cybersecurity

 

Describe PCI-DSS.

Specifically:

– What is it?

– Who must comply with it?

– How is it enforced?

– What are some gaps that are not addressed by PCI-DSS?

 Must be at least 400 words. It must include sources/references.

Week 7: Informational Interview

Program and Career Exploration in Technology

 PACE 111T 6365 Program and Career Exploration in Technology (2208)Part 1 (recommend completing during Week 5)

In Part 1 of this activity, you will complete the following tasks: 

  • Watch “How to Do an Informational Interview.”
  • Select your prospective interview candidate. See below for guidance on identifying a suitable interviewee.
  • Gather professional/biographical details about your prospective interview subject.
  • Request an interview by email, by phone, or in person. If you’re going to send your request by email, review these email templates for suggested wording. Consider CC’ing me on the request.

To identify a suitable interview subject, find professionals in your career you would like to explore. Think about tapping these sources:

  • Check with your personal and professional networks and professors to connect you with professionals in your field of interest.
  • Check within Community Connect within CareerQuest or the UMUC/UMGC Alumni LinkedIn group for access to potential alumni and mentors. 
  • Consider members within student or professional organizations you have joined or would like to join. 

There are no restrictions on your interviewee’s location. CareerQuest has a video chat feature you can use if you connect with your subject through that platform. 

After you explore your interviewee options, request the interview. Reach out in a timely manner, as many professionals have demanding schedules and may not be available right away. It is also wise to consider having more than one potential interview candidate, in case your first choice doesn’t pan out.

As you prepare for your interview, bear in mind these tips: 

  • Maintain a professional demeanor, both in writing and orally.
  • Draft a list of questions in advance.
  • Schedule the interview for no longer than 20 minutes.

Part 2 (recommend completing during Week 6)

Prepare for your interview well in advance. In Part 2 of this activity, you will prepare for and conduct your informational interview by completing the following tasks: 

  • Determine the logistics of your interview. Will you meet in person? Via video chat or web conference (Zoom, Google Hangouts, FaceTime, Skype, etc.)? An interview in real time is preferable, but if you and your subject are unable to arrange that, you can use email.
  • Draft your interview questions. See below for guidance.
  • Conduct the interview.

Here are some questions you might consider: 

  • What sparked your interest in this career field? 
  • What does a typical day entail in your line of work? 
  • What do you like most about your career field? 
  • What are some challenges you face in this career choice? 
  • How do you handle your work-life balance? 
  • What suggestions do you have for someone who is interested in this field? 
  • Who else do you recommend I talk to? 

Part 3 (due by the end of Week 7)

After your interview, summarize your notes in two or three paragraphs. Include the name of the interviewee, a short biography describing his or her professional background and experiences, and a brief synopsis of your interview details/highlights. Be sure to include a list of the questions you asked during the interview. You may find this template helpful.  This documentation is due by the end of Week 7.

Week 7: Informational InterviewWeek 7: Informational Interview Due October 6 at 11:59 PM 

Mininet and Openflow

   

Problem-1: Create the network topology 

Write a python script to create the topology given in the Fig.1. In this topology H1, H2, H3, and H4 are hosts and S1, S2, S3, and S4 are OpenFlow switches. Specify bandwidth, delay and loss rate for each link of your choice. Assign appropriate port numbers to the switch interfaces and accordingly use in your implementation.

Fig.1

Please refer attached document  for topology(Figure)

Problem-2: Push the flow rules 

Implement a controller which pushes flow rules on switches to satisfy following traffic constraints.

· No traffic should be allowed between H3 and H1.

· The HTTP traffic between H4 and H1 should be routed through Switch S2 and any other traffic between H4 and H1 should be routed through Switch S3.

· The traffic between H3 and H2 should be routed through Switch S3.

· The traffic between remaining nodes should follow shortest path.

  

Problem-3: Link Bandwidth Measurement 

Once the flow rules are pushed, create necessary traffic flows to calculate instantaneous bandwidth for the following:

· Measure and print the instantaneous bandwidth on the links connected to the Switch S2.

Problem-4: Packet loss Count for a specific traffic flow 

· Calculate the packet loss count between the switches S4 and S1 for the HTTP traffic flow

H4 —S4 — S2 — S1 — H1

· Calculate the packet loss count between the switches S4 and S1 for the non-HTTP traffic flow

H4 —S4 — S3 — S1 — H1

Deliverables:

1) Topology implementation file: prob1.py

2) Controller implementation file: prob2.py

3) Controller implementation file: prob3.py

4) Controller implementation file: prob4.py

*******

Cyber Law

Assignment 1

 1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.

Assignment 2

 A. Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.

B. Respond to two classmates’ postings. Minimum 100 words per posting.

Data Analytics

 

1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data?  Explain why or why you cannot do analytics without big data?

2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.

 

1. What is data mining? Why is data mining so popular? 

2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion. 

3. Distinguish data mining from other analytical tools and techniques.

4. Discuss at least 3 data mining methods. What are the fundamental differences among them

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)

PLEC Week 3

  Answer Each question in 2-3 lines with in line satiations 

 

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

IT 204 assignment 1

IT 204 Week 1 Assignment

These are instructions for completing the Week one assignment. You are creating a basic business letter.

The section immediately below is the header. Below the horizontal line is the body of your letter.

Use one-inch margins  all around. (This is usually the default in MS Word)

Your Name (use 14 point Verdana font, bold, centered)

Your mailing address (12 point Verdana font, not bold, centered)

Your email address (12 point Verdana font, not bold, centered)

Your telephone number ((12 point Verdana font, not bold, centered)

Add a line below the title as shown below. Use 12 point Verdana for the rest of the letter.

(1 blank line)

Today’s date in long date format, January 5, 2021

(1 blank line)

(indent paragraphs) Write two or three short double-spaced paragraphs, describing what you plan to do when you graduate. For example, describe your ideal job?

(2 blank lines)

Sincerely,

(3 blank lines)

(For a formal business letter, you will hand sign with blue ink)

Your name (typed)

incident in the news

in a future career you may have to present to senior leadership in a non-technical way to get the incident details across. This is an opportunity to investigate what is happening out there in the cybersecurity world.

Research any previous incident in the news and provide an explanation of what happened in PowerPoint (4 slides). Please provide a minimum of 3 references.