Reply

 Reply to this docmunet.

  • Identify the risk category for the attack shared. Was this a business, non-business, or financial risk?
  • Given your understanding of the risk elements (vulnerabilities, threats & threat agents, impact, and likelihood of this attack), discuss at least 2 approaches that could be used to mitigate the attack.
  • Provide sensitive and insightful feedback, and feel free to encourage further dialogue through open-ended questions.
  • Read replies to your post and respond as appropriate.

Operating System User Experience

  Read below and Respond with 150 words or more

Throughout  the years, you have used different computing devices that run different  operating systems. Pick one you like, such as iOS, Android, Windows, or  Linux. Discuss the features that impress you the most, for example,  ease of use, security, computer power, etc.

If you prefer, you can choose an OS you dislike instead, and discuss the features you didn’t like about it.

9.11 LAB

 

9.11 LAB: Car Value (classes)

Complete the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car’s information.

Ex: If the input is:

2011

18000

2018

where 2011 is the car’s model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:

Car’s information:

Model year: 2011

Purchase price: 18000

Current value: 5770

Note: print_info() should use three spaces for indentation.

class Car:
def __init__(self):
self.model_year = 0
# TODO: Declare purchase_price attribute

self.current_value = 0

def calc_current_value(self, current_year):
depreciation_rate = 0.15
# Car depreciation formula
car_age = current_year – self.model_year
self.current_value = round(self.purchase_price * (1 – depreciation_rate) ** car_age)

# TODO: Define print_info() method to output model_year, purchase_price, and current_value

if __name__ == “__main__”:
year = int(input())
price = int(input())
current_year = int(input())

my_car = Car()
my_car.model_year = year
my_car.purchase_price = price
my_car.calc_current_value(current_year)
my_car.print_info()

ET Wk11 – s

 ———-250 words——- 

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

 

Read Course Textbook: Chapter 15

A. Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, pp. 477-482.

A project’s Work Breakdown Structure (WBS) and Gantt chart provide structure for a project

 

  1. A project’s Work Breakdown Structure (WBS) and Gantt chart provide structure for a project. In this week’s assignment you develop both the WBS and Gantt chart for a fictitious organization. The Manage Your Health, Inc (MYH) scenario will be used in the weekly assignments for the rest of the course.
    Review the Manage Your Health Scenario and follow the directions below for completing a WBS and Gantt chart.
    Develop a work breakdown structure (WBS) for the project. Break down the work to Level 3 or Level 4, as appropriate. Use the Work Breakdown Structure Template and Work Breakdown Structure example in this text as guides. Upload the WBS in list form. The WBS should be based on the information that would be in a project scope of this scenario. You can review your project plan from Wk 1.
    Create a Gantt chart using the WBS you developed with Microsoft Excel or another software of your choice and approved by your instructor. Do not enter any durations or dependencies. Submit 2 deliverables: the WBS and Gantt Chart.

1 Discussion and 1 book review

Discussion 1.2 (Hacking)

What are the meanings of the following terms?

1) Advanced Persistent Threat

2) Remote Access Trojan

Provide an example of each in your initial statement.  

Discussion 1.2 (Cyber Laws)

Due: Initial Post due Wednesday, Replies due Sunday

Why is information security important and what types of information are we concerned with protecting? 

Book Review Chapter 1

After reading, chapter one, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on the topics found on pages 26 and 27 of the book

Research Paper – 7 pages – Due 4/15

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates

Peer response

Peer response 100  minimum , you have to respond yo peer based on this post to keep the discussion going. I have never heard of Microsoft Access or have even seen in on Microsoft Office as an option, so I did alot of ready and extra research to really understand. I also went to Microsoft Access on my computer to see for myself! I find it very interesting. Microsoft Access is a Database Management System (DBMS) from Microsoft that combines a graphical user interface with the relational Microsoft Jet Database Engine. It can be found in the professional and higher editions of the Microsoft Office software suite. 

I would use Microsoft Access if I work for a large company. It is said that many big companies use Access and only really the technical IT community uses Access. I would use it for in-depth analysis and reportings. At this point of my life though I don’t find Access useful just yet. 

Excel and Microsoft Access are quite similar but also very different. Some key areas where the two of them diverge is when they deal with text, numbers, files, and various types of data in AccessExcel. Typically, Microsoft Excel works with numerical data. One time and one location are used to store all the data.
There are several worksheets or documents that contain the same, repetitive material.

The following are the advantages of utilizing the MS Access application:

  • In just a few minutes, Access provides a relational database management system with complete functionality. 
  • Access makes it simple to import data from several sources. 
  • Access can be readily modified to suit individual and corporate requirements. 
  • Numerous Windows OS development languages and Access function well together. 
  • It can handle any difficult office or industrial database jobs and is strong and adaptable. 

Algorithm -9

 

Read chapters 19-20.

A sequence is a palindrome if it reads the same whether we read it from left to right or right to left. For instance, A C G G G G C A is a palindrome.

A G T C M C T G A is a palindrome of length 9.

Problem:

Here  is a set of characters.

S A G E S R A D A R U K M Y G Y M D T O P S P O T B S

1. Find the longest palindrome or sequence in the set. 

2. Write your own algorithm to explain how to arrive to the solution. Illustrate your answer. Your algorithm should work with any set of characters.