Please write 350 words essay on the following with references?

 Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.

Select one of these compromises and explain how it could be avoided.

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic.

 

Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic. Your final project will consist of a 12 minutes, 12 slide powerpoint presentation that you will present at residency and a 1 page single spaced summary and an annotated reference list as described below all of which will be submitted in Week 15. 

You must also respond to two of your peers’ proposals. Help them make a better, more focused, and more interesting presentation. 

Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source.

case study

Assignment: Create User Policy

Learning Objectives and Outcomes

  • Create a report detailing user access policies based on research.
  • Explain the details of user policy creation in organizations.

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.

Sean, your manager, just came into your office at 6:00 p.m. on Friday and asks you to write a report detailing these user access policies. He needs you to research a generic template and use that as a starting point from which to move forward. He wants you to complete this task over the weekend as he has just been given a boatload of tasks in the management meeting which ended a few minutes ago. He is counting on you to take some of the load off his shoulders. The report is due to senior management next week.

Assignment Requirements

Look for existing policy templates and examples from organizations of similar type. Write a report detailing these user access policies based on your research, and place them into a table with an introduction explaining the following: who, what, when, why. Be sure to add a conclusion with a rationale for your selection. Reference your research so Sean may add or refine this report before submission to senior management.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Length: 3–4 pages

Self-Assessment Checklist

  • I created a professional report.
  • I included a table listing policies for the given scenario.
  • I used references.
  • I used my school’s preferred style guide and formulated my report clearly.
  • I provided a rationale and conclusion.

Project #4 CRC cards and Class diagram

CALIFORNIA STATE POLYTECHNIC UNIVERSITY, POMONA PROJECT CASE STUDY

Project #4 CRC cards and Class diagram

ACTIVITY DIAGRAM

The following activity diagram depicts the process of buying eye glasses from the viewpoint of the patient. The first step is to see an eye doctor who determines if the patient needs glasses then gives the patient a prescription. The patient goes to a glasses store, where he selects the frame and places the order for the glasses. Once the glasses have been made, the patient returns to the store for a fitting and pays for the glasses.

page1image3832948128

USE CASE DIAGRAM

The following use case diagram illustrates the process of buying eye glasses.

page2image3832981184

CRC CARDS AND CLASS DIAGRAM

The following concepts were identified from the Activity diagram and Use Case diagram above.

Patient Prescription Eyeglasses Frame

Lenses Order Doctor Store

ATTRIBUTES AND BEHAVIORS

The system needs to remember at minimum the following attributes and perform the following operations

System Attributes

System Behaviors

Eyeglasses getLenseID Eyeglasses getFrameID Order calculateTax
Order calculateItemCost Order calculateTotalCost Customer getContact Customer getPaymentInfo Prescription getSpecification Lens getStrength

Frame getStyle
Store getDirections Doctor getAppointment

Bill to address CC#
Email address ID

Customer
Customer
Customer
Customer
Customer
Customer
Customer
Doctor ID
Eye glasses Base cost Eyeglasses Description Eyeglasses Discount cost Eyeglasses Manufacturer Eyeglasses Model

Frame ID
Lens ID
Order Date
Order Discount price Order ID

Order Quantity
Order Retail price Prescription Date Prescription specification Product ID (eyeglasses) Ship to address

Store name Store phone Store address Store number

Name
Phone number (home) Phone number (work)

PROJECT REQUIREMENTS

1. Create a CRC card for each class
2. Use the classes that were outlined for you and create the CLASS diagram for the system.

  •   Determine which class each attribute belongs to.
  •   Identify and add associations to the diagram
  •   Name your associations
  •   Add attributes and behaviors to the diagram
  •   Identify and add multiplicity indicators to the diagram
    PROJECT DELIVERABLES
    1. Upload your PDF version of the project to the assignment posting on blackboard 2. Use the cover page at the end of this handout as the first page of your assignment

Course: Assignment: Student Name:

CIS 3150 –Introduction to Systems 

Automatic coding. Discussion board

There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers not learning necessary programming fundamentals if programming is no longer required. For instance, without understanding how looping and variable initializations work, how easily would an individual be able to find a logic error in a looping process? Do you think programmers of the future should still learn programming fundamentals, even if coding is no longer required? Why or why not?

AD

Explain three different ways that freedom of expression is limited in spite of the unequivocal language of the First Amendment.
Explain how common law state court rulings prompted Congress to pass the Communications Decency Act. What does the CDA do?
What constitutional and statutory protections of privacy existed before the Internet became prevalent?

Discussion 7 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.