Security in Cloud Computing

One of the frequent concerns about the cloud computing environment is security. In 750 to 1000 words (excluding title page and references) and using Jamsa (2013) and Erl et al. (2013) as two of your sources, list five (5) security cloud concerns business personnel and consumers should consider when using the cloud (list these five concerns as Level 1 headers).

Then, in your own words, explain these vulnerabilities or concerns. Finally, utilizing scholarly research, provide recommendations for mitigating them and/or instituting safeguarding protocols.

Note:

  • Proper APA 7 format is required (including title page)
  • Use third-person only
  • Minimum seven references with matching intext citations

Did Mr. Boucher’s immunity in the case relate to his preoccupation with child pornography?

  

Question 1:1.  Did Mr. Boucher’s immunity in the case relate to his preoccupation with child pornography?

Question 1:2.  Did Mr. Boucher immunity, in your opinion, discount his absorption and obsession with child pornography?

Question1:3. Did Mr. Boucher quash the subpoena to avoid self-incrimination testimony? 

Scenario: 

Mr. Boucher immunity prohibited the United States government’s access

to the password, contents of encrypted files on the laptop.

Question1:4 What will be your line of response as a government district attorney in Vermont?  

Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier

         Science. Kindle Edition; San Diego: CA

Discussion 3 cryptography

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  How does this affect the way business is done? How have you used it?

You must use at least one scholarly resource.

– discussion posting must be properly APA formatted.

– 400 words

– No plagiarism 

– References

Testing Hypotheses

 

In this assignment, you will test for a significant difference between the average resting heart rate of males and the average resting heart rate of females in your heart rate data.  You have observed that the mean rates are not exactly the same but are they significantly different?  You may use either of the two methods for testing a hypothesis illustrated in Realizeit:  compare the two confidence intervals or use the data analysis tool to run a two-sample test with unequal variances as shown in the topic of testing two-samples.

Steps

  1. Write the null hypotheses being tested
  2. Run the analysis either by using data analysis and the two-sample test or by comparing the two confidence intervals
  3. Interpret your data to determine if the resting male heart rate is the same as the resting female heart rate. Remember we are looking for whether the difference is a significant one, not just whether they are not the same.

Additional Instructions:

Your assignment should be typed into a Word or other word processing document, formatted in APA style. 

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Week 7 discussion – Cyber Law

 Week 7 discussion Hacking and invasion of the computers of others

Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another. Please respond in 400 words. And add references using APA format.

py

  

In this assignment you will compare two implementations of storing text files:

(1) One continuous string (newline char as separator).

(2) List of strings where each string represents a line

Each of these representations has to be implemented as a separate set of functions and, of course, with separate Python file For each implementation, you will write editor functions to move the “cursor”. In each representation, you use a cursor to represent the current position. For example, for (1) the cursor is just the position (index). For (2), the cursor is a pair: the index of the line and the position within the corresponding line string. Finally, for (3) the cursor is a pointer to the node (containing the line) and the position within that line.

Write (and test) the following 10 functions (names are taken from old vi editor) for each implementation

(1) cmd_h: move cursor one character to the left 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(2) cmd_I: move cursor one character to the right

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(3) cmd_j: move cursor vertically up one line 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(4) cmd_k: move cursor vertically down one line

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(5) cmd_X: delete the character to the left of the cursor

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(6) cmd_D: remove on current line from cursor to the end

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(7) cmd_dd: delete current line and move cursor to the 

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

beginning of next line

(8) cmd_ddp: transpose two adjacent lines

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(9) cmd_n: search for next occurrence of a string (assume that string to be searched is fully in one line.

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

(10) cmd_wq: write your representation as text file and save it

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

Think of and implement any other 5 functions (your choice)

(11)~(15)

a. string implementation for text editor

b. list implementation for text editor

c. double linked list implementation for text editor

For testing, you will read the following “nerdy” poem (from the “Zen of Python”) into your “file representation”. 

Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After each command, print the contents of your file with character ‘^’ as cursor. 

Example: your initial configuration is 

^Beautiful is better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.

After executing cmd_n(‘better”), your representation should print:

Beautiful is ^better than ugly.

Explicit is better than implicit.

Simple is better than complex.

Complex is better than complicated.