Category: Computer science

  • “Securing Web Applications: Remediation Strategies Based on OWASP ASVS Guidelines and Biblical Principles”

    Page 1 of 2
    SECURITY ASSESSMENT REMEDIATION PROJECT ASSIGNMENT INSTRUCTIONS
    OVERVIEW
    In this project, you will build upon the earlier assignment paper (i.e., Security Assessment
    Findings Project) where you reported upon the results of a web security assessment. In this
    project, you will discuss recommended remediations and actions to address the vulnerabilities
    reported upon in the earlier paper. You will therefore complete the remaining sections of the
    assessment report that you started in the earlier project.
    Inputs
    • Security Assessment Findings Project paper (and the Web Application Assessment
    template it is based upon)
    • Lab report files from Labs 1-4 · Course textbooks
    • OWASP ASVS website
    • Other external resources as needed
    INSTRUCTIONS
    1. Review the OWASP ASVS assessment report document for familiarity.
    2. For inclusion in section 2.1 of the previously completed Security Assessment Finding
    Project paper, either draw a network diagram of the website architecture using the
    information supplied in the overview of the previous assignment or write a paragraph
    describing the infrastructure as listed in the Findings Project instructions. Include the
    major components (i.e., routers, firewalls, web servers, IDS, storage) in either case. For
    drawing a network diagram, you can use the tool of your choice – such as using the
    draw.io web site.
    3. Revise the references in section 1.1 of the template to add three (3) additional references
    for a total of six (6) references.
    4. Complete template using step 5 below in the remediation template “Web Application
    Security Report Template” associated with this assignment that you used in the Security
    Assessment Findings Project. You can optionally use your own document organization as
    long as you include all of the elements below.
    5. Complete the remaining sections of the template used in the Findings Project not
    included in the previous assessment report:
    a. Section 2 – Web Application Descriiption
    i. Insert diagram or infrastructure descriiption in section 2.1 from step 2
    ii. Briefly describe the purpose in two (2) or more sentences for each of the
    website application architecture components in section 2.2 and its
    subsections.
    b. Section 6 – Recommended Remediation Actions
    i. For each of the subsections 6.1 – 6.5, list in the table the recommended
    remediation priority (high, medium, low) and estimated remediation effort
    (high, medium, low) for that item. Do this for at least three (3) of the high
    priority items in that section. These estimates are your own CSCI 631
    Page 2 of 2 priorities based upon the web vulnerability severity and your
    best estimate to resolve.
    CSCI 631
    Page 2 of 2
    ii. For each recommendation, list a brief descriiption of the remediation based
    upon your research on the OWASP web site (or other Internet sources).
    iii. For section 6.5, provide general recommendations based upon your
    readings as to best practices in web application design.
    iv. For section 6.6, describe in one or more paragraphs how your
    recommendations are consistent with biblical principles.
    Outputs
    In this paper you are to write additional content in the report template associated with this
    assignment. There is no specific page limit- but the final deliverable for this project will likely be
    20 or more pages due to the length of the report template. It must be in current APA format as
    well. In addition, it must include at least 3 additional references for a total of 6 references
    (includes 3 from the earlier project) not counting the course textbook and the Bible. Modify
    sections previously written in the earlier project as appropriate to make the final paper cohesive
    as needed. Be sure to repaginate the table of contents and remove any instructions highlighted in
    red from the template.
    Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

  • “Enhancing Object Detection in Low-Light Conditions using Deep Learning and Adaptive Thresholding”

    I need a complete proper research paper, with everything including the code, diagrams, additional files etc. the paper should be able to be accepted by an international conference. And it should be novel and have exceptional results. No plagiarism
    Follow cvpr/ieee formats

  • Title: Investigating the Relationship between Exercise and Mental Health: A Hypothesis Testing Study Introduction: Regular exercise has been shown to have numerous physical and mental health benefits, such as reducing the risk of chronic diseases and improving mood and cognitive function

    For this assignment, you must develop a workable research hypothesis based on an ideal dataset that you specify. You will need to consider what statistical test to use to test your hypothesis, given your ideal data.
    Your hypothesis should incorporate the following:
    A brief introduction and then state your null and alternative hypotheses.
    A clear description of the ideal dataset that you will use for testing your hypothesis. Describe each element of the dataset along with its unit of measure. For example, age in months, distance in kilometers, dosage in milligrams, etc. Include how you will distinguish between two samples in your dataset?
    A discussion of the feasibility of collecting your ideal dataset. How will you collect it? Can it be collected ethically? Is it affordable?
    A statement of the statistical test you will use to test your hypothesis with a justification for its selection. Include what level of significance you will use and why.
    Add your hypothesis to the end of the paper you submitted in the previous assignment. Be sure to check for alignment between all of the research components.
    Length: 2-3 page paper
    References: Include a minimum of 2 scholarly references.

  • Title: Red Team Techniques for Performing SQL Injection Attacks: Background Research and Step-by-Step Implementation Guide

    For this research task each of you will be research different aspects of Red Team (Offensive) Cyber security. Your focus will be on various techniques for performing SQL injection attacks. To complete this research activity, you will deliver a document containing:
    Background research on your assigned topic
    Step by Step instructions on how the red team technique could be implemented in a lab environment
    This should include graphics, screenshots, and/or code samples to illustrate the process
    PLEASE make sure that the sources used are peer-reviewed. Use APA format for citations and in-text citations. The source must adhere to the intructions and MUST be closely related to the topic. Let me know if there are any questions.

  • “Creating an Advertisement: Applying Design Principles and Techniques”

    Hide Assignment Information
    Instructions
    Course Outcomes:
    CO1: Modify document set up properties CO2: Differentiate file formats properties
    CO3: Manipulate selections properties
    CO4: Prepare layered documents properties
    CO5: Modify transformations properties
    Instructions: You will create an advertisement for a favorite product you have. It can be food, drink, household item or even for a favorite place you like to visit such as a vacation resort or even just the local park. In this advertisement, you will apply your skills covered. You only need to apply one technique, layer, tool option, etc.; however, you may apply more if you feel you need to in order to create the advertisement to your liking. Once this is completed, you will complete a two-page paper (minimum of 500-750 words, not including Title Page or Reference Page): 12 font Times New Roman, double spaced paper in APA Style format, using at least one reference (all formatting aspects to be in APA including references) to describe the following:
    1. Purpose of the advertisement. You must identify a valid purpose as if this advertisement is will be posted for the public.
    2. Describe how you organized or customized workspace used and any challenges or purpose identified.
    3. Describe the design principles, elements and graphics applied and why it was selected.
    4. Describe the tools and/or layer applied and why it was selected.
    5. Describe the repairing or retouching applied from and why it was selected.
    6. Describe any image adjustment you applied to the image from and why it was selected.
    7. Save your file as two different formats and describe how the two images differ.
    Submission Instructions: Submit your advertisement and write up (Word Document) in this assignment area. You may need to reduce the file size of the advertisement if the file is over 25 MB. Do this by reducing the PPI for the image. Submit your paper in Word format only. You must also submit your advertisement as a .PSD file unless otherwise directed.

  • “Planning and Research for Sustainable Mobile App Design: Choosing a Goal and Outlining Requirements” Title: Integration of Faith and Work: Applying Conscious Capitalism to a Project

    The purpose of this assignment is to begin the planning and research process for the “Benchmark – Mobile App Planning and Design” assignment coming in Topic 6.
    Background:
    Students will select and justify a sustainable development goal and also provide an outline covering concepts related to creating a requirements document for planning and designing a mobile application that will address the goal. 
    Part 1 – Choosing a Sustainable Development Goal
    One of the key principles of the Colangelo College of Business is that business is a force for good to improve society and help communities prosper. For this assignment, consider the GCU’s “Statement on the Integration of Faith and Work” and the tenets of servant leadership, conscious capitalism, and the sustainable development goals described in “SDG Tracker: Measuring Progress Towards the Sustainable Development Goals,” both located in the topic Resources. Also view the video “Social Responsibility and Conscious Capitalism,” located in the topic Resources. 
    Using an approved generative AI tool, conduct research to learn about the various initiatives listed below. Continue to narrow your options until you select one sustainable development goal from the list provided below that you would like to promote.
    In 200-250 words, summarize your selected sustainable development goal and address why this issue is important.
    1.       End poverty in all its forms everywhere.
    2.       End hunger, achieve food security and improved nutrition, and promote sustainable agriculture.
    3.       Ensure healthy lives and promote well-being for all at all ages.
    4.       Ensure inclusive and quality education for all and promote lifelong learning.
    5.       Achieve gender equality and empower all women and girls.
    6.       Ensure access to water and sanitation for all.
    7.       Ensure access to affordable, reliable, sustainable, and modern energy for all.
    8.       Promote inclusive and sustainable economic growth, employment, and decent work for all.
    9.       Build resilient infrastructure, promote sustainable industrialization, and foster innovation.
    10.   Reduce inequality within and among countries.
    11.   Make cities inclusive, safe, resilient, and sustainable.
    12.   Ensure sustainable consumption and production patterns.
    13.   Take urgent action to combat climate change and its effects.
    14.   Conserve and sustainably use the oceans, seas, and marine resources.
    15.   Sustainably manage forests, combat desertification, halt and reverse land degradation, and halt biodiversity loss.
    16.   Promote just, peaceful, and inclusive societies.
    17.   Revitalize the global partnership for sustainable development.
    Part 2 – Mobile App Requirements Outline
    Review “How to Build a Mobile App Requirements Document” and “How to Write a Mobile App Requirements Document (+ Free Template Download),” both located in the Topic 4 Resources, about the process of designing a mobile app. Using the attached “Sustainable Development Goal and Mobile App Requirements Outline Template” for guidance, create a 2-3 page outline that explains each of the following concepts. Use additional research sources as needed.
    1.     Business requirements, including mobile app objectives and product vision statement.
    2.     Target audience and user journey.
    3.     List of features.
    4.     Monetization model.
    5.     Product and technical specification.
    6.     Platforms the app is being developed for.
    7.     Maintenance and upgrade requirements.
    8.     Dependencies, assumptions, constraints, and submission.
    9.     Explanation of how the mobile app can be used to drive business results and create a competitive advantage for the organization. Include a discussion of how and why this business app is a better solution than a competitor’s app or website by comparing your app to theirs (for example, “Uber” or “Lyft” if designing a ride-share app).
    10.   How the tenets of servant leadership can be applied to the project. Review in detail the “Statement on the Integration of Faith and Work,” located in the Topic 4 Resources. Discuss and apply at least two of the “WE BELIEVE” statements in that resource that applies to your app.
    11.   How conscious capitalism can be applied to the project. Review “Conscious Capitalism at GCU,” located in the Topic 6 Resources. Discuss the importance of business being a force for good to improve society and help communities prosper.
    Part 3 – References Page
    Provide an APA list of references used for your research used to complete Part 1 and Part 2. 
    General Requirements
    You may use an AI tool to complete this assignment according to guidance from your instructor. Access the AI Resource Center, located in the Student Success Center, via Classroom Policies in the digital classroom for information on acceptable use and citation of AI-generated content. 
    While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
    This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

  • “Assessment of an Electronic Health Record System: Functionality, Data Storage, Quality Aspects, and Interoperability”

    In the 3 page report
    1. Students will identify the chosen electronic health record and assess functionalities and discuss topics such as user-friendliness, imaging studies, clinical documentation, alert system (for drug-drug, food allergies, drug allergies), electronic prescribing, and patient health history documentation and retrieval. 
    2. Student will also Identify where the data is stored, what quality aspects are being concerned with the health service provided and how interoperable the chosen system is, with examples, and are there any specification for interoperability.
    3. The report needs to be in font 11, 1” overall margin, double spacing and follow APA reference style. 

  • Title: “Leveraging AI Technologies for Business Success: A Proposal for a Local Finance Company”

    Hello, you have already provided me with an outline as in attached file, here is the tutors ccomment:
    Outline looks good. You may want to discuss data requirements and options for each of the application area you’ve identified.  Also the approaches to developing those applications whether supervised or unsupervised –  challenges including a brief discussion of ethical issues and implications of the proposed solutions as well. 
    ill copy below the requirements once again
    This assessment has a word limit of 1,500 words 
    A local start-up finance company is vaguely aware of AI and the potential benefits, as well as the harms that these technologies can cause to society. This has caused the Senior Management of the company to have some reservations about AI. As an Artificial Intelligence consultant, you are to present a report to persuade the management of the company to accept your idea to employ AI technologies to improve business processes for competitiveness. 
    Your report should identify three key areas to which the company could apply AI technologies to facilitate its operations and increase their return on investment. The report should also consider data needed, as well as the sort of approach that will be required to develop an AI system. 
    Your report to senior management should provide the following information. Note that the associated grading criteria are highlighted in the requirements below, 
    Details of the company and industry focus.
    Details of the three key areas where AI technologies will aid operations and increase returns.
    Details of the potential problems that can be encountered in employing AI technologies in these areas (Knowledge and Understanding weighted at 30%).
    Information on the data required for the AI deployments you are recommending as well as the approaches that will be required for developing the AI system. You would need to discuss the strengths and weaknesses of any solution, with references to examples in which the technology has been employed (critically weighted at 30%).
    The rest of the grading criteria for this assessment is as follows:
    Use of relevant sources (weighted at 20%).
    Structure and Presentation (weighted at 10%).
    Academic Integrity (weighted at 10%).

  • Exploring S3 for Cloud-Based Data Storage and Management

    Explore S3 for Data Storage
    Assignment Learning Outcomes:
    Hands-on experience with Amazon S3 for cloud-based data storage.
    Understanding of S3 bucket creation, file management, and organizational best practices.
    Knowledge of S3 security mechanisms, including bucket policies and ACLs.
    Familiarity with advanced S3 features like lifecycle policies and transfer acceleration.
    Assignment Overview and Objectives:
    This assignment gives you practical experience with cloud storage, emphasizing data organization, security, and lifecycle management, which are key components in cloud infrastructure management.
    You will understand and utilize Amazon Simple Storage Service (S3), a scalable cloud storage solution. Additionally, you will learn to create and manage S3 buckets, and implement security measures for data storage.
    Tasks:
    Create and Configure S3 Buckets:
    Navigate to the S3 service in the AWS Management Console.
    Create a new S3 bucket, ensuring that the bucket name is unique. Understand the importance of bucket naming conventions.
    Explore bucket configuration options, such as versioning, logging, and region selection.
    Upload and Organize Files:
    Upload various types of files to your S3 bucket (e.g., text files, images, videos). Pay attention to the size and format of the files.
    Organize your files using folders within the bucket. Understand how S3 manages files and directories.
    Implement Security Measures:
    Explore and set up bucket policies to manage access to your files. For example, create a policy that allows public read access to only certain files.
    Set up Access Control Lists (ACLs) for finer-grained permissions on individual files or folders.
    Explore S3 Features:
    Implement S3 features like lifecycle policies to manage the lifecycle of your stored objects automatically.
    Use S3 Transfer Acceleration for faster file uploads and downloads if needed.
    Data Retrieval and Reporting:
    Practice retrieving files from your bucket. Experiment with S3’s versioning feature by updating an existing file and then retrieving a previous version.
    Generate a report on your bucket’s usage using AWS CloudWatch or S3 analytics tools.
    Documentation:
    Document the process of creating the bucket, uploading files, setting up policies, and utilizing various S3 features. Include screenshots to illustrate these steps.
    Reflect on the security aspects of S3, particularly the importance of bucket policies and ACLs.
    Deliverables:
    A comprehensive report with screenshots detailing the creation and configuration of the S3 bucket, file uploads, security settings, and feature utilization.
    Reflections on the implications of bucket policies and ACLs for data security in the cloud.
    Evidence of file retrieval and versioning exercises.