Category: Computer science

  • “Virtual Currency Overview: Assessing Encryption Methods and Policy Issues” Virtual Currency Overview: Assessing Encryption Methods and Policy Issues Introduction Virtual currencies, also known as cryptocurrencies, have gained significant attention in recent years as a potential alternative to traditional fiat currencies

    Thank you for assisting me. Attached to this order is a example of a previous student project (Virtual Currency Applicability Report and Recommendations) and lecture notes to assist you. Please create the spreadsheet and the two page essay using APA 7.
    Instructions:
    Develop a spreadsheet that will be used to gather your research. In the first column, list Bitcoin and other virtual currency options available, if any. In column 2, list the corresponding encryption method for that specific virtual currency. In column 3, assess what characteristics or cybersecurity technologies used by that virtual currency that makes it unique. Make a fourth column in the spreadsheet for policy constraints and document the findings.
    Lastly, In the previous step, you identified the technological elements of virtualization and cloud computing, and now it’s time to fully assess the inherent policy issues and challenges of these cybersecurity technologies. Discuss core concepts and developments in cryptography and cryptanalysis for the benefit of your financial audience from a cyber perspective and the financial implications of virtual currency. Also, consider information assurance needs for the business.
    Provide a two- to three-page summary of the findings thus far and an overall assessment of virtual currencies, the encryption technology, and the subsequent policy issues that might arise.
    Submit the Virtual Currency Overview, along with the spreadsheet of the recorded findings, as an addendum.

  • “Comparing End User Experience: A Comparison of Online Retailers”

    Overview
    In this activity, you will compare the end user experience based on
    the system functionality of two retailers. An example of system
    functionality is in-stock notifications. When you are shopping on
    Target’s site, you select your item, along with size and color. You
    immediately see if the item is in stock. If it is not, the shopping cart
    page provides an option to email you when the item is back in stock. On
    another site (for example, Walmart), the shopping cart page tells you
    if the item is not in stock; however, it does not give you the
    opportunity to receive notifications when it is back in stock. In both
    scenarios, as an IT professional, you need to evaluate the system
    functionality through the lens of the end user.
    Prompt
    You are concerned with the end user experience. When you visit a
    website or use the app for a an e-retailer, what are you requirements
    for that website or app? Are you interested in how fast the pages load?
    Can you compare items? Are these features important to you, and will you
    continue to use a website that does not meet these requirements? That
    experience will trigger a return visit to the site based on the most
    expeditious purchasing experience, variety of items available, quantity
    of items available, and quickest delivery method. In this activity, you
    will locate two online retailers and compare them for ease of use as a
    consumer. YOU ARE NOT REQUIRED TO MAKE A PURCHASE. You will be searching
    inventory, examining purchasing and shipping options, and reviewing
    return policies. You will provide a description of your experience and
    compare the retailers’ purchasing processes.
    In your comparison, you will include a table that addresses the
    following processes, along with a detailed narrative explanation of
    which retailer has the best system ease of use:
    Inventory process (Are you able to locate the item you wanted? Are you able to compare it to similar items?)
    Purchasing process (Can you add the item to your cart? Are there multiple payment options available?)
    Shipping process (How quickly will items be ready to ship?)
    Return policies (How convenient is it to return an item?)
    What to Submit
    Upload a Word document including your comparison table and your brief
    (1 page) narrative explanation of which retailer has the best system
    ease of use.
    Rubric
    Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
    System Narrative Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Supports position on which retailer has best system ease of use Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include more details of system comparison Does not attempt criterion 45
    Comparison Table Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Compares all required system processes Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include comparing all of the system processes outlined in the prompt Does not attempt criterion 45
    Articulation of Response Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Clearly conveys meaning with correct
    grammar, sentence structure, and spelling, demonstrating an
    understanding of audience and purpose Shows progress toward
    proficiency, but with errors in grammar, sentence structure, and
    spelling, negatively impacting readability Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas 10
    Total: 100%

  • “Mitigating Malicious Code: Analyzing Control Families and Identifying Key Vulnerabilities” Title Slide: “Mitigating Malicious Code: Analyzing Control Families and Identifying Key Vulnerabilities” Agenda Slide: – Introduction to Malicious

    A) Your presentation should include the following:
    Title Slide
    Agenda Slide
    Introduction Slide: This should motivate to want to see your remaining slides.
    Content slides (This could be several Slides)Part 1 NIST SP800-53 Control Families
    Part 2 You make the call with the scenario we will discuss in class
    Conclusions
    References
    PART 1 NIST SP 800-53 defines 18 Control families. All controls are important but depending on your environment or situation, some are more important than others. From your experience, what are the three most important control families? Discuss. Here is a link to the special publication: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdfLinks to an external site.
    Hint: go to page 35 to find a clickable hyperlinked table.
    PART 2 You Make the Call
    If you were responsible for this room in your organization, which controls would you implement. After selecting the controls, write an implementation statement on how to implement or use these controls to mitigate a particular risk identified. (Choose 2. Two different families)
    EditEdit
    2) Discussion Forum 7: Malicious Code
    1) In Discussion Forum 7, post your response to the following discussion topic. Reply to at least two classmates’ responses and shares informative URLs by the date indicated in the Course Calendar. Your discussion question response should be at least 200 Words, with another 50 words per reply. Malicious Code, or Malware, attacks all three information security properties: Confidentiality, Integrity, and Availability. It is a threat to any Internet-connected device. What are the types of Malware being used today (Name two), and explain in your own words what they do. 2) Respond to at least two other students (at least 50 words each )!
    Respond to two (2) students/Peers (two classmates). The responses should be at least 50 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response should not be to a peer already responded to more than twice.

  • Title: Leveraging Collaboration Information Systems to Enhance Efficiency and Customer Service in Banking Operations

    Identify a skill or knowledge that you learned in this course, and explain how you can apply it to increase success in your career in a real-world scenario.
    Career is a Bank Manager
    Topics covered are Listed Below
    Hardware, Software, and Mobile Systems
    Database Processing
    The Cloud
    Processes, Organizations, and Information Systems
    Business Intelligence Systems
    Social Media Information Systems
    Information Systems Security  
    Information Systems Development
    Strategy and Information Systems 
    Collaboration Information Systems

  • Troubleshooting Computer Problems and Knowing When to Seek Professional Help Title: Troubleshooting Computer Problems: When to Seek Professional Assistance and Consider Buying a New Computer When encountering computer problems, it is important to first try to troubleshoot and resolve the

    Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance/ Why? At what point might you consider purchasing a new computer? Refer to Module 6: Security and Safety CC 3-18-3-25.
    Your initial post should comprise a minimum of 50 words supported by at least one (1) reference by Thursday mid-night, followed by a minimum of two (2) responses to classmates’ posts comprising at least 30 words supporting, challenging, clarifying, or adding to the existing information by Sunday mid-night.

  • Title: String Puzzle Game with Exception Handlers and Control Flow Mechanism Introduction: In this assignment, we will be creating a puzzle game using the string type, exception handlers, and control flow mechanism. The game will involve manipulating strings to solve puzzles

    Module 5 Assignment
    Use one of the programs you wrote in the previous assignments, adding at least one String type, exception handlers, and control flow mechanism. Make sure to display user-friendly messages and not the raw Python error ones. 
    Alternatively, you can create a puzzle game using all you learned so far PLUS the string type, making sure to add exception handlers and a control flow mechanism.
    Submission Instructions
    Assignment solution should have a structure: Title page (your name, course name, term, my name), Introduction, Body/Analysis, Conclusions, and References. The actual solution code would go into the Body/Analysis section.
    Figure/table captions should follow the APA format.
    Your submission is a Jupyter Notebook (,ipynb) with a rendered (.PDF or .HTML) file – alternatively, you can leave the .ipynb file in /students/[your_username]/Assignments/Module_X/ folder instead of submitting it. These would include all the text, code, results, plots, images, etc.
    Submit the following files:
    o    ALY2100_FirstnameLastname_ModuleX_Term_Year.ipynb
    o    ALY2100_FirstnameLastname_ModuleX_Term_Year.html or ALY2100_FirstnameLastname_ModuleX_Term_Year.pdf

  • “Troubleshooting VirtualBox and Ubuntu Installation: Challenges and Solutions”

    I am facing issues with question 3 and 4 (and consequently 5.) I attached the project questions plus the answers that I have so far. I’ve been fighting with VirtualBox to properly install Ubuntu for a couple of days but now I’m wondering if it’s even the right approach? Thank you!

  • Title: The Complexities of Jurisdiction over the Internet and its Global Implications

    Prompt:
    After reading about the origin of the internet in the textbook (screenshots are attached below), discuss how difficult it is to determine who has jurisdiction over the internet and the global implications.

  • Reflecting on Data Protection Legislation and Compliance “Module Reflection: Limited Depth of Knowledge and Inconsistent Writing Style”

    Textbook: Fundamentals of Information Systems Security
    Chapter 4, “Organization and Adhering to Compliance Laws” section
    Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections
    Chapter 9, “Compliance and Professional Ethics” section
    Chapter 15, “Compliance is the Law” section
    As you read, consider the following questions: 
    Chapter 4, “Organization and Adhering to Compliance Laws” section: 
    How
    do you mitigate risk and achieve compliance with laws, regulations, and
    requirements? What are the primary means to ensure compliance?
    Chapter 8, “A Brief History of Malicious Code Threats” and “Threats to Business Organizations” sections:
    Why are malicious actions on the rise? What are you trying to protect?
    Chapter 9, “Compliance and Professional Ethics” section: 
    How does an organization monitor for compliance? How does compliance relate to ethics?
    Chapter 15, “Compliance is the Law” section:
    What are the primary means to ensure compliance? How is compliance related to information security?
    CIA Triad and Fundamental Security Design Principles PDF opens in new window
    This
    document contains essential terms and their definitions that we will be
    revisiting throughout this course and the rest of your program.
    As you learn about data protection and legislation, it is important to reflect on what you have read and learned in this module.
    In your journal, you will reflect on general data protection.
    Specifically, you will discuss legislation, threat actors, and data
    protection compliance.
    Your journal entry should be three or more sentences per prompt and address the following questions: 
    What are some important pieces of legislation that affect how organizations conduct information technology operations?
    Why are malicious actions from threat actors on the rise?
    What are the primary means to ensure compliance?
    How does compliance relate to ethics?
    Journal Guidelines and Rubric
    Overview
    Journals are private and between you and the instructor only.
    Approach these activities as an opportunity to reflect upon and apply
    what you learn each week based on the assigned readings, discussions,
    and activities. As a successful professional, you will need good
    reflective and writing skills. Journal activities offer you the
    opportunity to develop these skills further. The journal entries in this
    course are graded separately.
    Prompt
    First, complete the assigned readings for the week. Then read the
    journal prompt and write a reflection. Your journal entry should be two
    paragraphs long and address the prompt provided in each module.
    In your response, be certain to address the following critical elements:
    Critical Thinking and Reflection: Support the claims with relevant examples of previous and logical thought processes.
    Integration and Application: Show excellent depth of knowledge of the module content and exhibit careful consideration of the topic.
    Voice: Write in a style that is appealing and
    appropriate for the intended audience and use a consistent voice that is
    evident throughout.
    What to Submit
    Submit journal assignments as Word documents with double spacing,
    12-point Times New Roman font, and one-inch margins. Responses should be
    at least two paragraphs long and address the points indicated in the
    journal prompt for each module.
    Journal Rubric
    Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
    Critical Thinking and Reflection Supports claims with relevant examples of previous and logical thought processes Supports claims with mostly relevant examples of previous and logical thought processes Supports claims with somewhat relevant examples of previous and logical thought processes Does not support claims with reflection on relevant personal examples 25
    Integration and Application Shows excellent depth of knowledge of the module content and exhibits careful consideration of the topic Shows good depth of knowledge of the module content and demonstrates that the module content has been read Shows limited depth of knowledge, indicating the module content may have been reviewed but needs to be explored further Does not address the prompt and reflects that the module content has not been read 25
    Voice  Writes in a style that is appealing and
    appropriate for the intended audience and uses a consistent voice that
    is evident throughout Writes in a style that is generally appropriate for the intended audience and makes an attempt to use a consistent voice Writes in a style that considers the audience but is not consistent in voice, and it is difficult to identify the voice Does not attempt to use a style that considers the audience and leaves no evidence of the voice 25
    Writing  Is free of errors in organization and grammar Is mostly free of errors in organization and grammar; errors are marginal and rarely interrupt the flow Contains errors in organization and grammar, but errors are limited enough so that it can be understood Contains errors in organization and grammar, making it difficult to understand 25
    Total: 100%

  • “Building a Chatbot Box for Website: Enhancing User Experience”

    every thing related to the project is in the file, the idea is to build a chatbot box for a website. 
    Everything should be written in the outline and should cover all requirements. 
    the due date is in two hours