password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

Heap insertion time Data Structures and Algorithams project

 When looking for data structure projects, you want to encounter distinct problems being solved with creative approaches. One such unique research question concerns the average case insertion time for binary heap data structures. According to some online sources, it is constant time, while others imply that it is log(n) time. But Bollobas and Simon give a numerically-backed answer in their paper entitled, “Repeated random insertion into a priority queue.” First, they assume a scenario where you want to insert n elements into an empty heap. There can be ‘n!’ possible orders for the same. Then, they adopt the average cost approach to prove that the insertion time is bound by a constant of 1.7645. 5. Optimal treaps with priority-chang

CC W 15 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Urgant(ASAP)

5-7 page paper on a conflict that he or she experienced in an organizational setting. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point 

main paper

 

Define “Anything-as-a-Service (AaaS) and discuss in detail at least one example AaaS category or implementation. For examples see  https://timesofcloud.com/cloud-tutorial/xaas/.

Apply APA Edition 6 formatting. You do not need an abstract or Table of Contents but include an introduction and summary.

Use at least three properly documented references (do NOT use wikis). Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar. Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

Your paper should be at least 500 words in length.

There is a Word template in week 1 with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Security Architecture & design

Length:  Minimum of 600 words

Simply, no plagiarism

Vestige, Inc. is an online software company that specializes in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that the Vestige system be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for the first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment:

qqq

Please click on the following articles to review the content:

Improve Time-Management Skills

https://www.virtuesforlife.com/8-ways-improve-time-management-skills/ (Links to an external site.)

How to Manage Your Time in College

https://www.wikihow.com/Manage-Your-Time-in-College (Links to an external site.)

Why Time Management is Important – Eight Reasons Why Time Management is Crucial

https://www.appointment-plus.com/blog/why-time-management-is-important (Links to an external site.)

Top Ten College Student/Graduate Job Search Mistakes

https://www.thebalance.com/top-college-student-graduate-job-search-mistakes-2059842 (Links to an external site.)

Please click on the following videos to review content:

The Value of Time

The Value of TIme (Links to an external site.)

How to Find an Internship You Will Value

https://bigfuture.collegeboard.org/get-started/outside-the-classroom/how-to-find-an-internship-youll-value (Links to an external site.)

Best Practices for a Successful Job Search

Best Practices for a Successful Job Search

After reading the assigned articles, please write a one-page essay double-spaced 12 pt. font describing your career path strategy in your major including education, experience, skills, and job requirements. In addition, include steps necessary to advance in your chosen career.