Category: Computer science

  • “Applying Fundamental Security Design Principles to a Real-World Scenario: A Case Study Analysis” CYB_100_2-2_Neo_Anderson.docx

    Template and pdf attached for assignment
    Overview
    In this case study assignment, we will continue to investigate the
    Fundamental Security Design Principles at work in a real-world scenario.
    Through the lens of data protection, we will analyze the following
    principles:
    Least Privilege
    Layering (Defense in Depth)
    Fail-Safe Defaults / Fail Secure
    Modularity
    Usability
    Note: You will be engaging with this scenario again in the Module Three discussion.
    Case Study Scenario
    You are a cybersecurity analyst working at a prominent regional
    hospital. On Monday morning, the organization’s technology help desk
    received a call from Dr. John Beard, a long-time resident physician. Dr.
    Beard called them to report that his company laptop was stolen from his
    car after he stopped to work out at a local gym on his way home from
    the office.
    A representative from the help desk informed you of the theft and
    also mentioned that Dr. Beard stated that his laptop case contained a
    USB thumb drive that he purchased to “back up” important patient files
    he saved onto his laptop. Dr. Beard also revealed that his daily planner
    “might have” been in the bag and that the planner had his hospital
    computer user name and password written on the back cover. Prior to
    ending the call, Dr. Beard told the representative that he would call
    her back if his daily planner turned up.
    As your conversation with the help desk representative wound down,
    she commented that Dr. Beard has many different computer “issues” that
    keep her team busy. She recalled talking to Dr. Beard about the
    hospital’s policy against accessing patient files remotely and his
    annoyance with her inability to help him “get work done” while away from
    the hospital. And just a week ago, a junior member of her team
    completed a service ticket to reconfigure Dr. Beard’s laptop to grant
    him administrative rights. The service request stuck out because it did
    not have a “reason” indicated (a company policy requirement) but was
    still approved by James Davis, the hospital’s senior system
    administrator and close personal friend of Dr. Beard.
    Prompt
    After reading the scenario above, complete the Fundamental Security
    Design Principles mapping table in the Case Study Template and answer
    the short response questions. You’ll notice that the listed Fundamental
    Security Design Principles differ from those presented in previous
    activities. In the cybersecurity trade, there are many different design
    principles and frameworks. Successful practitioners learn to work with
    many different (but conceptually similar) principles to achieve their
    security goals.
    Specifically, you must address the critical elements listed below:
    Fundamental Security Design Principles Mapping: Fill in the table in
    the Module Two Case Study Template by completing the following steps
    for each control recommendation:
    Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X.
    Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation.
    Explain your choices in one to two sentences, providing a selection-specific justification to support your decision.
    Short Response Questions:
    How might you work with someone like Dr. Beard to cultivate a security mind-set
    that is more in line with the organization’s ethical norms? Hint:
    Consider his attitude, his past behaviors, and his opinion about
    organizational policies.
    How would you help the hospital better secure its
    patient files? Make sure to incorporate at least one data state
    (data-at-rest, data-in-use, or data-in-motion) and one of the control
    recommendations from your completed table in your response.
    What to Submit
    Submit your completed Fundamental Security Design Principles map and
    short response answers in the Module Two Case Study Template. Your
    submission should be 1–2 pages in length (plus a cover page and
    references, if used) and written in APA format. Use double spacing,
    12-point Times New Roman font, and one-inch margins. Use a filename that
    includes the course code, the assignment number, and your name—for
    example, CYB_100_1- 4_Neo_Anderson.docx.
    Module Two Case Study Activity Rubric
    Criteria Proficient (100%) Needs Improvement (65%) Not Evident (0%) Value
    Mapping: Fundamental Security Design Principle Specifies which Fundamental Security Design Principle applies to at least 8 of the control recommendations Specifies which Fundamental Security Design Principle applies to fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 20
    Mapping: Security Objective Indicates which security objective (CIA) best applies to 8 or more control recommendations Indicates which security objective (CIA) best applies to fewer than 8 control recommendations Does not address critical element, or response is irrelevant 20
    Mapping: Explain Explains choices with relevant justifications for at least 8 of the control recommendations Explains choices with relevant justifications for fewer than 8 of the control recommendations Does not address critical element, or response is irrelevant 25
    Short Response: Cultivating Mindset Explains how you might work with
    someone like Dr. Beard to cultivate a security mindset that is more in
    line with the organization’s ethical norms Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10
    Short Response: Better Secure Explains how you would help the
    hospital better secure its patient files incorporating at least one data
    state (data-at-rest, data-in-use, or data-in-motion) and one of the
    control recommendations from your table Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 20
    Articulation of Response Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors
    related to citations, grammar, spelling, or organization that negatively
    impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 5
    Total: 100%

  • “Enhancing Presentations with Effective Powerpoint Editing”

    This is a Powerpoint edit.
    Instruction will be attachted please read carefully.
    Follow each task correctly.
    2 supporting files will be added

  • “Grading and Providing Feedback on a Student Assignment: Evaluating a Paper on Local Area Networks”

    Teaching technology provides instructors the opportunity to grade and assess many hands-on projects with a specific predicted outcome. However, along with the hands-on assignments, we are also tasked with grading writing assignments. A student will not automatically know what we mean when we assign a low grade without meaningful information to accompany the grade. In this assignment, you will practice evaluating student work and offering constructive feedback to learners.
    Instructions
    You will use the Learner Evaluation Assignment Grading Rubric to grade this Completed Assignment written by a student in an undergraduate program. The student wrote the Completed Assignment based on the Student Assignment Description. Submit the Learner Evaluation Assignment Grading Rubric, which allows a maximum of 9 points. In addition, provide the student with qualitative feedback about areas where the student can improve.
    Your assignment will be graded according to the following criteria:
    Evaluate the format and style of a student assignment.
    Evaluate grammar within a student assignment.
    Evaluate content and focus within a student assignment.
    Provide qualitative feedback on a student assignment that helps the student understand areas needing improvement.
    Student Assignment Description
    These are the directions that were provided for the student paper that you are going to evaluate:
    Please write a 2-page scholarly paper that describes a local area network. Use 12-point font, double-space, and write the paper in third person. Include a minimum of two references with a listed author and date of publication, cited with APA style.
    Completed Assignment
    This is the paper that the student produced.
    How would I describe a local area network? Wow, that is a tough question to answer. The network usually has locations in various cities and is connected to a mane location in a larger city.
    Telephone line are used to connect the networke from one town to another town across the country. A switch and a hub may be used in the different towns to pass data to the clinets in the towns(Cisco, 2007). If the netork goes down in one town it may go down in another town since all of the equipment is connected by the telephone lines. Thes lines are called circuits, but I prefer to call them telephone lines.
    I have seen this happen in my job where I am a nerwok administrator for a company that I will not name at this time. If you go to the website of http://www.cisco.com you will find more information about a local area network that you can read in your spare time. You can also find drawings of netwoks that are popular with some companies. I did not use the drawings for this paper since it was only two pages.
    In conclusion, this is a tough question to answer, so I guess I could say the that it is best to go to the Cisco website to look at the best designs.
    Do not rewrite the student assignment. Your task is to evaluate this assignment.
    Please use the following rubric as a basis for grading the above assignment:
    Learner Evaluation Assignment Grading Rubric
    Does Not Meet Objective
    (0-1 point) Meets Most Objectives
    (2 points) Meets Most Objectives
    (2 points)
    Format and style (includes APA usage, third person) Misuses APA, does not use font, spacing or style listed in the assignment. Generally meets the objectives, with minor problems. Meets all of the format, style and APA guidelines listed in the assignment.
    Grammar (Spelling, punctuation, word usage) Misspells words, uses incorrect punctuation, employs a poor choice of words. Minor issues with spelling, punctuation, and word choice. No errors in spelling, punctuation, and word choice.
    Content focus (on topic) The focus of the paper drifts from the topic and does a poor job of topic identification. The focus of the paper stays within the scope of the assignment, but does little to elaborate on the issue. The focus is on the scope of the assignment and elaborates on the topic to add value to the paper.

  • “Voiceover Presentation Assistance for Dissertation Defense”

    I need a female help me to present my dissertation, record it like a voiceover (no visual needed) in 10 mins

  • My Favorite Hobby: Painting Slide 1: Title Page – Title: My Favorite Hobby: Painting – Subtitle: By [Your Name] Slide 2: Introduction to Painting – Image of a painting – Brief description of painting

    For this assignment, you will create a 5-slide PowerPoint presentation about your favorite hobby or pastime. You can choose one hobby to describe in detail or describe a different hobby on each slide. Each slide should include written or bulleted content describing the hobby, why you enjoy it, etc. Proper grammar is required. Please note that all content must be written in your own words. Plagiarized information will not be accepted.  All images, tables, and text should enhance the topic. 
    In your presentation, you must include the following elements at least once:
    A title page (with the topic of the presentation and your name as the subtitle)
    An image (from your computer, a stock image, or an online image. When using images from online, be sure to include the citation.) 
    A shape (inserted from the ‘shape’ option in the ‘illustrations’ group.)
    A table (Select the size from the ‘tables’ group and include text that compliments your topic)
    A Speaker Note (A note below a slide in the note viewer)
    The following must be applied to the whole document:
    A Theme of your choice (Selected when you initially created the presentation) 
    Transitions (Visual effects between each slide- 5 total)
    Animations (Visual effects added to an object on each slide- 5 total)
    A footer- using the Header & Footer feature (with your name on each slide- 5 total)
    Slide numbers- using the Header & Footer feature (5 total)

  • Designing a System for an Online Bookstore Title: “Building an Efficient System for an Online Bookstore: Design and Implementation”

    find the attached PDF for more details. and those are the design tools that you can use :
    Online tool to draw Context Diagram and DFD
    https://online.visual-paradigm.com/drive/#diagraml…
    Tool to design input and output form
    https://www.jotform.com/

  • Title: The Risks and Responsibilities of Relying on AI for Academic Writing

    Answer these questions (in about 350 words):I
    Describe the perils and ethics of relying on AI to answer and write your paper for you.
    What are the legal and ethical issues associated with AI

  • “Computer Skills Quiz: Word, Excel, Access, and PowerPoint”

    Hello, this is a computer skilled quizlet. Word
    Excel
    Access
    Powerpoint May all be enclunded.
    Please read each question carefully before submitting. Log my be provided for skills quiz.

  • “Creating a Data Flow Diagram for Course Registration and Payment Process” “Designing a Data Flow Diagram for a Business System”

    Overview
    A data flow diagram (DFD) shows how information flows within an
    information system. A DFD is a representation of the data flow and does
    not imply the activity order. A DFD is a model of a real-world business
    system represented through a hierarchy of abstracts through leveling.
    Lower levels of a DFD reflect more detail, and higher levels of a DFD
    reflect less detail. A logical system diagram describes the business
    events that take place and the data required for each business event,
    focusing on what information is flowing and what information is
    transmitted. A DFD will not go into technical (hardware and software)
    aspects of the system; it will show inputs and outputs from external
    sources, showing the path of data and how it flows through the system.
    Prompt
    For this activity, you need to create a data flow diagram reflective of the following:
    Your experience registering for a course and then following the process through payment (or using financial aid).
    Access course catalog
    Review course options
    Select course to register for
    Complete registration
    Pay for course
    Your DFD must include the listed processes and at least two
    subprocesses (levels) within two of the five main processes. Your
    diagram can reflect up to three levels: zero (the context diagram), one
    (subprocess), and two (functionality). The various levels of detail are:
    Level zero: Represents the overview of the entire system you are critiquing
    Level one: Breaks down the main functions of the system into smaller subprocesses
    Level two: Further breaks down subprocesses of level one
    Use the symbols from the Gane and Sarson symbol set needed to illustrate data flow within your diagram:
    External entity = Square ⬜
    Data flow = Arrow →
    Process = Rounded square ▢
    Data stored = Rectangle ▭
    Specifically, you must address the following rubric criteria:
    Data Flow Diagram: Your diagram must be completed
    without any missing components. It needs to show how information flows
    within a system process. Remember: only DATA flows on data flows.
    Hierarchical Leveling: Whether your diagram has one
    or three levels, it needs to illustrate how each level is broken down
    into smaller business events.
    Data Flow Notation: Your diagram should include
    accurate and appropriate data flow notation. Whenever you are referring
    to a process, use a rounded square symbol. Whenever you are referring to
    data that is being stored, use a rectangle. It depends on the business
    process, but you may or may not have to use all Gane and Sarson symbols.
    Logical System Functionality: Your diagram also needs to illustrate how business events are broken down into smaller subprocesses.
    What to Submit
    Upload a .doc, .pdf, or .jpeg file of your diagram. You can use a
    tool of your choice to help you create the data flow diagram, but we
    recommend using Lucidchart, draw.io, or Microsoft Visio.
    Getting Started in Lucidchart: The Basics
    Visio 2016 Tutorial
    Microsoft Azure Dev Tools for Teaching (link to access Visio)
    Draw.io Quick Start Video Tutorial (1:35)
    Draw.io Diagram Software
    Module Two Activity Rubric
    Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
    Data Flow Diagram Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Illustrates a complete data flow diagram by showing how information flows within a system process Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include more details of the complete process Does not attempt criterion 25
    Hierarchical Leveling Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Illustrates how each hierarchical level is broken down into smaller business events Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include more breakdown of information transmitted throughout system Does not attempt criterion 20
    Data Flow Notation Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Includes accurate data flow notation (processes, data stores, external entities, and data flows) based on the selected system Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include correcting inaccurate symbols to show the part of the data flow
    (e.g., using a square to show a process instead of using a rounded
    square) Does not attempt criterion 15
    Logical System Functionality Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Designs a diagram that shows business events broken down into subprocesses Shows progress toward
    proficiency, but with errors or omissions; areas for improvement may
    include showing both the business event and the associated subprocesses Does not attempt criterion 20
    Articulation of Response Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Clearly conveys meaning with correct
    grammar, sentence structure, and spelling, demonstrating an
    understanding of audience and purpose Shows progress toward
    proficiency, but with errors in grammar, sentence structure, and
    spelling, negatively impacting readability Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas 10
    Citations and Attributions Uses citations for ideas requiring attribution, with few or no minor errors Uses citations for ideas requiring attribution, with consistent minor errors Uses citations for ideas requiring attribution, with major errors Does not use citations for ideas requiring attribution 10
    Total: 100%

  • “Exploring the Impact of Hydraulics, IoT, and Machine Learning in Modern Industries”

    Good evening students. The Final Paper is Due May 18th 2024 and no late submissions will be accepted. Final paper: Write a 1500-word research paper. The research paper has to be written individually. The presentation should be between 15-20 minutes long. Let me know what you will be writing about by April 20 2024. Examples of project topics: How does hydraulics impact the agriculture industry, What are the threats within IoT and how to secure them? or What type of algorithms are used within ML to make them think like a human? Topics covered in class:
    Pneumatics & Hydraulics
    Filters & Operational Amplifiers
    IoT: Internet of things
    Machine learning
    Sensors
    Paper should have a title page, table of content, your research and a conclusion. Your research paper should include at least 3 scholarly journals/articles/books. Presentations for your research will be on May 4th and May 11th. Research paper is due May 18th
    Let me know if you have any questions. Thank You, Prof.