Final Paper

 

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

Activity 8- Project Risk

For this assignment, you have been assigned as the project manager for a project involving the installation of a new Internet security suite for your company.Complete the following tasks for your project:

  • Provide a brief overview of your project.
  • Describe positive and negative risks within your project.
  • Discuss how each of the identified risks can affect the success or failure of the project and rank each risk in terms of impact to the project.
  • Propose risk mitigation and management approaches for each identified risk.
  • Describe the role policy plays in the planning and performing of risk management processes.

Requirements:

  • There is no minimum or maximum required number of pages. Your response will be considered complete, if it addresses each of the components outlined above.
  • Use of proper APA formatting and citations – If supporting evidence from outside resources is used those must be properly cited. A minimum of 7 sources (excluding the course textbook) from scholarly articles or business periodicals is required.
  • Include your best critical thinking and analysis to arrive at your justification.

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Computer

https://www.cnet.com/

 

Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.

CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”

We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.

Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it. The summary is work 35 points and the review 15 for a total of 50 points for this assignment.

PowerPoint

PowerPoint on your U6 paper and post it on the Discussion Board for this assignment. Comment on two other students’ presentations for full points on this assignment. 

Assignment 1

Overview: Using the topic and research question you developed in week 1, you will design a qualitative instrument that could potentially answer your topic/research question if it were to be applied to a qualitative study. Keep in mind, this may take some stretching if you wrote your question leaning quantitatively. The purpose here is not to box you in but to ensure that you have a solid understanding of both methodologies.Directions:You will develop a word document to include:

  1. View the rubric and examples to make sure you understand the expectations of this assignment.
    1. Rubric for Data Instrument.docx Rubric for Data Instrument.docx – Alternative Formats
    2. Qualitative Instrument Samples.pdf Qualitative Instrument Samples.pdf – Alternative Formats
  2. Your research question in the form of a qualitative question (if it was not already).
  3. An instrument or protocol (interview, ethnography, focus group protocol, etc) that could be used to answer the qualitative version of your research question.
  4. A one paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the qualitative version of your research question.

Write a Python program to find the duplicate elements

Write a Python program to find the duplicate elements in a given array of integers. Return -1 If there are no such elements. 2. Write a Python program to select all the Sundays of a specified year. 3. Python files reading and writing. Download the “exercise_02_data _collection.zip” to your local and un-zip it. Write a program to read all the txt files and save the sentences in all the files into one csv file with two columns, the first column is sentence id (txt file name+sentence line number), the second column is the sentence text content. (4 points) Remove all the punctuations from the sentences, save the processed sentences into a new column in the same csv file. Ask the user to enter a word, return all the sentences that include this word, three kinds of information should be returned: sentence id, sentence text content, the count that user input word appear in the sentence. 4.Install packages nltk, numpy, scipy, pandas, and sklearn on Google Colab. Write a program to test whether they are installed successfully.