Respon

 Please see the attached word document and responses to person 1 and person 2 based on their discussion. 

Respond to your 2 people:

  • Respond to at least two people, constructively commenting on their critical analysis of risks in relation to “Hintel,” and the risk management framework they have chosen and why.

  • Provide sensitive and insightful feedback, encouraging further dialogue through open-ended questions.

Forensic

part-1

Your organization suspects that they have a malware infection somewhere in the environment. List several ways you could detect the infected system(s). What is the most practical means you can devise to identify the infected system(s)? What was one other means you initially considered but rejected? Why did you reject that method?

Provide a paragraph each for the list of ways to detect infected systems, the most practical means you found, and a rejected means and why it was rejected.

part-2

Based on the knowledge you have achieved thus far in this class, compose a minimum 2-page, double-spaced expository essay using the current APA version with a title page and reference page detailing what career-building networking and advancement skills you could utilize as an IT professional and describe how you will use this knowledge in your present or future career. For example, you could find and get involved with local security associations and learn about the opportunities in your area. Example associations would be IEEE, ISSA, ASIS, Infragard, (ISC)2, and the AISP. Most have membership discounts for students. Include any information you can find out in your lab. Provide at least four ideas and explain thoroughly. You must have at least two references.

Portfolio Section 2 (Connection with other fields)

Section 2 asks you to demonstrate that you can integrate other fields of work into your core engineering.

What is “another field”?  

We’re talking about other disciplines. Not another programming language, not databases….these are work that would cross all fields. “Another field” is 

1. Another engineering field

2. A science field (biology, chemistry etc) 

3. Math or Statistics

4. etc

(My major is computer science.)

(Page 8-9 of the file is an example.)

Write a program to display

  

(C program)

Write a program to display the duplicate values in an array.

Description of what the program does

 

Summary of the problem’s specifications and assumptions

 

Parameters

 

Algorithm(s) used (including any special notes)

 

Output (any print statements, files created, etc.)

 

Return values (does it return any parameters?)

Java Program

 

Write a super class program called lastNameFirstNameInitialSuperPgm3 containing:
  a) methodOne   that accepts one int and can not be inherited displaying the
                 the int value received.
  b) methodTwo   that accepts two strings and displays I am super methodTwo   
  c) methodThree that accepts nothing and displays I am super methodThree   
  

2) Write a sub-class named lastNameFirstInitialSub1
  that inherets all methods from your super class in question 1 ( lastNameFirstNameInitialSuperPgm3 )


3) Write a sub-class program called lastNameFirstInitialSub2 containing
  all inheritable methods from your super class in question 1 ( lastNameFirstNameInitialSuperPgm3 )
  overloading methodTwo by displaying "Hello I am sub class Two"

Iphone Discussion

 The first iPhone was revealed at the Mac World conference in early January 2007, and later released in June of that year. Initially, third-party native applications were not allowed. Apple products have created a unique brand value within society.  Their products do not support third party applications, thus providing additional layers of security from social engineering and malware attacks.

  • How has the use of core ideas such as location and orientation-aware pushed iPhone beyond its web browser and tightly integrated web functionalities?
  • Why are Plists (property lists) the easiest way to store information on Macs?
  • Discuss the benefits of using Xcode for developing iOS apps.

Server Roles

The committee has recently been discussing the functions of each server. They are not familiar with server roles, but they do know how specific servers are used. 

Some of the server functions they mention include:• Providing a website• Supporting mobile devices for accessing the server over the network• Offering shared files on large scale• Managing Active Directory functions for the domain• Offering VPNs• Coordinating printing• Providing web-based applications to internal users 

Create a short report for the committee that translates each of these functions into server roles offered through Windows Server 2016. Also, suggest some other roles that are likely necessary on the company’s networks. Include a short explanation of each server role you mention.