Assignment

  

  1. What are some examples of confidential information? (provide at least 5 examples). 

2. What does a buffer overflow do?  

3. Why is it important for information security professionals to know the laws that affect them? 

4. What are some other security models besides the CIA triad? 

5. What are the four components of security documentation? 

6. What are responsibilities of a security architect? 

7. What is authentication? What is authorization? Together, what are authentication and authorization used for? 

8. What are the three commands for administering database object permissions? 

9. What best practice network architecture should be used for databases that provide data via a web server to the Internet? 

10. Why is encryption generally not used in the core layer? 

***Please answer in order***

Write pseudocode

Write pseudocode for the 5 (five) problems for full credit. There are two ways to complete this quiz. One is to simply download the instructions file (docx) below and do your pseudocode code editing right into the instruction document. Then upload the edited Word file.The other is to type a separate document with your pseudocode and submit the newly created document. Make sure your pseudocode includes the problem descriptions. You get to pick your own poison. You DO NOT need to create C++ source code files for this assignment. Remember pseudocode is intended to be a description/roadmap for your program. Keep it simple but include enough information to define your plan. It is not supposed to look like code. Use the template sections. Purpose: Don’t just repeat the problem description. Think in terms of HOW you are going to do the job. Input: What values (if any) do you need from the user. You can also include known/defined values such as PI. Processing: Describe what processing/calculations need to be done Output: Results to be output. Text and/or calculated values.

Basic Student Records System

Basic Student Records System

Design and implement a simple student record system using Windows Forms in Visual Studio. Your program should have the following minimum requirements:

1. Your program should have a welcome screen.

2. The user should be presented with another screen where they can enter their grades.

3. The screen will have an option to calculate the average grade

4. The screen should also have an option to clear all the grades

5. The users can use it as many times as they like

6. The user can exit, and the program will then display the welcome screen.

Assignment Instructions:

• You are required to create a document with appropriate headings and sub-headings. You must include a short description of the task and how you intend to solve it.

• You must work individually on this task.

• You need to show evidence of different programming constructs you have learnt. You also need to include screenshots of your program.

response eric

 

In a world controlled by technology, the internet is something that has become a staple of any business. You have a range of options on how you choose to connect to the internet. DSL was one of the first options, carrying data through telephone lines, next came cable that uses buried ground lines serviced by cable companies. WiMax entered the industry around 2001 and uses wireless technology to carry data. Fiber is the newest technology, utilizing modulated light pulses.

In terms of security, DSL and cable are relatively equal as they are simple copper wires that can be tapped into with easily available equipment. WiMax is the least secure technology as wireless signals are easier to intercept than having to tap into a physical line. Fiber is the most secure option as it is expensive to get equipment for attempting to tap into and decode the data. The best security option is to protect your data inside your network and secure packets for transfer over the internet. You can use firewalls to ensure that your company’s data isn’t accessed without authorization in your network and encryption for when you transmit packets over your chosen connection medium.

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

computer security foundamental

  

IT departments in organizations are often expected to define a company’s information security policy. Although much of the security that needs to be added into an organization may reside in IT, all of the departments are involved in implementing the policies.

Post the following to the discussion board:

Assess the authority structure in an organization that uses formal information systems by answering the following questions:

Which department in an organization do you believe should be responsible for the company’s information security, and why?

What are some advantages and disadvantages of your choice?

Compare the tools an information security manager has available to properly implement the necessary security within an organization?

DQ

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar? 

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

Question 2 : Creating an Example Web Service. Page 42 Chapter 3.
Chapter 3
For submission : Read carefully “Using the Microsoft Stack” and “Using the Linux Apache MySQL PHP (LAMP) Stack” or 2 different approaches for creating a web service. Then
(a) compare the two approaches and
(b) explain 2 advantages of each approach relative to the other.

Java Question

 The Image uploaded is the homework assignment instructions, and the pdf uploaded is the rubric, if you have any questions let me know! also, if you do good on this assignment I will be working with you for this class for the entire semester!