authentication

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Python Coding

 

Instructions:

Create a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for your pseudocode and Microsoft PowerPoint® for your flowchart.

1. Problem:

Create a flowchart and pseudo code to do the following:-

You are going to modify week 4 assignment (2 problems) to use input() function (no hard coded values) to prompt the user to enter the values.

Make sure the prompt message is meaningful, do not say “Enter value”, say something like this “Enter hours worked” after you get all the inputs, display the results and prompt the user if wants more calculation (y/n). If no then print a message like “Thank you for …….”

The flowchart must include a loop and if-then

Data Breach

In 80 words or more answer the following. Consider the risk of availability of backups. Suppose your company has 100 users and each user has there own personal allotted amount of data under their user account that they can store on the network shared drive. This data can be accessed as long as they are using a computer on the network or are VPN’d in. No other user can access another users data. Suppose there is a breach or security issue that exposes all user data to be exposed and stolen. Which IT team monitors this data and how would they react to this breach?

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

discrete structure

  

Discrete structures are the foundation for formulation of problems and algorithms. In the following paper, you will experience the use of discrete math for a thinning algorithm and its necessary and sufficient conditions for characterizing points. 

Paper “A parallel thinning algorithm for medial surfaces” G. Bertrand, Pattern Recognition Letters, 16 (1995) 979-986. This paper is attached. 

The overall idea of the algorithm is highlighted in blue, although the question to be answered is related to Proposition 2 (highlighted in yellow). Simple point is an important concept used for the algorithm. You are expected to answer the following question regarding a simple point mentioned in Proposition 2. 

Question 1. What is the definition of that is mentioned in Proposition 2? Briefly explain the meaning of it. Define each symbol used in your definition. 

Question 2. What is the definition of ? Briefly explain the meaning of it. 

Question 3. Proposition 2 say that x is n-simple if and only if   and . Give at least one example of x and X such that x is 6-simple. Briefly explain. 

Discussion

Engaging recent (Past 5 years) scholarly research, outline and discuss the top 5 factors driving Information Security Governance today.

Reverse Engineering, Vlnerabilties

This is an Android app. Please review and identify if there are any vulnerabilities in this mobile Android app.

For each vulnerability, please take a screenshot or evidence and explain why you think it is a vulnerability.

Password to extract the file: infected