python

 

Write a Python program to hold information on a course

  • Program should have a main class
  • Variables are: Teacher name, Credits, Course Name
  • Add a method to enter teacher name and a method to enter credits
  • Use a try catch block to verify that credits is an “int”
  • Add a method to report on the variables  
  • Use _init_ method to create attributes
  • Use def main method to start class
  • Create at least two instances 
  • Add data and print using the methods defined in the class.

mad discussion

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

threat modeling

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin

dq

Networks have changed drastically over the last 30 years.  With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business.  Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy.

Case Study 8

Read Deceitful Spammer or Marketing Genius? and complete the questions at the end of the case study.

https://www.scu.edu/ethics/focus-areas/business-ethics/resources/deceitful-spammer-or-marketing-genius/

At least 600 words with APA format. Need to answer all questions. Reference and citations.

BSWA Week 10

 You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

Team Research Paper

 

The major team research project will be turned in during residency weekend.  Each student will be assigned to a group (Executive Team) to complete the project. The research project will focus on research related to a cloud computing topic of your team’s choice.  Pre-work on the project including the proposed Title and Outline should be emailed to the professor early for review and acceptance on Saturday afternoon.  The team should then begin to work on the project Saturday afternoon of the residency to be sure it can be completed during the Residency weekend. 

Requirements for the research paper include… 

• Must be written in APA format and should be 20-25 pages long. 

• Contain at least 3-5 works cited (references)

• At least 2 of the works cited should be peer-reviewed articles ( not more than 5 years old)

• No Wikipedia citations

crime scenario

you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).