Describe PCI-DSS.
Specifically:
– What is it?
– Who must comply with it?
– How is it enforced?
– What are some gaps that are not addressed by PCI-DSS?
Must be at least 400 words. It must include sources/references.
Describe PCI-DSS.
Specifically:
– What is it?
– Who must comply with it?
– How is it enforced?
– What are some gaps that are not addressed by PCI-DSS?
Must be at least 400 words. It must include sources/references.
PACE 111T 6365 Program and Career Exploration in Technology (2208)Part 1 (recommend completing during Week 5)
In Part 1 of this activity, you will complete the following tasks:
To identify a suitable interview subject, find professionals in your career you would like to explore. Think about tapping these sources:
There are no restrictions on your interviewee’s location. CareerQuest has a video chat feature you can use if you connect with your subject through that platform.
After you explore your interviewee options, request the interview. Reach out in a timely manner, as many professionals have demanding schedules and may not be available right away. It is also wise to consider having more than one potential interview candidate, in case your first choice doesn’t pan out.
As you prepare for your interview, bear in mind these tips:
Part 2 (recommend completing during Week 6)
Prepare for your interview well in advance. In Part 2 of this activity, you will prepare for and conduct your informational interview by completing the following tasks:
Here are some questions you might consider:
Part 3 (due by the end of Week 7)
After your interview, summarize your notes in two or three paragraphs. Include the name of the interviewee, a short biography describing his or her professional background and experiences, and a brief synopsis of your interview details/highlights. Be sure to include a list of the questions you asked during the interview. You may find this template helpful. This documentation is due by the end of Week 7.
Week 7: Informational Interview
Due October 6 at 11:59 PM
Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.
Fig.1
Please refer attached document for topology(Figure)
Problem-2: Push the flow rules
Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.
· No traffic should be allowed between H3 and H1.
· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.
· The traffic between H3 and H2 should be routed through Switch S3.
· The traffic between remaining nodes should follow shortest path.
Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:
· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.
· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow
· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow
Deliverables:
1) Topology implementation file: prob1.py
2) Controller implementation file: prob2.py
3) Controller implementation file: prob3.py
4) Controller implementation file: prob4.py
*******
Assignment 1
1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.
2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
Assignment 2
A. Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.
B. Respond to two classmates’ postings. Minimum 100 words per posting.
Currently Unavailable to complete
Dates are:
01/05/2021-
01/30/2021
1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data? Explain why or why you cannot do analytics without big data?
2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.
1. What is data mining? Why is data mining so popular?
2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion.
3. Distinguish data mining from other analytical tools and techniques.
4. Discuss at least 3 data mining methods. What are the fundamental differences among them
The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)
Answer Each question in 2-3 lines with in line satiations
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
IT 204 Week 1 Assignment
These are instructions for completing the Week one assignment. You are creating a basic business letter.
The section immediately below is the header. Below the horizontal line is the body of your letter.
Use one-inch margins all around. (This is usually the default in MS Word)
Your Name (use 14 point Verdana font, bold, centered)
Your mailing address (12 point Verdana font, not bold, centered)
Your email address (12 point Verdana font, not bold, centered)
Your telephone number ((12 point Verdana font, not bold, centered)
Add a line below the title as shown below. Use 12 point Verdana for the rest of the letter.
(1 blank line)
Today’s date in long date format, January 5, 2021
(1 blank line)
(indent paragraphs) Write two or three short double-spaced paragraphs, describing what you plan to do when you graduate. For example, describe your ideal job?
(2 blank lines)
Sincerely,
(3 blank lines)
(For a formal business letter, you will hand sign with blue ink)
Your name (typed)
in a future career you may have to present to senior leadership in a non-technical way to get the incident details across. This is an opportunity to investigate what is happening out there in the cybersecurity world.
Research any previous incident in the news and provide an explanation of what happened in PowerPoint (4 slides). Please provide a minimum of 3 references.