Assignment

assignment

 Course – Cloud Computing

  • Residency Poster PresentationPrepare a PowerPoint presentation of your preliminary idea for your research project. The PowerPoint presentation must include the following:
    • Background on the problem (1-2 slides)
    • Explanation of the problem to be studied (1-2 slides). Include evidence that the problem is current and significant
    • The overarching research question(s) (1 slide)
    • Identify at least three scholarly sources that directly inform the project. The sources should be relevant and recent.
  • AssignmentResidency Annotated Bibliography (September 26th 1:00 pm EST)  [5 references which includes the references delivered in poster presentation and cover the below requirements for the topic and for which we will be doinfg for final upcoming research paper] Begin organizing the research and topics for your project using an annotated bibliography. The format of the annotated bibliography is a referene to the article, formatted per APA 7th edition, and an annotation or summary of the article. The summary should include important topics and how the topic relates to your research. Your annotations should cover three areas (typically formatted in three paragraphs):
    • Summary: What did the author do? Why? What did he/she find?
    • Analysis: Was the author’s method sound? What information was missing? Is this a scholarly source?
    • Application: Does this article fill a gap in the literature? How would you be able to apply this method/study to yoru study? Is the article universal?
    • Writing annotated bibliographies will help you develop the skills to critically read and identify key points within an article. This will help you determine the validity and usefulness of the articles in relation to your research topic.
  • AssignmentResidency Literature Review (september 26th 6 pm est)You will submit a draft of the literature review portion of your research paper. The literature review will form the main body of your final research paper. This will be where you provide a synthesis of the articles you have found related to your topic. When writing a literature review, you should include or consider the following:
    • An introduction and a conclusion
    • Avoid direct quotes.
    • Organize by topic or theme rather than by author
    • Use headings
    • Show relationships and consider the flow of ideas
  • AssignmentResidency Research Paper (October 1st 7:00 pm est)Submit your professional research paper (15 pages) on a current topic in cloud computing. Amend your paper based on feedback you received during the residency weekend. The paper includes your final literature review and your completed analysis of your chosen research topic. The paper must adhere to APA format and style (APA 7th edition). 

c++

all i need is these two files

Create VectorContainer.hpp

Create SelectionSort.hpp 

Test SelectionSort.hpp using the VectorContainer.hpp class you made

# Strategy Pattern

In this lab you will create a strategy pattern for sorting a collection of expression trees by their `evaluate()` value, which you will pair with different containers to see how strategies can be paired with different clients through an interface to create an easily extendable system. This lab requires a completed composite pattern from the previous lab, so you should begin by copying your or your partner’s code from the previous assignment into your new repo, making sure it compiles correctly, and running your tests to make sure everything is still functioning correctly.

You will start this lab by creating two expression tree containers: one that uses a vector to hold your trees (class `VectorContainer`) and one that uses a standard list (class `ListContainer`). Each of these container classes should be able to hold any amount of different expressions each of which can be of any size. You will implement them both as subclasses of the following `Container` abstract base class, which has been provided to you in container.h. You should create each one independently, creating tests for them using the google test framework before moving on. Each container should be it’s own commit with a proper commit message. Optionally you can create each one as a branch and merge it in once it has been completed.

class Container {

    protected:

        Sort* sort_function;

    public:

        /* Constructors */

        Container() : sort_function(nullptr) { };

        Container(Sort* function) : sort_function(function) { };

        /* Non Virtual Functions */

        void set_sort_function(Sort* sort_function); // set the type of sorting algorithm

        /* Pure Virtual Functions */

        // push the top pointer of the tree into container

        virtual void add_element(Base* element) = 0;

        // iterate through trees and output the expressions (use stringify())

        virtual void print() = 0;

        // calls on the previously set sorting-algorithm. Checks if sort_function is not

        // null, throw exception if otherwise

        virtual void sort() = 0;

        /* Functions Needed to Sort */

        //switch tree locations

        virtual void swap(int i, int j) = 0;

        // get top ptr of tree at index i

        virtual Base* at(int i) = 0;

        // return container size

        virtual int size() = 0;

};

Notice that our Container abstract base class does not have any actual STL containers because it leaves the implementation details of the container to the subclasses. You **must use the homogeneous interface above for your sort functions, and you are only allowed to manipulate the containers through this interface, not directly**. This will allow you to extend and change the underlying functionality without having to change anything that interfaces with it.

## Sorting Classes

In addition to the containers you will also create two sort functions capable of sorting your containers, one that uses the [selection sort](https://www.mathbits.com/MathBits/CompSci/Arrays/Selection.htm) algorithm and one that uses the [bubble sort](https://www.mathbits.com/MathBits/CompSci/Arrays/Bubble.htm) algorithm (you may adapt this code when writing your sort functions). They should both be implemented as subclasses of the `Sort` base class below which has been provided. You should create each one independently, creating tests for them using the google test framework before moving on. Each sort class should be it’s own commit with it’s own proper commit message. When creating tests for these sort classes, make sure you test them with each of the containers you developed previously, and with a number of different expression trees.

“`c++

class Sort {

    public:

        /* Constructors */

        Sort();

        /* Pure Virtual Functions */

        virtual void sort(Container* container) = 0;

};

sort.hpp

#ifndef _SORT_HPP_

#define _SORT_HPP_

#include “container.hpp”

class Container;

class Sort {

public:

/* Constructors */

Sort();

/* Pure Virtual Functions */

virtual void sort(Container* container) = 0;

};

#endif //_SORT_HPP_

base.hpp

#ifndef _BASE_HPP_

#define _BASE_HPP_

#include

class Base {

public:

/* Constructors */

Base() { };

/* Pure Virtual Functions */

virtual double evaluate() = 0;

virtual std::string stringify() = 0;

};

#endif //_BASE_HPP_

container.hpp

#ifndef _CONTAINER_HPP_

#define _CONTAINER_HPP_

#include “sort.hpp”

#include “base.hpp”

class Sort;

class Base;

class Container {

protected:

Sort* sort_function;

public:

/* Constructors */

Container() : sort_function(nullptr) { };

Container(Sort* function) : sort_function(function) { };

/* Non Virtual Functions */

void set_sort_function(Sort* sort_function); // set the type of sorting algorithm

/* Pure Virtual Functions */

// push the top pointer of the tree into container

virtual void add_element(Base* element) = 0;

// iterate through trees and output the expressions (use stringify())

virtual void print() = 0;

// calls on the previously set sorting-algorithm. Checks if sort_function is not null, throw exception if otherwise

virtual void sort() = 0;

/* Essentially the only functions needed to sort */

//switch tree locations

virtual void swap(int i, int j) = 0;

// get top ptr of tree at index i

virtual Base* at(int i) = 0;

// return container size

virtual int size() = 0;

};

#endif //_CONTAINER_HPP_

Example

#ifndef _LISTCONTAINER_HPP_

#define _LISTCONTAINER_HPP_

#include “container.hpp”

#include

#include

#include

class Sort;

class ListContainer: public Container{

public:

std::list baseList;

//Container() : sort_function(nullptr){};

//Container(Sort* function) : sort_Function(function){};

//void set_sort_funtion(Sort* sort_function){

// this -> sort_function = sort_function;

//}

void add_element(Base* element){

baseList.push_back(element);

}

void print(){

for(std::list::iterator i = baseList.begin(); i != baseList.end(); ++i){

if(i == baseList.begin()){

std::cout <<(*i) -> stringify();

}

else{

std::cout << ", " << (*i) -> stringify();

}

}

std::cout << std::endl;

}

void sort(){

try{

if(sort_function != nullptr){

sort_function -> sort(this);

}

else{

throw std::logic_error(“invalid sort_function”);

}

}

catch(std::exception &exp){

std::cout << "ERROR : " << exp.what() << "n";

}

}

//sorting functions

void swap(int i, int j){

std::list::iterator first = baseList.begin();

for(int f = 0; f < i; f++){

first++;

}

Base* temp = *first;

std::list::iterator second = baseList.begin();

for(int s = 0; s < j; s++){

second++;

}

*first = *second;

*second = temp;

}

Base* at(int i){

std::list::iterator x = baseList.begin();

for(int a = 0; a < i; a++){

x++;

}

return *x;

}

int size(){

return baseList.size();

}

};

#endif //_LISTCONTAINER_HPP_

bubblesort.hpp

#ifndef __BUBBLESORT_HPP__
#define __BUBBLESORT_HPP__

#include "sort.hpp"
#include "container.hpp"

class BubbleSort: public Sort{
public:
void sort(Container* container){
memContainer = container;

               int flag = 1;
               int numLength = memContainer->size();
               for(int i = 1; (i <= numLength) && (flag == 1); i++){
                       flag = 0;
for(int j = 0; j < (numLength - 1); j++){
if(memContainer->at(j+1)->evaluate() < memContainer->at(j)->evaluate()){
memContainer->swap(j+1, j);
flag = 1;
}
}
}
}
};
#endif // __BUBBLESORT_HPP__

Need Response 2 to below discussion

please provide the two responses in 75 to 100 words for below discussion posts

Post#1

 COLLAPSE

Nowadays internet is growing very fast and more collaboration services are added to the internet like online payment, online data storage, social apps, and many more so everybody from the home user to a big organization is looking for secure data storage because cyber threats are growing increasingly. Cybercriminals plan strategies for data tempting by accessing the company’s private network after that asks money to save the organizational data, also this is not with a single company, but it is with any home user to any organization. “Although almost all cloud vendors claim that their clouds are safe, security concerns are still raised widely among cloud users” (Chen, Sharieh & Blainey, 2018). To Save from this hassle a business owner can devise the SECaaS i.e. Security as a Service.

SECaaS is based on cloud base platform where a user can save its all data over the cloud and can access it from anywhere in the world, also it is more secured than other platforms like to save locally. Nowadays CIO and CTO of the organizations having the preference for security as a service because of many reasons like cost-effective, easy to use, protection against new threats, Auto-updates and customizations, and many more. “Driven by the advances in sensing, processing, storage, and cloud technologies, sensor deployments are pervasive, and thus an increasing amount of information is available to devices in the Internet of Things (IoT)” (Chen & Zhu,2017). Some of them we will discuss below:

Cost-Effective: There is no special manpower is required to move data from one server to another and vice versa also it saves time as well while doing movement of data.

Ease of Use: There is no specialized training is required for any home user to any organizational IT also it is available to access instantly.

Save from latest cyber threats: As it is always up to date so a business owner can be stress-free as it can tackle to latest cyber threats as well.

Disaster Management: In event of a disaster your data will be saved on the cloud and security as a service ensures the same.

User Authentication & Encryption: This service is based on user authentication with the user’s password for access the data saved is encrypted as well. There are several reasons to choose security as a service.

Flexibility: These offer the particular service you want to choose for your organization instead of a whole package.

Availability: Your data is available 24x7x365 days without any issues. “In the Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on-premise security solutions” (Sharma, Dhote, & Potey, 2016).

Report:- SECaaS is having the reporting management where you can check the significant security events, attack logs, and other significant data.

TCO:- Total cost of ownership helps to share the results between the traditional following method and new platform i.e. security as a service. Also along with this user can same the time by accessing the content even the user is sitting in any part of the world and last you will find the lower TCO while adapting SECaaS.

Post#2

 

“Security as a service (SECaaS) is an outsourced service wherein an outside company handles and manages your security”. (Brook, 2018). In the fundamental way, using anti-virus sound over the Internet is the best definition of security as a service. Security as a service no more offers security solutions centrally, where the IT department installs the virus detection software, spam filtering software and other security tools on each computer or network or server, upgrades the software or advises us to use it. The old way to do it is pricey as well. Hardware expenses and licensing costs continue to allow us to use the app. Instead, security as a service helps us to use only a web browser tool to make it direct and cost-effective.

For certain businesses, the security competence deficit is an urgent challenge and in-house protection practitioners have to be able to take their time on the most important business activities. By defining tasks that SECaaS or managed security services (MSS) suppliers can handle, such as program setup, repair, and disaster recovery, companies can prioritize their available time and resources.

In the past, the dominant assumption was that protection could be triggered and left to work, so a big security force wasn’t really necessary. But with the growth of the danger scene and the acceptance of cybersecurity as a continuously evolving war against ever more advanced cyber criminals, this mentality has changed. Companies need to determine whether they need to recruit more protection practitioners-a battle in a very competitive and skilful industry-or whether they need technologies and services. (Byrne, 2018).

Security as a service has many advantages. The most evident is that it includes a web interface to administer the business. It supports ongoing updates and helps outsource manual functions, such as log management. The need for expensive technology consultants and researchers may also be bypassed by using a cloud based security product. SECaaS providers are heavily dependent on their on-going defense and records are continually updated to provide up-to – date security coverage. This also eliminates the problem, instead of integrating all elements into a management scheme, that of providing different infrastructures. Yet SECaaS provides far more security experience, in addition to being an effective means of saving money and time than normally possible within an enterprise. (Panda, 2016).

The use of security as a service has many benefits. Those are:

1. People are working with the most updated and best available security software. To be accurate and useful, anti-virus software must work with the current descriptions of the virus so that risks can be stuffed out and with the latest. People always use software that have the newest risks and options modified with security as a service. This does not mean that the customers should not upgrade their anti-virus software and keep other applications up to date and make sure we use the new security updates. The same is true with email filtering upgrade and repair.

2. We have the right protection staff to work with us. IT security professionals are at our service and may have more expertise and ability than anyone on our IT squad.

3. Faster production. The beauty of the services is that we are able to provide our customers with immediate access to these resources. On request, SECaaS deals are presented so that we can measure up or down as desired and do so with agility and speed.

4. Employees should concentrate on the organisation’s most critical issues. Using a web interface or a management dashboard, it’s easier to administer and regulate our own IT team ‘s security processes in our business.

5. Allows management in-house smoother. It is not enough to keep data secure if we have secured data. We should be mindful whether a customer accesses this information when he or she has no clear business intent.

6. Cost reductions. No hardware or software licensing needs to be purchased or paid for. Instead, it is possible to substitute upfront capital at a discount rate relative to upside costs with contingent operating expenses.

7. Protection against cyber-attacks and threats. Hackers are actively designing ransomware and cyberattacking tactics. With cyber security professionals developing strategies for existing cyber challenges, cyber criminals are increasingly designing new and creative ways to escape detection and penetrate business networks effectively in stealing their data. Therefore, good cyber defense strategies should be good at adapting not only to the current established cyber threats; they should also be able to detect and counteract new threats and emerging threats. We are not only shielded from current threats by outsourcing to an SECaaS provider; we are also protected from new threats. The security company works to be completely mindful of any new risks to cybersecurity. Our provider also guarantees the complete configuration of the network security system to defend against novel cyber-attacks. (Elliott,2020).

1 page in APA 6th Format Operational Excellence

1 page in APA 6th Format Operational Excellence with one scholarly (peer-reviewed) resource.

Writing should be on the below topics:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Need Response 2 to below discussion

please provide the two responses in 75 to 100 words for below discussion posts

Post#1

 COLLAPSE

Nowadays internet is growing very fast and more collaboration services are added to the internet like online payment, online data storage, social apps, and many more so everybody from the home user to a big organization is looking for secure data storage because cyber threats are growing increasingly. Cybercriminals plan strategies for data tempting by accessing the company’s private network after that asks money to save the organizational data, also this is not with a single company, but it is with any home user to any organization. “Although almost all cloud vendors claim that their clouds are safe, security concerns are still raised widely among cloud users” (Chen, Sharieh & Blainey, 2018). To Save from this hassle a business owner can devise the SECaaS i.e. Security as a Service.

SECaaS is based on cloud base platform where a user can save its all data over the cloud and can access it from anywhere in the world, also it is more secured than other platforms like to save locally. Nowadays CIO and CTO of the organizations having the preference for security as a service because of many reasons like cost-effective, easy to use, protection against new threats, Auto-updates and customizations, and many more. “Driven by the advances in sensing, processing, storage, and cloud technologies, sensor deployments are pervasive, and thus an increasing amount of information is available to devices in the Internet of Things (IoT)” (Chen & Zhu,2017). Some of them we will discuss below:

Cost-Effective: There is no special manpower is required to move data from one server to another and vice versa also it saves time as well while doing movement of data.

Ease of Use: There is no specialized training is required for any home user to any organizational IT also it is available to access instantly.

Save from latest cyber threats: As it is always up to date so a business owner can be stress-free as it can tackle to latest cyber threats as well.

Disaster Management: In event of a disaster your data will be saved on the cloud and security as a service ensures the same.

User Authentication & Encryption: This service is based on user authentication with the user’s password for access the data saved is encrypted as well. There are several reasons to choose security as a service.

Flexibility: These offer the particular service you want to choose for your organization instead of a whole package.

Availability: Your data is available 24x7x365 days without any issues. “In the Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on-premise security solutions” (Sharma, Dhote, & Potey, 2016).

Report:- SECaaS is having the reporting management where you can check the significant security events, attack logs, and other significant data.

TCO:- Total cost of ownership helps to share the results between the traditional following method and new platform i.e. security as a service. Also along with this user can same the time by accessing the content even the user is sitting in any part of the world and last you will find the lower TCO while adapting SECaaS.

Post#2

 

“Security as a service (SECaaS) is an outsourced service wherein an outside company handles and manages your security”. (Brook, 2018). In the fundamental way, using anti-virus sound over the Internet is the best definition of security as a service. Security as a service no more offers security solutions centrally, where the IT department installs the virus detection software, spam filtering software and other security tools on each computer or network or server, upgrades the software or advises us to use it. The old way to do it is pricey as well. Hardware expenses and licensing costs continue to allow us to use the app. Instead, security as a service helps us to use only a web browser tool to make it direct and cost-effective.

For certain businesses, the security competence deficit is an urgent challenge and in-house protection practitioners have to be able to take their time on the most important business activities. By defining tasks that SECaaS or managed security services (MSS) suppliers can handle, such as program setup, repair, and disaster recovery, companies can prioritize their available time and resources.

In the past, the dominant assumption was that protection could be triggered and left to work, so a big security force wasn’t really necessary. But with the growth of the danger scene and the acceptance of cybersecurity as a continuously evolving war against ever more advanced cyber criminals, this mentality has changed. Companies need to determine whether they need to recruit more protection practitioners-a battle in a very competitive and skilful industry-or whether they need technologies and services. (Byrne, 2018).

Security as a service has many advantages. The most evident is that it includes a web interface to administer the business. It supports ongoing updates and helps outsource manual functions, such as log management. The need for expensive technology consultants and researchers may also be bypassed by using a cloud based security product. SECaaS providers are heavily dependent on their on-going defense and records are continually updated to provide up-to – date security coverage. This also eliminates the problem, instead of integrating all elements into a management scheme, that of providing different infrastructures. Yet SECaaS provides far more security experience, in addition to being an effective means of saving money and time than normally possible within an enterprise. (Panda, 2016).

The use of security as a service has many benefits. Those are:

1. People are working with the most updated and best available security software. To be accurate and useful, anti-virus software must work with the current descriptions of the virus so that risks can be stuffed out and with the latest. People always use software that have the newest risks and options modified with security as a service. This does not mean that the customers should not upgrade their anti-virus software and keep other applications up to date and make sure we use the new security updates. The same is true with email filtering upgrade and repair.

2. We have the right protection staff to work with us. IT security professionals are at our service and may have more expertise and ability than anyone on our IT squad.

3. Faster production. The beauty of the services is that we are able to provide our customers with immediate access to these resources. On request, SECaaS deals are presented so that we can measure up or down as desired and do so with agility and speed.

4. Employees should concentrate on the organisation’s most critical issues. Using a web interface or a management dashboard, it’s easier to administer and regulate our own IT team ‘s security processes in our business.

5. Allows management in-house smoother. It is not enough to keep data secure if we have secured data. We should be mindful whether a customer accesses this information when he or she has no clear business intent.

6. Cost reductions. No hardware or software licensing needs to be purchased or paid for. Instead, it is possible to substitute upfront capital at a discount rate relative to upside costs with contingent operating expenses.

7. Protection against cyber-attacks and threats. Hackers are actively designing ransomware and cyberattacking tactics. With cyber security professionals developing strategies for existing cyber challenges, cyber criminals are increasingly designing new and creative ways to escape detection and penetrate business networks effectively in stealing their data. Therefore, good cyber defense strategies should be good at adapting not only to the current established cyber threats; they should also be able to detect and counteract new threats and emerging threats. We are not only shielded from current threats by outsourcing to an SECaaS provider; we are also protected from new threats. The security company works to be completely mindful of any new risks to cybersecurity. Our provider also guarantees the complete configuration of the network security system to defend against novel cyber-attacks. (Elliott,2020).

Enterprise Risk Management

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Info security and risk management

NOTE: PLEASE REFER THE WORD DOCUMENT FOR COMPLETE ASSIGNMENT QUESTION AND FOLLOW THE INSTRUCTIONS GIVEN IN THE WORD DOCUMENT

Risk Management Plan Final Paper 10 pages APA format and Power point Presentation for 20 slides for the same paper.

NO PLAGIARISM.

Create a professional, well-developed report, titled, risk management plan that includes the combination of Task 1, 2, and 3 for given scenario in the attachment.

Scenario (Please refer the attached word doc for more details):

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

Develop and provide an introduction to the plan by explaining its purpose and importance.

Create an outline for the completed risk management plan.

Define the scope and boundaries of the plan.

Research and summarize compliance laws and regulations that pertain to the organization.

Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.

Develop a proposed schedule for the risk management planning process.

Create a professional report detailing the information above as an initial draft of the risk management plan.

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

Develop an introduction to the plan explaining its purpose and importance.

Create an outline for the RA plan.

Define the scope and boundaries for the RA plan.

Research and summarize RA approaches.

Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.

Create a professional report detailing the information above as an initial draft of the RA plan.

Project Part 1 Task 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan.

Risk Management Plan Final Presentation

Create a professional, well-developed report, titled, risk management plan that includes the combination of Task 1, 2, and 3

Submission points:

A section titled Introduction discussing the purpose of the plan. You must include details from the scenario, above, describing the environment.

A section titled Scope and Methodology discussing the scope and risk assessment methodology leverage for the development of the plan.

A section, titled Compliance Laws and Regulations. Using the information in the scenario provided above, discuss regulations and laws with which Health Network must comply.

A section, titled Risk Mitigation Plan & Timeline, that discusses the threats identified in the scenario and your proposed mitigations roadmap with timelines as well as any new threats.

A section, titled Roles and Responsibilities, that will discuss the different individuals and departments who will be responsible for risk management within the organization (this was presented in your textbook).

Lab work Data Analytics

Hi, 

Please solve below mentioned 2 problems and answer all the questions asked in each. Use the attached excel files to solve each question.

1. Question 54 – Use P03_54.xlsx

2. Question 58 – Use P03_58.xlsx

Note: Below attached are 2 questions and required 2 excel files to be used in solving those questions.

Writing Requirements:

– Provide the excel file with calculations performed

– Provide detailed explanation to each question in a word document with screenshot

– Full APA Format

– NO PLAGIARISM