Computer

You work as an administrative assistant for the President of Bass University which employs around 300 faculty and staff.Your immediate supervisor, the President, has just informed you …

Assignment

Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the data representation choices:

  1. Start by identifying all the charts and their types
  2. How suitable do you think the chart type choice(s) are to display the data? If they are not, what do you think they should have been?
  3. Are the marks and, especially, the attributes appropriately assigned and accurately portrayed?
  4. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  5. Are there any data values/statistics presented in table/raw form that maybe could have benefited from a more visual representation?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-6

Assignment Requirements: At least 500 words in length

References: At least three peer-reviewed, scholarly journal references.

Reliability and Validity

  1. How do you describe the concepts of validity and reliability? 
  2. From what view did you use in providing that description?

Three references with 450 words

Cyber security questions

1. Calculate the timing of password-guessing attacks:

(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?

(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?

(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password.

  2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.

• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)

• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)

• access control matrix

• capability

3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.

4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections?

  5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

  6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.

  7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver.

  8. Humans are said to be the weakest link in any security system. Give an example for each of the following:

(a) a situation in which human failure could lead to a compromise of encrypted data

(b) a situation in which human failure could lead to a compromise of identification and authentication

(c) a situation in which human failure could lead to a compromise of access control.

 9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value? 

10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?

Scrum Question

EXAM REQUIREMENTS

• Submit your answers as a single Word or PDF file, called “ISM 6316 Mid Term – ”.

• Follow APA Style (double-spaced, 12-point font, 1-inch margins).

• This is an individual assignment. It is not a collaborative effort, not a team effort. You are not

allowed to discuss this exam with anyone, classmates or others. If you have any questions or

doubts, contact me by email.

• Submit your answers by the deadline. Each 24 hour period that you miss the deadline, it costs

10 points.

Question 1. (40 points; max 2 pages)

Transitioning an organization from running development projects with the Waterfall approach to

Agile/SCRUM is not an easy undertaking. Reflect on what you think are the biggest challenges that

have to be overcome and how you would approach this transition.

a. Describe four different challenges that organizations face when they want to transition to

SCRUM. For each challenge explain what the challenge is and why this is a critical challenge in

your opinion.

b. Describe for each challenge that you identified above what strategies you would use to

overcome the challenge.

Question 2. (30 points; max 2 pages)

SCRUM was originally intended as a project management approach for software development

projects. However, one may argue that SCRUM can be used as a generic project management

approach that can be applied in the context of any type of project, covering different focus areas

in a company (e.g. marketing, finance, or HR). Reflect on this position. To what extent do you

agree that SCRUM can be used as a generic project management approach? To what extent do you

disagree? Where lay the limits of the applicability of SCRUM to the management of complex

projects?

Question 3. (30 points; max 3 pages)

Visit: https://michaelochurch.wordpress.com/2015/06/06/why-agile-and-especially-scrum-are-terrible/

(A pdf of the blog will be available on CANVAS as well).

As you can tell, not everyone is convinced about the value of SCRUM. Critically reflect on the

opinions presented in the blog. (Please note that you do not have to read/consider the hundreds of

responses to this blog).

a. To what extent do you agree with the author’s point of view? On what issues do you disagree?

b. Based on your experience/understanding of SCRUM, what kinds of adjustments to SCRUM and its

practices or what other initiatives would you explore to address some of the issues that the

author raises?

Order # 13436

Title: Wireless Network Design

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Preparation

Before you begin this assessment, please complete the practice labs as they will be helpful to you.

Then use the Internet and the Capella library to research the assessment topic. You will need at least three recent, relevant, and professional resources to support your work.

Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Assessment 1 Resources for more information.

Instructions

For this assessment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs). The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network.

Start with the network diagram you created in the Assessment 2. You may want to make some changes depending on the feedback you received from your instructor. Using this diagram, complete the following:

•Add a wireless infrastructure to your network diagram. ◦Include your IP addresses. Calculate and add your IP ranges and subnets into your diagram.

•Explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions.

•Explain your IP addressing strategy.

•Describe at least three wireless standards that influenced your network structure.

The assessment you submit should be approximately 3–4 pages in length, including the diagram you create. Be sure your document is professionally written, free of errors, and that your citations and references follow APA guidelines.

Additional Requirements

•Include a title page and references page.

•At least three recent, relevant, and professional resources.

•Times New Roman, 12-point font, double spaced.

Software development process

Describe the overall process of developing new software.  Please also note the differences between software development and methods.

1 page in APA format with atleast two references

project

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Application security Procedure guide

  

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages