System architecture

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components. [600 words]

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

qa

 you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Data Encryption Standard

Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. 

short answer

 

Forms are often used on business Websites to collect data of various kinds (sales, memberships, mailing lists, etc.). The quality of the data is vital to the success of the business and its ability to use the data appropriately. Using JavaScript for form validation is one line of defense. Validation is often applied to check for a valid zip code, phone number, or product number. Another way JavaScript is applied in a form is to make entering the data easier (hint: focus).

For this thread, select two of the following potential form fields and write the JavaScript you would use to validate or make the data entry easier for the visitor:

  • U.S. phone number
  • Zip + 4
  • Social Security Number
  • A section that asks for the following:
    • First Name
    • Last Name
    • Street Address
    • City
    • State
    • Zip Code
  • Ordering a sweater that comes in any of the following colors:
    • Black
    • White
    • Gray
    • Blue
    • Red

case study

Using Security Policies and Controls to Overcome Business Challenges

Learning Objectives and Outcomes

  • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
  • Identify four IT security controls for a given scenario.

Scenario

  • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
  • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements

Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Length: 1–2 pages

Critical analysis of the changes to the ISO 9000 standard

  

Quality Management Systems

Main Assignment due November 12th, 2020

Critical analysis of the changes to the ISO 9000 standard

Change is never easy. There has been a lot of discussion around the changes to ISO 9001:2015 vs earlier versions of the standard. Many in the industry feel ISO 9001:2015 has brought positive change as new elements are introduced while others feel it is a negative change on the standard or to their business. Who is right? Why?

1. Develop an essay on the changes in ISO 9001:2015; why you feel they are a positive &/or negative progression of the standard; and suggestions on how an organization can prepare for getting certified for the first time.

Also read: Information systems in global economy

2. As a minimum your analysis should address:

· Overview of changes from ISO 9001:2008 to ISO 9001:2015

· Outline what you believe are positive and negative changes. Based on these changes, decide on if the revision was positive or negative overall.

· Analysis to support your decision

· Suggestions on how a company prepares for certification. Include the steps, tools, best practices, etc., an organization may use.

· Bibliography of supporting articles

3. Your analysis should be 4 full pages at a minimum (12 font), single space, excluding a supporting bibliography of maximum 3 references. You may choose to include flowcharts, graphs and images that are relevant.

4. References must be directly cited in your analysis. If you are unclear what this means, please ask.

5. Hint: Most assignments that do well will have a structure. Having headings relevant to the grading criteria or an introduction, analysis, and conclusion will ensure you cover all the topics.

Grading Criteria (note that grading is roughly equivalent to effort in each section):

  

Overview of changes

30%

 

Analysis

30%

 

Suggestions

30%

 

Bibliography & appearance

10%

       

Grand Total

100%

Analysis of Algorithms

 1. Describe how one can implement each of the following operations on an array so that the time it takes does not depend on the array’s size n. a. Delete the ith element of an array (1 ≤ i ≤ n).

 b. Delete the ith element of a sorted array (the remaining array has to stay sorted, of course). 

2. If you have to solve the searching problem for a list of n numbers, how can you take advantage of the fact that the list is known to be sorted? Give separate answers for

 a. lists represented as arrays.

 b. lists represented as linked lists.

 3. a. Show the stack after each operation of the following sequence that starts with the empty stack: push(a), push(b), pop, push(c), push(d), pop

 b. Show the queue after each operation of the following sequence that starts with the empty queue: enqueue(a), enqueue(b), dequeue, enqueue(c), enqueue(d), dequeue