Excel Grader

I have two excel graders that I need done. Please do them correctly the last guy did not and I did not pass them. 

SDLC Diagram

 For this assignment, you will evaluate the systems development life cycle (SDLC) methodology by creating a diagram for an information system. Carefully review the ISM500 SDLC Diagram Scenario ( Attached) and formulate a solution for the problem presented in the scenario. Your paper must include the following elements.

  • Create a diagram of the systems development life cycle (SDLC) for your solution.
    • Provide a graphical representation of the SDLC you will use to implement your solution.
    • Identify the elements you will need in order to create your solution and include them in each of the appropriate phases of your diagram.
  • Explain how each of the solution elements you’ve identified fit in the lifecycle phases you have depicted in your diagram. Include citations from the text to support your position.

The SDLC Diagram

  • Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two credible sources including the course text.

  • Must document all sources in APA style
  • Must include a separate references page that is formatted according to APA style

assignment-4

 

Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay describing that case and write how it relates to  

  • What is a search
    When is it legal
  • Warantless search.

Automated tool for SQL Injection

 Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end. 

System breach

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Physical Security

 

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

5s week 6 assignment PL

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Include references. No copy paste strictly.

COMPUTER SECURITY_Week8

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Data Encryption Standard

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.