Journal Article Review

 Critical review of the Journal Article: “Ontologies describing concepts and relations in a specific domain are necessary for knowledge representation and knowledge exchange. Waterson and Preece define ontology as “he Specification of Shared Knowledge”. Ontologies (semantic data) facilitate the usability of e-technology and realize its full power. here are several Languages, Tools and Formalisms that accompany the term ontology. Among those languages, we enumerate XML (Extensible Markup Language), RDF (Resource Description Framework), RDFS (RDF Schema), DAML+OIL and OWL that are used in several contexts (compatibility with other concepts, expressiveness, etc.). Moreover, there exist several ontology formalisms with a definite advantages and drawbacks, which support particular features. Ontologies should be created for a specific function in the most appropriate formalism satisfying needs of a fine target community.” (Slimani 2015) 

 (PDF) Ontology Development: A Comparing Study on Tools, Languages and Formalisms (researchgate.net) 

Critically review various toolsets used in the design and development of ontology for various scenarios. Document your review in maximum 800 words. You may also refer to any other research articles for more information. Proper citations and referencing must be provided in CU Harvard style. Key findings may include (but not limited to):  Introduction to ontology  Application areas  Explanation with one example

Apply the knowledge gained from the previous section and discuss the role of ontology in Web Development. Further discuss various Semantic Heterogeneity issues on Web 

Vulnerability Assessment

 

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and submit to the appropriate assignment folder.

Assignment 1 Vulnerability Assessment Template.docx

Also review the additional files attached for detailed information on Vulnerability Assessments.

Access Control Firewall Assessment (Miss Professor only)

Access Control Firewall Assessment

In this assignment, students will perform a security assessment on a firewall.

Using the networked VMs from the Access Control Environment Installation assignment, perform a port scan of the PFSense firewall system using the Kali VM. Create a screenshot showing the results.

Using the scan results, choose five open/closed ports and determine the applicable protocol/application.

For each port, research and explain why it is good (or bad) that the default configuration is standardized.

Research and implement the basics of PFSense post-installation configuration.

  1. Update to the latest stable version.
  2. Set HTTPS to port 8443.
  3. Include the traffic graph on the dashboard.
  4. Disable port traffic for World of Warcraft.
  5. Disable port traffic for torrent applications.
  6. Disable inbound ICMP protocol.
  7. Choose a social media website and disable all domains for that website.
  8. Choose a video streaming website and enable all domains for that website.

Using the Kali VM, run another port scan. Note the differences against the original scan.

As a follow-up, research and explain the common vulnerabilities associated with the standard installation of this PFSense firewall.

Create a 700- to 1,200-word step-by-step instruction guide for the post-installation configuration. Make sure to include all required explanations and at least eight screenshots.

Research Paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph. 

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

assignment-5

 

Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay   :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

virtualization may create it's own security vulnerabilities.

 

Discuss, in your own words using 500 words or more, how virtualization may create its own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format, not in bulleted, numbered, or another list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Programming project in Java or C++

The city council in the town of Durburn has decided to improve road sign placement, especially for the numerous dead ends that are currently unmarked in various parts of the city. They have given you a road map, and you must determine where to put up signs to mark all the dead ends. They want you to use as few signs as possible.

The road map is a collection of locations connected by two-way streets.

The following rule describes how to obtain a complete placement of dead-end signs:

Consider a street S connecting a location x with another location. The x-entrance of S gets a dead-end sign if, after entering S from x, it is not possible to come back to x without making a U-turn. A U-turn is a 180- degree turn immediately reversing the direction.

To save costs, you have decided that you won’t install redundant dead-end signs, as specified by the following rule:

Consider a street S with a dead-end sign at its x-entrance and another street T with a dead-end sign at its y-entrance. If, after entering S from x, it is possible to go to y and enter T without making a U-turn, the dead-end sign at the y-entrance of T is redundant. INPUT

The first line of input contains two integers n and m, where n (1 ≤ n ≤ 5*105) is the number of locations and m (0 ≤ m ≤5 * 105) is the number of streets. Each of the following m lines contains two integers v and w (1 ≤ v < w ≤ n) indicating that there is a two-way street connecting locations v and w. All location pairs in the input are distinct.

OUTPUT

On the first line, output k, the number of dead-end signs installed. On each of the next k lines, output two integers v and w marking that a dead-end sign should be installed at the v-entrance of a street connecting locations v and

w. The lines describing dead-end signs must be sorted in ascending order of v-locations, breaking ties in ascending order of w-locations

Cyber Law – Discussion 1

Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world.  Post should contain APA citations and add references