network analysis/tech using the NS3 network simulator and , report-1000 words and , 10 ppt slides w/o notes
java
/**
* COSC 1436
* EL Centro
* Week 15
* Cell Phone Class
*
* This CLASS does not need to change
*
*/
import java.util.ArrayList;
import java.util.Arrays;
public class CellPhone {
// Attributes
private final ArrayList AVAILABLE_BATTERY_TYPES = new ArrayList<>(
Arrays.asList("NiCd", "NiMH", "Lo-ion", "Li-pol"));
private ArrayList favoritePhoneNumbers = new ArrayList();
private String cellProvider = "AT&T";
private String batteryType = null;
private boolean isFlipPhone = false;
private boolean hasInternational = false;
// Methods
public ArrayList getFavoritePhoneNumbers() {
return favoritePhoneNumbers;
}
public void addAFavoritePhoneNumber(Long phoneNumber) {
this.favoritePhoneNumbers.add(phoneNumber);
}
public void deleteAFavoritePhoneNumber(int phoneNumber) {
this.favoritePhoneNumbers.remove(phoneNumber);
}
public String getCellProvider() {
return cellProvider;
}
public void setCellProvider(String cellProvider) {
this.cellProvider = cellProvider;
}
public String getBatteryType() {
return batteryType;
}
/**
* Validates battery type
* @param batteryType
* @return
*/
public boolean setBatteryType(String batteryType) {
if (AVAILABLE_BATTERY_TYPES.contains(batteryType)) {
this.batteryType = batteryType;
return true;
}
return false;
}
public boolean isFlipPhone() {
return isFlipPhone;
}
public void setFlipPhone(boolean isFlipPhone) {
this.isFlipPhone = isFlipPhone;
}
public boolean isHasInternational() {
return hasInternational;
}
public void setHasInternational(boolean hasInternational) {
this.hasInternational = hasInternational;
}
public ArrayList getAVAILABLE_BATTERY_TYPES() {
return AVAILABLE_BATTERY_TYPES;
}
public boolean isValidBatteryType() {
return batteryType != null;
}
@Override
public String toString() {
StringBuilder builder = new StringBuilder();
builder.append("CellPhone [favoritePhoneNumbers=");
builder.append(favoritePhoneNumbers);
builder.append(", cellProvider=");
builder.append(cellProvider);
builder.append(", batteryType=");
builder.append(batteryType);
builder.append(", isFlipPhone=");
builder.append(isFlipPhone);
builder.append(", hasInternational=");
builder.append(hasInternational);
builder.append(", valid battery type=");
builder.append(isValidBatteryType());
builder.append("]");
return builder.toString();
}
}
Create a new Java Project for this assignment.
Copy the provided class CellPhone into your default package area.
- Create a new class called SmartPhone that extends CellPhone. Add the following attributes:
- boolean – hasGPS.
- boolean – hasWIFI.
- String OSVersion. Default to “Windows 10 Mobile”;
- long internalMemoryStorageCapacity – Default to 16_000_000_000L;
- Generate the setters and getters and toString() method.
- Create a new class called TestPhone that includes a main() method.
- Inside the main() method of TestPhone, do the following:
- Create an instance of CellPhone. Set all the following attributes to values of your choosing: (Call all the setters with values)
- cell provider
- isFlipPhone
- hasInternational
- batteryType
- Add 2 favorite phone numbers
- Display the CellPhone toString results.
- Create an instance of SmartPhone. Set the following attributes to values of your choosing:
- hasGPS
- hasWIFI
- OSVersion
- cell Provider
- isFlipPhone
- hasInternational
- batteryType
- Add 1 favorite phone number
- Display the SmartPhone toString results.
- Create an instance of CellPhone. Set all the following attributes to values of your choosing: (Call all the setters with values)
Deliverables include the SmartPhone.java and TestPhone.java files.
There is no defined constructors in the CellPhone class so the super() method does not need to be addressed.
cyber-attack can cause economic damage
There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?
Legal Reg, Compliance, Invest
For this assignment, submit a 5-6 page paper that addresses the following questions as completely as possible.
- What is Information Security Governance?
- What are some of the common organizational roles involved in Security Governance?
- What documentation is associated with Security Governance?
- What are some of the policies use within the Information Security Governance process?
- What are some of the measures, metrics, and methods to ensure governance compliance?
Title page and References pages do not count towards the total. No abstract or table of contents is required, but please observe all other aspects of the APA guidelines with regard to spacing, page number, margins, headings, fonts and reference citations
At least 4 valid references must be supplied. Wikipedia and Techopedia are not allowed.
Network Management
Instructions:
Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).
–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.
–The minimum requirements are as follows:
—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.
—At least one site must have a connection to the Internet.
—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.
—At least one switch at each site that creates a LAN of at least two PCs.
—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.
—One site must have at least one server.
—Appropriate cabling and connectivity between the two sites.
—Labeling to make the drawing professional.
–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).
Part Two:
-The minimum requirements are as follows:
—An executive summary of the implementation plan
—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)
—Other recommended network management or monitoring applications/techniques recommended
—At least 10 recommended scorecards and/or metrics for monitored circuits and devices
—A list of which network devices will be monitored
—Security recommendations
—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring
—Labeling to make the drawing professional
Case study
Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
Articlee writing
Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.
2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.
APA format
What are some of the potential risks involved with cloud computing? Does the research and model in this article propose a viable solution to cloud-based risk management?
Article:
Mackita, M., Shin, S.-Y., & Choe, T.-Y. (2019). ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing. Future Internet, 11(195), 1-21. Retrieved from https://doi.org/10.3390/fi11090195
After reading the article this week, please answer the following two questions.
- What are some of the potential risks involved with cloud computing?
- Does the research and model in this article propose a viable solution to cloud-based risk management?
A substantive post will do of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.