DQ

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Threat Assesment

 You are the webmaster for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. Also, include references or citations if any

Project on Disaster Recovery on web application security

Each student will prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

Additional details on project deliverables will be presented next week.

Each student will be asked to pick a unique topic of their own choosing. Topics might include processes related to secure web technologies or a review of a specific web related cyber attack.

Gather all final project material:

  • final paper
  • power point
  • other

Create a single archive, attach here and submit
(ZIP not RAR please)

APA FORMAT references

  1. This assignment was started in class and needs to be completed prior to submission. All submissions MUST be a WORD document – NOT a PDF document. 

    Directions and Grading: 

    APA-7-Compliant Title Page = 40 points

    • REFER to Foundations p. 31 (bottom right number) for perfect sample
    • Use the title “APA-7 Practice with Title and References Pages”
    • APA-7-Compliant References Page = 60 points
    • REFER to Foundations p. 32 for perfect sample
    • REFER to Foundations pp. 33-39 to find the CORRECT formula for EACH article listed below
    • USE THE BELOW ARTICLES: BE SURE TO LOG INTO MY MONROE BEFORE PASTING THESE LINKS

https://www.proquest.com/docview/2713605548

https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression

https://www.who.int/emergencies/situations/monkeypox-outbreak-2022

Graph theory – Project

 

For this  project, you will work in a group to submit your project proposal,

and then start your project as outlined below.

Projects could be in one of the following categories:

1. Problem transformation to graph theory. Example: four-cube puzzle is not a graph

problem initially but a creative transformation makes a graph theory problem from 4 cube

stack.

2. Graph Generation: a combination of multiple graphs and creating a new graph. For

example, shortest path routing with multiple weights (distance, crime rate, sight view,

hotel rating, etc…)

3. More efficient graph algorithms. Routing, MSTs, Max flows, Community Detections, etc

4. Graph neural networks, (Sample contents from Stanford, Upenn).

Project Topic

Each group can propose a project topic related to the application of graph theory

in any of the following areas:

• Telecommunication

• Social networks (graphs captured from Twitter, Facebook, etc.)

• Cybersecurity

• Biological networks (biochemical, neural, ecological, etc.).

• Transportation (flights, ground, ships, etc.).

• Trade and commerce

• Education (access, improvement).

• Astronomy and astrophysics

• Networks of information (internet, citation, etc.)

• Epidemics (spread of covid-19 as an example)

• Graph neural networks

• Unmanned Aerial Vehicle delivery network

• Other areas of your choice (with confirmation).

Proposal Rubric: 

Length 1000 words  – 5 points

Format IEEE/ACM – 5 points

Flow Clear and logical sequence of steps – 5 points

Creativity/Innovation Repeated projects will not be accepted – 10 points

Implementation Well definition of implementation process – 5 points

Evaluation Well definition of evaluation process – 5 points

Risks Possible problems – 3 points

References – 2 points

Total = 40 points

Practical Connection

 

Course: System Analysis and Design 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment (My role : Software Quality Analyst ). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Blockchain – Discussion

This week’s reading introduced an overview of blockchain and its impact on business. Create a new thread, choose a use case from section III, and a risk for adoption from section IV. Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread, choose a use case from section III, and a risk for adoption from section IV. Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)