Category: Information Systems

assigmnent

Week 1 Assignment

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.

Complete your answers on a WORD Document,

2.What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable.

https://www.lifewire.com/learn-how-antivirus-4102748

Discussion

Topic: Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan. 

DQ requirement: Note that the requirement is to post your initial response no later than Friday and you must post one additional post during the week (end of Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

Annotated Bibliography – Depth (Advancements in Artificial Intelligence)

 Dissertation Topic: Advancements in Artificial Intelligence 

Your paper must be in correct APA format, use correct grammar, and will need to include at least seven (15) resources, ALL of which must:  

1) Be current. Published within the last few years.  

2) Be peer-reviewed.  

3) Relate directly to an in depth context of a topic related to your dissertation topic.  

Your submission should include an APA title page, an abstract of your dissertation, and each of your resources with annotations. Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. 

Need for large prime numbers in the cybersecurity field.

 

Large Prime Numbers and Cybersecurity

Write a  2 page paper explaining the need for large prime numbers in the cybersecurity field.

  • Use APA format
  • be sure to cite your sources
  • if you rephrase what you find on line be sure to cite the source

CIS 524 Assignment

Assignment 1: Accessibility

Building a user interface that meets the needs of a diverse population can be incredibly difficult. Research the best practices for developing a universally usable interface, as well as some of the federal legislation that applies (i.e., section 508). 

 

Write a four to five (4-5) page paper in which you:

1. Assess at least five (5) best practices for developing a universally usable interface.

2. Evaluate how section 508 affects developing user interfaces and assess this compliancy standards impact on users.

3. Give three (3) examples of available tools for verifying that your interfaces meet universal design guidelines and the advantages and disadvantages of each.

4. Examine the practicality of building multiple interface options for diverse populations, rather than building one (1) interface that meets the needs of the majority of end users.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

1. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

2. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

1. Explain the guidelines, principles, and theories in an HCI setting.

2. Describe the usability properties of interactive systems.

3. Use technology and information resources to research issues in human-computer interaction.

4. Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.

CIS 518 Discussion 1 & 2

Discussion 1

“Functional and Nonfunctional Requirements” Please respond to the following:

Discuss some examples of functional versus nonfunctional requirements. What would exemplify these requirements in a software development project for an online college student registration system?

Describe a requirement-specification technique that would be appropriate for an online college student registration system with an enrollment of 10,000 students. 

Provide a justification as to why you would use your chosen technique over other requirement-specification techniques that are available.

Discussion 2

“Testing Nonfunctional Requirements” Please respond to the following:

Among the many nonfunctional requirements that can be included in a specification are those related to safety and reliability. 

In your own words, discuss how an organization can ensure that these requirements are testable.

Identify some examples of testing a safety requirement and a reliability requirement in the context of a software system that controls the electrical components of a roller coaster at an amusement park.

CIS 515 Discussion

The development of a database requires thorough methodology that ensures quality within the solution. Imagine you have been contracted to develop a finance database that will help an organization track monthly expenditures by departments. Using the DBLC, discuss the various activities that you would have to achieve each phase. Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.

In order to mitigate risks associated with a database, it is essential to consider common sources of database failures. Describe at least two possible database failures that may occur once a database is placed into operation. Suggest actions that may be performed in order to avoid or mitigate these possible failures.

CIS 505 Discussion

Please respond to the following:

Explore the various data communication technologies youve learned about this week. 

What are some things that stood out for you? 

What factors would you advise a company to consider when deciding on the way it connects to the Internet? 

How would you advice the CIO of a small, medium, or large company? 

Choose one and discuss the pros and cons of a couple of your selections. 

BUS 517 Discussion

1. You have been hired to lead a complex, two-year project (the project of your choice). As the Project Manager, you know it is important get the project off to a good start. Using the tools provided in the required readings (See attached), provide a quick summary of your project, including the scope and at least three goals and objectives of your project.

Big Data and Data Science Analytics

Big Data is data whose scale, distribution, diversity, and timeliness require the use of new technical architectures and analytics to enable insights that unlock new sources of business value.

Initial Post:

(1) Create a new thread and Name a few companies that dominate their sector through data science and data analytics. Mention on what basis are these companies effective in terms of data analytics.

(2) Chapter 1 discussed driving data deluge. Explain by giving example the concept of data deluge using four sources such as mobile sensors, social media, video surveillance, video rendering, smart grids, geophysical exploration, medical imaging, and gene sequencing?

(3) Chapter 2 described the data analytics lifecycle which is an approach to managing and executing an analytical project. What are the benefits of doing a pilot program before a full-scale rollout of a new analytical methodology? Discuss this in the context of the mini-case study of your selected organization.

Peer Response:

Select at least two (2) other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

Note: All original posts and comments must be substantive. (original post deliverable length is about 250 – 300 words). All sources should be cited according to APA guidelines.