Describe in 500 words the shared security responsibility model that a dba must be aware of when moving to the cloud.
disaster recovery plan in cybersecurity
Business continuity and business impact analysis are essential models for all businesses but can be costly. Pick an organization and create a disaster recovery plan for that business.
Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).
Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.
offer advice and suggestions on thing we should do or should not do in disaster recovery plan
3 pages
Social Media
Discuss social media metrics with benefits.
Discussion 9
Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 9 (Jamsa, 2013).
Chapter 9 topics:
- List the security advantages of cloud-based solutions.
- List the security disadvantages of cloud-based solutions.
- Define and discuss the data wiping process.
- Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
- Define and discuss hyperjacking attacks.
- Define and discuss guest-hopping attacks.
NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.
MIPS
Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number
SQL injection vulnerabilities (Cyber Security)
- Injection attacks have stood at the top of the OWASP Top 10 for nearly a decade. Why do you think SQL injection vulnerabilities still exist? What procedures, policies, or practices do you think it will take to make them stop?
Introduction to Systems Thinking
For this assignment, complete the following: Choose a system in your own life. In one paragraph, describe the purpose of this system and describe how it meets the definition of a system. For your chosen system: identify its parts, define their relationships to each other, and describe any feedback loops present in the system. Using Microsoft Visio, construct a model of this system.
5s week 3 assignment BS
in 300
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Include references, No copy paste strictly.
in Python
in this assignment, you need to animate covid-19 numbers in 4 state in dynamic bar graph settings. You need to read data from a url, https://raw.githubusercontent.com/nytimes/covid-19-data/master/us-states.csv .
In the bar graph, randomly choose 4 states and show total number of cases in these state daily in an animated way. It means a frame should show total number of cases on a given day. The next frame should show next day’s numbers. The animation should update twice a second (interval = 500), i.e., two days of data will be shown in one second. The title of graph should show current date, such as Jun 15, 2020. Both axes should have appropriate title. The animation should start the most earliest date and should stop once all data is consumed.
Discreet Logic
For each question, you will be given an argument (or a tautology) and you need to use rules of implication, rules of replacement, conditional proofs and/or indirect proofs, to prove the arguments (or tautologies) valid. Be sure to justify every line you provide with both line numbers and the applicable rule. If you can’t access the logical operation signs, just write “dot,” “wedge”, “horseshoe” or “triple bar” wherever applicable.
