IT207 midterm

Question 1

Describe the difference between a guest operating system and a host operating system, with respect to virtual machines.

Question 2

How does the operating system use paging to enhance the use of memory?

Question 3

What is multithreading and why is it advantageous?

Question 4

Describe the role of the new InPrivate browsing feature in Microsoft’s Edge browser.

IT470 week2

1) Computer security is essential to the protection of personal information and your company’s intellectual property. Please name some common procedures companies use to prevent business assets. Make sure to use real examples and share any resources you have studied? 2) What is NIST 800-115. Explain how it works? 

CIT 105

I need someone fluent in english to complete this class for me. About 4 unit’s of work. Only respond if you know the content and can type fluent paragraphs about computer science.

SECURITY POLICY & STANDARTS – 08 Creating an Incident Response Policy

Part 1: Research Incident Response Plans Note: In this part of the lab, you will research incident response teams to form a basis for their purpose and usage. Understanding the reason behind an incident response team is key to understanding the related policies and procedures.

  1. 1. Using your favorite search engine, search for a sample incident response plan.
  2. 2. Review the plan.
  3. 3. Describe the key components within the incident response plan you identified. Be sure to cite the plan by including a link.
  4. 4. In your browser, navigate to https://www.cynet.com/incident-response/incident-response-sans-the-6-steps-in-depth/.
  5. 5. Review the six steps listed on the website.
  6. 6. Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?

Note: It is impossible to know at the beginning of any incident whether the case might become a court case. A good incident response team should approach every incident assuming that evidence documentation is required.

Part 2: Create an Incident Response Policy (0/7 completed)Note: There are many types of incident response plans. Remember that a plan is different from a policy. A policy is a high-level document that describes the organization’s stance on the particular topic and how it will comply with related governance and laws. A plan, on the other hand, is how the policy will be executed. An incident response plan should be generic enough to cover a variety of scenarios but also specific enough that an organization can quickly mobilize during an incident. Names of specific people should never be used in an incident response plan. Rather, roles and titles should define who is responsible for what portion(s) of the plan.

  1. 1. Navigate to “Security Policy Templates” at https://www.sans.org/information-security-policy/, then locate and review the “Security Response Plan Policy”.
  2. 2. Describe how this policy would be associated with an incident response plan.

Note: When responding to an incident, remember who the provider of information is and who the consumer is. Senior management approves the response policy and budget, but it does not possess the subject matter expertise to handle the incident. Meanwhile, the incident response team should make only recommendations to management, not make decisions that might impact business. It is up to senior management to either give or deny approval.

Management remains the consumer and chief decider, based on information provided to it by the experts.

  1. 1. Review the following characteristics of the fictional Bankwise Credit Union:
  • The organization is a local credit union that has several branches and locations throughout the region.
  • Online banking and use of the internet are the bank’s strengths, given its limited human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
  • The organization wants to create an incident response team to deal with security breaches and other incidents if attacked and provide full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection.
  • The organization wants to implement this policy throughout the organization to provide full authority during a crisis to the incident response team over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.
  1. 1. Create an incident response policy that grants team members full access and authority to perform forensics and maintain a chain of custody for physical evidence containment. Create this policy for the Bankwise Credit Union.

Bankwise Credit Union

Incident Response Team – Access and Authorization Policy

Policy Statement
Insert policy verbiage here.

Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.

Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?

Standards
Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards

Procedures
Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process.

Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.

Challenge Exercise Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.

Having an incident response plan is a great first step. However, if the plan is never tested, it likely will not work in a scenario when needed. One way to test an incident response plan is to execute a tabletop exercise. During a tabletop exercise, a probable scenario is created, and all incident response team members are required to meet and discuss the scenario. The purpose of the exercise is to see which parts of the plan work well and which parts fail. Once the exercise has been completed, the incident response team (along with policy and plan writers and other stakeholders) meet to update the plan as necessary.

As the CISO and leader of the organization’s incident response team, you are required to hold an annual tabletop exercise involving the incident response team.  Before the exercise can begin, you must complete the following tasks:

Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.

Create a brief abstract of the scenario to be approved by C-level executives.

PowerPoint_1E_Juneau

PowerPoint_1E_Juneau

  

PowerPoint_1E_Juneau

Project Description:

In the following project, you will create a new presentation that Kodiak West Travel will use for advertising Juneau highlights.

     

Open the file Student_PowerPoint_1E_Juneau.pptx   downloaded with this project.

 

As the title of this   presentation, type Juneau Alaska and as the subtitle, type Kodiak West   Travel 

 

Insert a New Slide using the   Content with Caption layout. In the title placeholder type The View from   Above 

 

In the content placeholder on   the right side of the slide, from your downloaded data files, insert the   picture p01E_Aerial_View.jpg.   Format the picture with the Rotated, White picture style.

 

In the text placeholder on the left, type View   a glacial ice field from above by plane or helicopter. If you are more   adventurous, try glacier trekking in Juneau where you can land on a glacier   and climb an ice wall. (include the period) 

 

Insert a New Slide using the Two   Content layout. In the title placeholder, type On Land and Sea

 

 

In the content placeholder on   the left, type the following text, increasing and decreasing the list level   as shown below. In this presentation theme, the first-level bullet points do   not include a bullet symbol. The second level-level bullet points will   include a bullet symbol.
 

On   the water
 Whale watching
 Kayaking
Mount   Roberts tramway
 Spectacular views of Juneau
 Recreational hiking trails

 

In the content placeholder on   the right, from your downloaded data files, insert the picture p01E_Whale.jpg.   Apply the Reflected Rounded Rectangle picture style.

 

Insert a new slide with the   Picture with Caption layout. In the title placeholder, type Mendenhall   Glacier and   then in the picture placeholder, from your data files, insert the picture p01E_Falls.jpg.

 

In the text placeholder, type Walk to   Mendenhall Glacier from the Visitor Center to get a close-up view of Nugget   Falls. (include   the period)

 

In the Notes pane, type Mendenhall   Glacier is the most famous glacier in Juneau and in some years is visited by   over 400,000 people.   (include the period)

 

Insert a Header & Footer on   all Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 1E_Juneau 

 

Display the Document Properties.   As the Tags, type Juneau
 

  Note, Mac users, instead of Tags, use the Keywords box.

 

Save and close the file, and   then submit for grading.

Exp19_Excel_AppCapstone_CompAssessment_Manufacturing

 

#Exp19_Excel_AppCapstone_CompAssessment_Manufacturing

#Excel Comprehensive Capstone Assessment – Manufacturing

#Exp19 Excel AppCapstone CompAssessment Manufacturing

Project Description 

You have recently become the CFO for Beta Manufacturing, a small cap company that produces auto parts. As you step into your new position, you have decided to compile a report that details all aspects of the business, including: employee tax withholding, facility management, sales data, and product inventory. To complete the task, you will duplicate existing formatting, utilize various conditional logic functions, complete an amortization table with financial functions, visualize data with PivotTables, and lastly import data from another source.

Start Excel. Download and open   the file named Exp19_Excel_AppCapstone_ComprehensiveAssessment- Manufacturing.xlsx. Grader has   automatically added your last name to the beginning of the filename. 

Group all the worksheets in the   workbook and fill the range A1:F1 from the Insurance worksheet across all   worksheets including the formatting. Ungroup the worksheets after the fill is   complete and ensure the Insurance worksheet is active.

Click cell I5, and enter a   function that determines the number of full-time employees, (FT).

Enter a database function in   cell I6 that determines the average salary of all full-time employees with at   least one dependent. Format the results in Accounting Number Format.

Enter a lookup function in cell   E5 that returns the tax deduction amount for the number of dependents listed   in the cell C5. Use   the table in range H13:I17 to complete the function. The maximum deduction is   $500.00; therefore, employees with more than four dependents will receive no   additional deductions.

Use Auto Fill to copy the   function down, completing column E. Be sure to use the appropriate cell   referencing. Format the data in column E with the Accounting Number Format.

Enter a logical function in cell   F5 that calculates employee FICA withholding. If the employee is full-time   and has at least one dependent, then he or she pays 7% of the annual salary   minus any deductions. All other employees pay 5% of the annual salary minus   any deductions. Copy the function down through column F. Format the data in   column F with Accounting Number Format.

Apply conditional formatting to   the range C5:C34   that highlights any dependents that are greater than 3 with Light Red Fill and Dark Red Text.

Click cell H10, and enter an   AVERAGEIFS function to determine the average salary of full-time employees   with at least one dependent. Format the results in Accounting Number Format.

Use Advanced Filtering to   restrict the data to only display full-time employees with at least one   dependent. Place the results in cell A37. Use the criteria in the range   H24:M25 to complete the function.

Ensure that the Facilities   worksheet is active. Use Goal Seek to reduce the monthly payment in cell B6   to the optimal value of $6000. Complete this task by changing the Loan amount in cell E6.

Create the following three   scenarios using Scenario Manager. The scenarios should change the cells B7, B8,   and E6.
 

Good   
  B7 = .0325
  B8 = 5
  E6 = 275000
 

Most   Likely
  B7 = .057
  B8 = 5
  E6 = 312227.32
 

Bad
  B7 = .0700
  B8 = 3
  E6 = 350000
 

  Create a Scenario Summary Report based on the value in cell B6. Format the   new report appropriately.

Ensure that the Facilities   worksheet is active. Enter a reference to the beginning loan balance in cell   B12 and enter a   reference to the payment amount in cell C12

Enter a function in cell D12,   based on the payment and loan details, that calculates the amount of interest   paid on the first payment. Be sure to use the appropriate absolute, relative,   or mixed cell references.

Enter a function in cell E12,   based on the payment and loan details, that calculates the amount of   principal paid on the first payment. Be sure to use the appropriate absolute,   relative, or mixed cell references.

Enter a formula in cell F12 to   calculate the remaining balance after the current payment. The remaining   balance is calculated by subtracting the principal payment from the balance   in column B.

Enter a function in cell G12, based on the payment   and loan details, that calculates the amount of cumulative interest paid on   the first payment. Be sure to use the appropriate absolute, relative, or   mixed cell references.

Enter a function in cell H12,   based on the payment and loan details, that calculates the amount of   cumulative principal paid on the first payment. Be sure to use the   appropriate absolute, relative, or mixed cell references.

Enter a reference to the   remaining balance of payment 1 in cell B13. Use the fill handle to copy the functions created in   the prior steps down to complete the amortization table. 

Ensure the Sales worksheet is   active. Enter a function in cell B8 to create a custom transaction number.   The transaction number should be comprised of the item number listed in cell   C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use   Auto Fill to copy the function down, completing the data in column B.

Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than   or equal to $4000. Otherwise, the function will display a blank cell. Use Auto   Fill to copy the function down, completing the data in column G. 

Create a data validation list in   cell D5 that displays Quantity, Payment Type, and Amount (in that order).

Type the Trans# 30038C in cell B5, and select Quantity from the validation list in   cell D5.

Enter a nested lookup function   in cell F5 that evaluates the Trans # in cell B5 as well as the Category in   cell D5, and returns the results based on the data in the range A8:F32.

Create a PivotTable based on the   range A7:G32. Place the PivotTable in cell I17 on the current worksheet.   Place Payment Type in the Rows box and Amount in the Values box. Format the   Amount with Accounting Number Format.

Insert a PivotChart using the   Pie chart type based on the data. Place the upper-left corner of the chart   inside cell I22. Format the Legend of the chart to appear at the bottom of   the chart area. Format the Data Labels to appear on the Outside end of the   chart.

Insert a Slicer based on Date.   Place the upper-left corner of the Slicer inside cell L8.

Use PowerQuery to connect to the   Access database Exp19_Excel_AppCapstone_Comprehensive_Inventory.accdb.   Load the Inventory table into a new worksheet named Inventory.
 

  Note, Mac users, download and import the delimited Inventory.txt file into a new worksheet named Inventory starting in cell A1.

Create a footer with your name   on the left, the sheet code in the center, and the file name on the right for   each worksheet.

Save the file Exp19_Excel_AppCapstone_ComprehensiveAssessment-   Manufacturing.xlsx. Exit Excel. Submit the file as directed.

Physical security assesment

Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

Research Topic

Please find the attachment for instructions and Topic (can be found in Mind Map)

Instructions must be followed please I have attached guide Doc

Topic -Evolution of Ransomware

Also attached the Mind Map Absolutely No plagarisgm 

less than 10% is allowed

10-12 pages

Access and Optimization of Technology

  1. Please discuss the following
  2. How is evaluating an organization’s Capability Maturity Model Integration (CMMI) level associated with governance, and why should IT leadership be concerned with the CMMI?
  3. How will the Virtuous Business Model impact governance in the organization?

3. Universal Principles of Governance for Biblically and Nonbiblically Normed Institutions

minimum 550 words and three references

Java Coding Problem

2. Write a program given a number in any base (base 2 to base 16) and rounds that number to a

specified place. Rounding up occurs when the digit to the right of the rounding place divided by the

number’s base is 0.5 or more. For example, 0.12468 rounded to 3 places is 0.125 because 6 divided by

8 is greater than 0.5; when rounded to 2 places, it’s 0.13 because 4 divided by 8 is 0.5; and it’s 0.1

when rounded to 1 place because 2 divided by 8 is less than 0.5. Input from the keyboard three (3)

values: a number, the base of that number, and the number of places to be rounded. Assume the

numbers entered will have at least one digit to the right of the place to be rounded and at least one digit

to the left of the decimal point. Also, assume the rounding place will never be 0 (round a whole

number). For each input, output to the screen the number rounded to the given number of places. Do

not output any digits beyond the rounded place. Finally, ask the user if he/she wishes to run the

program again (check case). Refer to the sample output below.

Sample Run:

Enter the value: 0.11101

Enter the base of the number: 2

Number of decimal places to round: 4

The resulting value: 0.1111

Run again (Y/N): y

Enter the value: 35.4321

Enter the base of the number: 7

Number of decimal places to round: 3

The resulting value: 35.432

Run again (Y/N): N