The power of good design

 Review The Power of Good Design and  select three of the ten principles noted for good design. Next in R,  utilize these three principles in a problem that you will solve. First  note the problem to solve, the dataset (where the information was pulled  from), and what methods you are going to take to solve the problem.   Ensure the problem is simple enough to complete within a two-page  document. For example, I need to purchase a house and want to know what  my options are given x amount of dollars and x location based on a  sample of data from Zillow within each location. 
Ensure there is data visualization in the homework and note how it relates to the three principles selected. 

The link for The Power of Good Design:

https://www.vitsoe.com/gb/about/good-design

Home work 10

  Write short answers, uploaded as a WORD DOCUMENT and attach references. 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

4

4. Considering the type of organization and the business units involved (internal & external), enumerate and describe the main challenges H&N might face when/if implementing an ERP. Evaluate the advantages/disadvantages of this implementation.

Milestone

 subject ISOL-535-   CRYPTOGRAPHY

In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

wee 5

1. When are VPN’s used today? Do you use a corporate or individual VPN? If so what are the benefits? Be sure to find at least one article (academic or business) and cite and reference in APA format. 

2. List and briefly describe the process you would take to conduct test the security of a firewall?

How does the management of network security affect its implementation? What components are needed to ensure proper network security management of an environment?

Name two VPN deployment model and architecture? What is the best model/architecture for an on-perm environment, cloud environment, and hybrid environment (on-perm/cloud)?

Discussion

  create a one-page answering the question noted below 

  • How do you define operational excellence?  What factors are involved in achieving operational excellence?  Who (within an organization) is responsible for operational excellence and why is this important?

APA 6 format

web programing

  

In this Assignment, you will create a new webpage that will allow you to enter the data on your travel photo details. The page will contain a web form with a variety of HTML controls, each accepting a certain type of data. Simple JavaScript code will be used to validate data provided by a user.

To prepare for this Assignment:

Review the assignment resources included in the Explore section.

Perform the following steps:

Download the template files Week4Project_template.html and Week4Project_template.css in the Week4Project_templates.zip file.

Edit both files, creating the webpage that looks like this: See the attached

a. Open the Week4Project_template.html page in the TextEdit editor and create the form, positioning the form controls specified in the figure above by placing them within the table (use text boxes for Title, City, Rate this photo, text area for Description, radio-buttons for Copyright, check boxes for Creative Common Types and I accept the software license, Date control for Date Taken, Time control for Time taken)

b. For the drop-down lists, Continent and Country, add several items for each list (e.g., Africa, Asia, Europe, North America, South America for the first list; and United States, Canada, Mexico for the second list)

c. Save the completed .html file as Week4ProjectFinal.html

d. Open the Week4Project-template.css file and edit it so that the fonts and colors match the ones shown in the sample above. You are welcome to experiment with styling other elements shown in the page (hexadecimal colors reference can be found, e.g., in http://htmlcolorcodes.com/)

e. Save the completed .css file as Week4ProjectFinal.css

f. Validate your page by pasting the HTML page codes into http://validator.w.3.org validator to ensure that no HTML syntax errors are detected. Take screenshots of validation results and paste them into an MS Word document (see below).

g. Test the form page in the browser. What happens when you click the “Submit Query” button? Explain. What happens when you click the “Clear Form” button? Explain.

h. Add both files to your web project (if you are saving the.css file into a special CSS folder you have created, adjust the reference to that .css file in the Week4ProjectFinal.html

i. Add the hyperlink to your index.html page pointing to the Week4ProjectFinal.hml. Check that when clicking that hyperlink a user will be forwarded to the Week4ProjectFinal page. Similarly, add the hyperlink to the Week4ProjectFinal page to allow a user to navigate back to the index.html home page of your website. Test the code thoroughly before publishing it.

j. Publish your work by uploading the new and modified files to your web host. Test the site again, verifying the access to and proper functioning of Week4ProjectFinal webpage. Copy the URL to your MS Word deliverable document.

3.Take screenshots of the updated index.html webpage previewed in the browser with the navigation link to the Week4ProjectFinal webpage, navigate to the Week4ProjectFinal page, preview it in the browser and take a screenshot. Click on the “Submit Form” button, preview the result, and take a screenshot of the page you see in the browser. Paste all screenshots into an MS Word document. In the MS Word document, include your explanations of what functionality you have coded in the new HTML5 and CSS files. Include the answers to the questions in f) above.

4.Finally, include the valid URL to the location of your website index.html home page on the web hosting server (remember that each week you upload to the separate bucket on AWS S3 hosting server). If you are using another web hosting service, remember that the index.html page needs to be updated to enable navigation to the Week 4 webpage.

5.Compile all your website files into a single .zip file, including the MS Word document, and submit the .zip file as your deliverable. Name the .zip file WK4Assgn+last name+first initial.zip.

Submit the WK4Assgn+last name+first initial.zip for grading no later than the due date for this deliverable.

Cybersecurity Planning

A.) You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document (200 words minimum). Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

B.) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Machine Learning Model Training 1.

  

Assignment 2: Machine Learning Model Training 1 

• Two multi-part, multiple-choice questions.

•  AI in Healthcare with Phase 2 data set (HTML file)

• Details of the Q1 & Q2 m/c questions are shown in the attached question files.

• Lecture notes on Machine Learning in Healthcare for your reference