Cloud computing_31_1

 Write a 2-3 page paper where you compare and contrast the differences between IDaaS, IaaS and IAM. The submission needs to include a minimal of 3 scholarly resources in APA format.

Please include the reference and citation. Need by 11/01 11:00 am.

Cloud Computing Discussion 10

Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) these quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Standalone quotes will not count toward the 3 required quotes.

Python Assignment

  airports = [{‘name’: ‘Cincinnati’, ‘altitude’: 2000, ‘code’: ‘CVG’}, {‘name’: ‘Chicago’, ‘altitude’: 1800, ‘code’: ‘OHA’}, {‘name’: ‘Indianapolis’, ‘altitude’: 1700, ‘code’: ‘INY’}]

1. Given the “airports” list above, create 3 lists, one of the airport names, one of the airport altitudes and one of airport codes using for loops… using list comprehensions…using another technique

2. Given the 3 lists from #1, combine them back into a list of dictionaries using the most efficient technique you can think of

3. Given the “airports” list above, find the total combined altitude using for loops… using the sum() function… using the reduce() function.

PLEASE PROVIDE PYTHON 2.X/3.X CODE FOR SOLVING THE EXERCISES ABOVE.

database management

IFB105 Database Management

Project – part A

Project overview

The IFB105 project gives you an opportunity to apply concepts and skills you acquired in the unit to a realistic database design scenario and reflect on the data requirements of an organisation.  

The submission is divided into 2 parts due at different times during the semester. These parts will cover:

  1. Design of a database
     
  2. Creation and use of a database  
     

The task for part A

In this part, you will:

  1. Design an ORM conceptual schema for a business domain based on sample reports required for that domain.
     
  2. Map a different ORM schema to a relational database schema.
     

.please there are several task on the file uploaded ..

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.

Article Summary

 

– Find 2-3 recent peer-reviewed articles (within the past 3 years) that  ‘closely relate to Impact of Mobile Computing on Businesses’  

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.

Java Project to be applied in Console

  

Description:

The Bank app is a console-based application that simulates banking operations. A customer can apply for an account, view their balance, and make withdrawals and deposits. An employee can approve or deny accounts and view account balances for their customers.

Purpose:

We want to see that you can meet deadlines and that you can code. You are expected to complete the following requirements and give a 5 minute presentation of your project.

Requirements:

● Build the application as a Maven project using Java 8

● All interaction with the user should be done through the console using the Scanner class

● Customers of the bank should be able to register with a username and password, and apply to open an account.

o Customers should be able to apply for joint accounts

● Once the account is open, customers should be able to withdraw, deposit, and transfer funds between accounts

o All basic validation should be done, such as trying to input negative amounts, overdrawing from accounts etc.

● Employees of the bank should be able to view all of their customers information. This includes:

o Account information

o Account balances

o Personal information

● Employees should be able to approve/deny open applications for accounts

● Bank admins should be able to view and edit all accounts. This includes:

o Approving/denying accounts

o withdrawing, depositing, transferring from all accounts

o canceling accounts

● All information should be persisted using text files and serialization via Object Input/Output Stream

● 100% test coverage is expected using J-Unit

o You should be using TDD

● Logging should be accomplished using Log4J

o All transactions should be logged

for Dr Elahi

Oliver’s business is now growing. He built a company and has sales agents and sales supervisors working for him all over England. He realizes using google spreadsheets is not sustainable. 

He wants to invest in a scalable system and he is thinking to recruit a software engineer and a data engineer (you). 

The software engineer has to come up with a mobile app that allows the sales agents to report their sales from the app. 

The app should be connected with a data pipeline that would eventually make the data ready for analysis. 

– What would be your strategy to build a strong and reliable data pipeline and how will you structure it ? Explain the different steps for processing the data, what makes each step important? 

Mention which tools would you use for each of these steps. Feel free to argument as much as you feel it relevant You’re free to make assumptions about the mobile app e.g. The raw data is stored in a No-Sql database…