appropriate date function to extract the year from the   date in cell C9. Copy the function from cell G9 to the range G10:G33.

Next, you want to determine how   many years each employee has worked for the company.
 

  In cell H9, insert the YEARFRAC function to calculate the years between the   hire date and the last day of the year contained in cell G2. Use a mixed   reference to cell G2. Copy the function from cell H9 to the range H10:H33.

You want to determine what day   of the week each employee was hired.
 

  In cell I9, insert the WEEKDAY function to display the day of the week the   first employee was hired. Use 2 as the return_type. Copy the function from   cell I9 to the range I10:I33.

The value returned in cell I9 is   a whole number. You want to display the weekday equivalent.
 

  In cell J9, insert a VLOOKUP function to look up the value stored in cell I9,   compare it to the array in the range H2:I6, and return the day of the week.   Use mixed references to the table array. Copy the function from cell J9 to   the range J10:J33.

Column D contains the city each   employee works in. You want to display the state.
 

  In cell F9, insert the SWITCH function to switch the city stored in cell D9   with the respective state contained in the range C2:C4. Switch Des Moines for Iowa, St. Paul for Minnesota, and Milwaukee for Wisconsin. Use mixed   references to cells C2, C3, and C4. Copy the function from cell F9 to the   range F10:F33.

Your next task is to calculate   the bonus for the first employee. If the employee was hired before 1/1/2010,   the employee’s salary is multiplied by 3%. If the employee was hired before   1/1/2015, the employee’s salary is multiplied by 2%. If the employee was   hired before 1/1/2020, the employee’s salary is multiplied by 1%.
 

  In cell K9, insert the IFS function to create the three logical tests to   calculate the appropriate bonus. Use mixed references to cells within the   range K2:L4. Copy the function from cell K9 to the range K10:K33.

Top management decided to ensure   all representatives’ salaries are at least $62,000 (cell G2).
 

  In cell L9, nest an AND function within an IF function. If the job title is Representative   and the salary   is less than the minimum representative salary, calculate the difference   between the minimum representative salary and the actual salary. If not,   return zero. Use a mixed reference to cell G3. Copy the function from cell L9   to the range L10:L33.

The 2-Summary worksheet contains   data to insert conditional math and statistical functions to provide summary   data. First, you want to count the number of employees in each state.
 

  Click the 2-Summary worksheet. In cell J3, insert the COUNTIF function to   count the number of employees in Iowa, using the state abbreviation column   and the state abbreviation in cell I3. Use mixed references for the range and   cell to keep the row numbers the same. Copy the function from cell J3 to the   range J4:J5.

Next, you want to calculate the   total payroll for each state.
 

  In cell K3, insert the SUMIF function to total the salaries for employees who   work in Iowa, using the state abbreviation column and the state abbreviation   in cell I3. Use mixed references for the ranges and cell to keep the row   numbers the same. Copy the function from cell K3 to the range K4:K5.

Next, you want to calculate the   average salary for executives and the average salary for representatives.
 

  In cell J8, insert the AVERAGEIF function to calculate the average salary for   executives. Use mixed references to the range and for the cell containing   Executives. Copy the function to cell J9.

You want to identify the number   of representatives hired before 1/1/2015.
 

  In cell J12, insert the COUNTIFS function to count the number of   representatives who were hired before 1/1/2015. Use ranges for the criteria   ranges and the reference to cell H9 that contains Representatives. Enter the   date condition directly in the criteria box.

In cell J13, insert the SUMIFS   function to calculate the total salaries for representatives hired before   1/1/2015. Use ranges for the criteria ranges and the reference to cell H9   that contains Representatives. Enter the date condition directly in the   criteria box. Use mixed references to the ranges and cell reference so that   you can copy the function in the next step.

Copy the function from cell J13   to the range J14:J16. Edit the function in cell J14 to calculate averages.

Edit the function in cell J15 to   calculate the lowest salary.

Edit the function in cell J16 to   calculate the highest salary.

Insert a map to display total   salaries by states.
 

  Select the ranges I2:I5 and K2:K5 and insert a filled map. Change the chart   title to Payroll by State. Cut the chart and paste it in cell M1.

The 3-Finance worksheet contains   inputs for a loan.
 

  In cell F2, insert the PV function to calculate the loan. Use cell references   in the Input Area and Basic Output Area.

You are ready to insert formulas   and functions in the loan amortization table.
 

  In cell C7, enter a reference to the Payment that is stored in cell D2. Use   mixed reference so that the row number does not change. Copy the formula from   cell C7 to the range C8:C42.

The next column is designed to   display the interest portion of each payment.
 

  In cell D7, insert the IPMT function to calculate the interest for the first   payment. Use mixed references for cells in the Basic Output Area and make   sure the result is a positive value. Copy the function from cell D7 to the   range D8:D42.

Next, you are ready to calculate   the portion of the monthly payment that goes toward the principal.
 

  In cell E7, insert the PPMT function to calculate the principal portion of   the first payment. Use mixed references for cells in the Basic Output Area   and make sure the result is a positive value. Copy the function from cell E7   to the range E8:E42. 

Now you are ready to calculate   the balance of the loan after each payment.
 

  In cell F7, enter a formula to calculate the ending balance after subtracting   the Principal Repayment from the Beginning Balance. Copy the formula from   cell F7 to the range F8:F42.
 

  In cell B8, enter a formula that refers to the ending balance for the   previous month in cell F7. Copy the relative formula to the range B9:B42.

Now you want to calculate the   cumulative interest after each payment.
 

  In cell H7, insert the CUMIPMT function. Use mixed references for cells in   the Basic Output Area and the Start_period argument. Make sure the result is   a positive value. Copy the function from cell H7 to the range H8:H42. 

Finally, you want to calculate   the cumulative principal after each payment.
 

  In cell I7, insert the CUMPRINC function. Use mixed references for cells in   the Basic Output Area and the Start_period argument. Make sure the result is   a positive value. Copy the function from cell I7 to the range I8:I42.

Insert a footer on all three   sheets with your name on the left side, the sheet name code in the middle,   and the file name code on the right side.

Save and close Exp19_Excel_Ch07_HOEAssessment_Employoees.xlsx.   Exit Excel. Submit the file as directed.

Re-do

 Q1. Research paper: 5 pages ——- Separate Document
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook.  At least Five of the references cited need to be  peer-reviewed scholarly journal articles from the library.  Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Q2: Practical Connection – 550 words ——- Separate Document Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 2 full pages double spaced minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Q3.  Research paper: 5 pages This week, you have to read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. 
 Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Assignment

Labs 2240…..8

  

  • Module 8 – EC Lab 1
    • Visit the following site:
    • Module 4:Problem Statement:  4.3.1.15 LAB: Character frequency histogram==============================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)
    • ==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Module 8 – EC Lab 1) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Module 8 – EC Lab 1
    4. Locate your Python program (Module 8 – EC Lab 1 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
  • AssignmentModule 8 – EC Lab 2
    • Visit the following site:
    • Module 4:Problem Statement:  4.3.1.16 LAB: Sorted character frequency hist===============================================================================================Submit your Python solution through Blackboard (as explained below).
      Your lab will be graded on whether it’s been set up as a complete and workable solution.

      For your solution to be complete, your program must be able to

    • Set up your script based on the given specifications
    • compile (ie, no syntax error(s))
    • run (ie, no run-time error(s))
    • For your solution to be workable,
    • Your solution should be free of any type of errors (syntax, run-time, logic)
    • you may want to develop an algorithm first, using pseudocode
    • you do NOT need to turn in any algorithm
    • ==========================================================================================================================Grading rubric:
      • You’ll receive full credit, if 
        • your program
          • compiles and runs with no problems 
          • produces the expected output
      • You’ll receive partial credit, if 
        • your program
          • compiles and runs with no problems 
          • produces partial output (that is, incomplete output)
    • You’ll receive 25% of the points, if your program will not compile
    • You’ll receive 30% of the points, if your program compiles but has a run-time problem
    • You’ll receive 40% of the points, if your program produces logic error(s)
    • ==========================================================================================================================What to submit:
      • Your Python solution as a text file
      • A screenshot of a run of your program, showing the output
    • How to submit:
    1. Save your Python program (Module 8 – EC Lab 2) as a text file to your computer
    2. Save a screenshot of a run of your program, showing the output
    3. Click on the above link: Module 8 – EC Lab 2
    4. Locate your Python program (Module 8 – EC Lab 2 file) on your computer
    5. Locate your screenshot of the run of your program
    6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
    7. Click on SUBMIT
    8. NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions.

Module 8 – EC Lab 3

Module 4:Problem Statement:  4.3.1.17 LAB: Evaluating students’ results ================================================================================================Submit your Python solution through Blackboard (as explained below).
Your lab will be graded on whether it’s been set up as a complete and workable solution.

For your solution to be complete, your program must be able to

  • Set up your script based on the given specifications
  • compile (ie, no syntax error(s))
  • run (ie, no run-time error(s))

For your solution to be workable,

  • Your solution should be free of any type of errors (syntax, run-time, logic)
  • you may want to develop an algorithm first, using pseudocode
  • you do NOT need to turn in any algorithm

==========================================================================================================================Grading rubric:

  • You’ll receive full credit, if 
    • your program
      • compiles and runs with no problems 
      • produces the expected output
  • You’ll receive partial credit, if 
    • your program
      • compiles and runs with no problems 
      • produces partial output (that is, incomplete output)
  • You’ll receive 25% of the points, if your program will not compile
  • You’ll receive 30% of the points, if your program compiles but has a run-time problem
  • You’ll receive 40% of the points, if your program produces logic error(s)

==========================================================================================================================What to submit:

  • Your Python solution as a text file
  • A screenshot of a run of your program, showing the output

How to submit:

  1. Save your Python program (Module 8 – EC Lab 3) as a text file to your computer
  2. Save a screenshot of a run of your program, showing the output
  3. Click on the above link: Module 8 – EC Lab 3
  4. Locate your Python program (Module 8 – EC Lab 3 file) on your computer
  5. Locate your screenshot of the run of your program
  6. upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
  7. Click on SUBMIT

NOTE: You can make your submission just ONCE.  So, before making your submission, ensure that it does not need any additional editing/revisions. 

Exp19_Access_Ch07_CapAssessment – Loan Payments 1.0

Exp19_Access_Ch07_CapAssessment – Loan Payments 1.0 

Exp19 Access Ch07 CapAssessment Loan Payments 1.0 

EX19_AC_CH07_GRADER_CAP

Access Chapter 7 Capstone Assessment – Loan Payments

  

Project Description:

A lending firm asked you to assist them in updating the database they are using to keep track of their loans. The department requires a form that can be used to find information but not change information. In addition, you will enhance an existing form and generate a report showing which customers have each type loan.

     

Start   Access. Open the file named Exp19_Access_Ch07_CapAssessment_Loan_Payments.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

Select   the Loans table and use the Form tool to create a new form. Change the title   to View Loans. Delete the Payments subform.

 

Change   the Allow Edits, Allow Additions, and Allow Deletions settings to No. View   the form and data in Form view. Save   the form as View Loans   and close the form.

 

Open   the Update Loans form in Design view. Change the Type field to a Combo Box.   Set the Row Source to LoanTypes and the Limit To List property to Yes.

 

Fix   the tab order so the Term field comes immediately before the Type field. Save   and close the form.

 

Open   the View Loans form in Design view. Add a new label control in the left-side   of the form footer that displays the text Loan information   is considered sensitive and private. All printouts should be shredded after   use.   (include a period). Change the font color to Black, Text 1 and bold the text.   Save and close the form.

 

Create   a new report using the Report Wizard based on the Loans table. Select the   LoanID, Date, Amount, InterestRate, and Term fields, in that order. Accept   all other default options.

 

Switch   to Layout view. Add grouping by the Type field. Switch to Design view. Switch   the option to with a footer section   in the Group, Sort, and Total pane. Use the pane to also display the count of   the LoanID field in the Group Footer section.

 

Use   the Insert Page Break control at the bottom of the Type footer.

 

Add   a new Text Box control to the right of the Term text box. Use the Tabular   button in the Table group of the Arrange tab to place it correctly. Change   the label for the field to Monthly Pmt.

 

Add   a formula in the text box to calculate the monthly payment for each of the   loans. Ensure that the results are positive. Format the field as Currency.   Save and close the report.

 

Create   a query that includes the Date and   Amount fields from the Loans table. Ensure the results will   be sorted in Ascending order by Date. Run the query. Save the query as Loan Amounts Over Time and   close it.
 

  Create a report in design view and insert a Chart Control in the top left corner of the Detail section of the report. In the Chart Wizard, select the Loan Amounts Over Time query and   click Next. Add all available   fields to the fields for chart section and continue. Ensure that Column Chart is selected and   continue. Leave the default settings on the following screen. On the final   page of the wizard, ensure that no legend is shown and click finish.
 

  Resize the chart so that it fills the width of the Detail section of the   report. Save the report as Loan Amounts by Month.   Switch to report view and close the report.

 

Save   the database. Close the database, and then exit Access. Submit the database   as directed.

gnatt chart

 A work breakdown structure (WBS) is a tool used project management to a deliverable  into smaller tasks or components. Its purpose is to help visualize and identify a project’s  scope. Instructions: • Create a WBS capturing the process of buying a car. o Make sure you identify every task; from the moment you start your  research all the way to the time you drive out of the dealership. • At the beginning of the description, define the scope of the project in a single  sentence.  • Make sure tasks are reasonable on duration and predecessors are identified (if  any).  • You can easily create the WBS in a Word document or from an editable template you found online. • In addition, you will include a one-page description of the process captured in the  WBS. Requirements: • Submit a Word document in APA format. • Your submission will be 2 pages in length. The first page is the WBS graphic,  and the second page is the WBS description, double-spaced. • You will include a reference page for any references used. 

D2

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

350 words

APA format 

2 scholarly articles references

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Encryption Questionnaire

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Linux System Scan

  

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open-source research using the internet. Roughly, what is the cost to license Nessus for one year?