week 7 Security Architecture and Design

 

Assignment: Week 7 Group Discussion 6

Length:  Minimum of 400 words

This assignment should be in APA format and have to include at least two  references.

How should cache handling be accomplished in order to minimize the  ability of the attacker to deliver a payload through the cache?

Need to write this in view point of a software developer, what are your plans and how you are going accomplished it. Following the given guidelines

  

For this assignment, you are asked to reflect on how the technical, team and development process impacts your career interests and goals.  The paper should be double-spaced and between 4-5 pages (assuming a 12-point font), with the following sections: 

Note: Please follow the points and explain according to that( in the view point of programmer the essay should be related to technologies, programming language)

1. Introduction

Where you introduce yourself and what your career goal and interests are.  Try to be specific but naming compainies is not needed. 

—Computer science major who has interest more in developing software and familiar languages like c++programming, python, learing new framework,. 

—Goal is to develop apps like which make people life easier and time saving.

2. Technical Concepts

1. This is where you can talk about what technologies you interest you in further working with, that you need to learn more about, etc. as you look ahead to your career.  It does not have to be specific languages (though it can be), but it can also be frameworks, tools, platforms, etc.

—-Technologies : learing azure , what improvement and learning is necessary framework django

3. Teamwork

1. This is where you talk about how working in teams in terms of communication, project management, etc.

— how is communication and leadership skills

4. Software Development Concepts

This is where you talk about the activities and concepts you related to software development such as the overall process model (e.g. Iterative, Agile) or specific activities like Design or Testing.

— design process model example- waterfall model, iterative model– process to develop to app

5. Conclusion

1. Use this section to tie your reflection in the above areas together.

n Conclude overall and how excited and developing skills are helpful for future

CLOUD COMPUTING (IN)SECURITY

1. Do some Internet research to identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn from the negative experiences of these businesses?

 2. Do some Internet research on security mechanisms associated with virtualization. How can virtualization be used by cloud service providers to protect subscriber data? 

 3. Choose one of the following cloud services categories: SaaS, IaaS, PaaS. Do some Internet research that focuses the security issues associated with the selected cloud service category. Summarize the major security risks associated with the cloud service category and identify mechanisms that can be used to address these risks. 

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout. 

Week 7 Assignment

 

The scenario:

The Prime National Properties Group is considering selling some of its educational facilities. The facilities have been tracked in an Access database. Shelly Williams, the President of the company, has asked you to prepare a report. Import the Access data in the file Facilities_Data as a table into Excel. Using the PMT function, calculate the monthly payments the company could expect. The company would charge an 8% rate over 10 years. The result should be a positive number. Mr. Williams also asked you to calculate an extra processing fee for monthly loan payments using the IF function. If a monthly loan payment is less than $6000, the company would charge a processing fee of $150; otherwise, there would be no processing fee. Filter the rows to display only those facilities where there is a $0 processing fee. Hide all of the address fields and the processing fee column. Save the Excel file as Lastname_Firstname_Educational_Facilities

For this assignment, you will need the following files:

New blank Excel workbook

Facilities_Data

Educational_Report

You will save your files as:

Lastname_Firstname_Educational_Facilities

Lastname_Firstname_Educational_Report

  1. Open the Word document Educational_Report, and then save the file as Lastname_Firstname_Educational_Report
  2. Add a cover page of your choice, and then complete the content controls on the cover page.
  3. In the report, format headings as Level 1 or Level 2, and then insert a table of contents on a new page.
  4. In the worksheet, hide all of the address fields and the processing fee column
  5. paste the Excel data into the Word document.
  6. Add an appropriate heading formatted as Level 1, and then update the table of contents.
  7. In each file, insert the your name as a field in the footer

Upload the completed assignment files in the Assignment area. 

Research paper – Enterprise Risk Management

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment 5 business intelligence

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

MIS Assignments

 

(1)  View the following video in Youtube: ” The Latest Innovations in Health and Fitness Technology” at

https://www.youtube.com/watch?v=NYD61z0AtJM

(2)  Read the Bloomberg.com article from Tuesday, April 28, 2020:  

“How China is attempting to prevent a second wave”  at:

https://www.bloomberg.com/news/articles/2020-04-28/how-china-is-attempting-to-prevent-a-second-wave-of-infections

Pay particular attention to the section on:  Tracking Apps.  rr

Provide discussion answers to the following questions. The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive.    

1–  Explain what this video and article on big data are about. 

2– Indicate some of the ways that big data is being used.  Provide at least 5 different big data uses.  List as 2a, 2b, 2c, 2d, & 2e. 

3– Should there be a law that limits the use of Big Data?  Why or why not?  Provide your thoughts on this topic. 

Research Paper

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Paper examine the influences and effects of computer networks on the world around us

In this assignment, you are to examine the influences and effects of computer networks on the world around us. You can pick almost any area: Social effects (how we talk or interact), Business (how we market, advertise, buy, and sell items), Criminal (how people try to break the law) or Legal (new laws which are needed because of computer networks), or another area. Please pick one area so that you can concentrate on it. If you can’t think of a topic – please let me know. 

Pick an article or topic that you can write 5-7 pages on (cover page or references pages DO NOT count). Summarize and describe what the situation before computer networks (you can go back as far as you’d like) and what it is like now (after or during the impact of computer networks). Describe any possible further effects that could still happen (or where you think the area will go or what would be really cool if it happened). THIS IS ABOUT YOUR OPINIONS, NOT JUST A LOT OF REFERENCES ABOUT WHAT OTHERS THINK. 

You are to hand in: the paper (of course) and any references that you use (URLs are preferred). If you cannot submit a URL, then a hard copy must be turned in. 

NOTE: Term paper rules apply. Quoted material must be footnoted. References are required, but there should only be a few – this is to be your own ideas. You will be graded on the level of detail that you get to in describing the background, the impact and future effects of networks on the subject that you pick. If you have any questions about what constitutes plagiarism, please contact me immediately. You don’t have to have any references, but you should have one or more which back up your history or current disposition of the area. Any questions, please ask!