password recommendations

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary.

Critical analysis of the changes to the ISO 9000 standard

  

Quality Management Systems

Main Assignment due November 12th, 2020

Critical analysis of the changes to the ISO 9000 standard

Change is never easy. There has been a lot of discussion around the changes to ISO 9001:2015 vs earlier versions of the standard. Many in the industry feel ISO 9001:2015 has brought positive change as new elements are introduced while others feel it is a negative change on the standard or to their business. Who is right? Why?

1. Develop an essay on the changes in ISO 9001:2015; why you feel they are a positive &/or negative progression of the standard; and suggestions on how an organization can prepare for getting certified for the first time.

Also read: Information systems in global economy

2. As a minimum your analysis should address:

· Overview of changes from ISO 9001:2008 to ISO 9001:2015

· Outline what you believe are positive and negative changes. Based on these changes, decide on if the revision was positive or negative overall.

· Analysis to support your decision

· Suggestions on how a company prepares for certification. Include the steps, tools, best practices, etc., an organization may use.

· Bibliography of supporting articles

3. Your analysis should be 4 full pages at a minimum (12 font), single space, excluding a supporting bibliography of maximum 3 references. You may choose to include flowcharts, graphs and images that are relevant.

4. References must be directly cited in your analysis. If you are unclear what this means, please ask.

5. Hint: Most assignments that do well will have a structure. Having headings relevant to the grading criteria or an introduction, analysis, and conclusion will ensure you cover all the topics.

Grading Criteria (note that grading is roughly equivalent to effort in each section):

  

Overview of changes

30%

 

Analysis

30%

 

Suggestions

30%

 

Bibliography & appearance

10%

       

Grand Total

100%

User Training

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?

Design an algorithm

 Design an algorithm that receives the letters of your first name in an array. It then finds the duplicates characters in your first name. Do the following to design the algorithm: 

 a. Write pseudo-code of algorithm 

b. Translate the pseudo-code to flowchart 

c. Translate the pseudo-code to a program 

d. Analyze algorithm asymptoticly (Determine primitive operations) 

e. Find the running time experimentally (On program above) 

Research paper for inferential statistics in decision making

Regression test for statistics:

Regression test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis.

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 2 pages

paper

Follow the doc for questions and concepts on which the questions must be answered 

Project Computer Science

Projects 200-400 words.
  1. Using the Internet as a resource, research multiple file systems for hard disks supported in Windows, such as MS DOS’s FAT file system, the 32-bit FAT file system, and the NTFS file management system. Submit your findings in a report.
  2. Compile a list of various data-compression techniques that are commonly employed in today’s computer systems. Which of these techniques is the most efficient? That is, which of these techniques has the maximum gain in storage space with the least effect on processing time?
Additional Resources
  1. MFD-Master File Directory: http://www.boogles.com/local/papers/tcfs-thesis/subsection2_7_2_2.html
  2. Data Compression: http://www.cisco.com/c/en/us/support/docs/wan/data-compression/14156-compress-overview.html
  3. Variable-length records: http://www.ibm.com/support/knowledgecenter/SSB27U_6.2.0/com.ibm.zvm.v620.dmsa5/hcsd2c10242.htm
  4. ISAM Databases: http://www.mixsoftware.com/product/db/intro1.htm
  5. International Organization for Standardization: http://www.iso.org/iso/home.html

data breach

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?