EH week13 p13

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please reference and follow the attachments and needed 2 pages words. Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

(IT and Organization Learning)

  • Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section? 

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least one page in length. The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

Python cod

  

Write a Python program that reads IP addresses from an input file (ip_input.txt), checks its format and validity, and then checks its connectivity to each IP. Use the IP input file shown as below. Submit your code and the output screen shots after a run.

8.8.8.8

2.2.2.2.2

127.5.6.7

3.3.3.305

0.120.3.5

8.8.8.1

169.234.6.8

8.8.4.4

4.4.8.8

(you may add more to test your code)

Validity check (check the format and filter the addresses that are not publicly routable):

– IP should be four dotted format (x.x.x.x)

– octets having values between 0-255.

– IP should not belong to one of these blocks: 

o 0.0.0.0/8

o 127.0.0.0/8

o 169.254.0.0/8

o (you may add more if you like)

Connectivity check:

– Use ping for testing reachability to the IP address.

The output could look like:

Ip address: 8.8.8.8

Validity: yes

Reachability: yes

Ip address: 2.2.2.2.2

Validity: no – bad format

Reachability: no

Ip address: 127.5.6.7

Validity: no – in block 127.0.0.0/8

Reachability: no

…….

…….

human computer interface

 discuss how a particular human-computer interface might impact a person’s satisfaction with and ability to use technology. Then, describe another example of a technology product and the human-computer interface you use to interact with that product, such as a wearable device or a self-service checkout machine. In your post, discuss the positives and negatives of the experience, with a focus on how HCI elements allow you to interact with the technology. Finally, describe how interacting with that technology compares to the way you were accustomed to doing that task before. 

new tech bus leaders

 Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.  

Disuccsion

. When asked if you “accept the terms” of downloaded software, describe how clicking “yes” indicates you have entered into a contract. Discuss whether you have ever read these terms of use before you clicked and what the terms say. Minimum 250 words. APA format

Cloud Computing Research paper

For this project, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

  • The paper must adhere to APA guidelines including Title and Reference pages.  
  • There should be at least three scholarly sources listed on the reference page.  
  • Each source should be cited in the body of the paper to give credit where due.  
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. 
  • The body of the paper should be 3 – 5 pages in length.  
  • The Title and Reference pages do not count towards the page count requirement

Fun Run 3 – Multiplayer Games

Run 3, is the third game in the Run trilogy. 

Run 3 takes place in a series of tunnels in space. 

To play the amazing run 3 game, the players have to run and jump to pass different levels of obstacles. 

Run 3 introduces a number of new mechanics not seen in the previous games, including crumbling tiles, ramps, darkness, and the ability to re-enter a tunnel after jumping out.

People remember this game as a game everyone plays at school. 

Good luck and have fun guys! 

How To Play:

Use the left and right arrow keys to move.

Use Space to jump.

Review: Run 3 online. 

When running into another lane, that lane will turn into the floor.

You can pause/resume/restart, switch aliens and turn the music, sound on/off in the pause menu.