Computer Science
[ORDER SOLUTION] Security-Related Rules
You are the webmaster of a college website. You share a server with other school departments such as accounting and HR. Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
[ORDER SOLUTION] AES Encryption and RSA
Is AES encryption better than RSA? Why or why not? Support your answer. Why and when did public key encryption become popular? Support your answer. Under what conditions are a Man-in-the-Middle attack effective and why? Support your answer. Why are Pseudo-Random Number Generators (PRNG) important and how are they used in cryptography?
[ORDER SOLUTION] Understanding the Role of an CDO
In 80 words or more review and discuss the following article on understanding the role of an CDO https://www.gartner.com/smarterwithgartner/understanding-the-chief-data-officer-role/
[ORDER SOLUTION] Industrial Episonage
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after Davids departure, it is discovered that a good deal of the ABC Companys research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim, since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong. What steps might have been taken to detect Davids alleged industrial espionage? What steps might have been taken to prevent his perpetrating such an offence? Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
[ORDER SOLUTION] IT Leaders in Promoting Innovation
Discuss IT leaders can promote innovation. Use your own experiences as good or bad examples. Forum rules: Your answer must be substantive, which usually requires 300 words or more, Your answer must be well written and well organized, Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available. Post two replies to your classmates, Your replies should be meaningful, which means they should engage your classmate in a discussion focused on the forum questions. Usually, this requires 150 words or more.
[ORDER SOLUTION] Financial Aspects of the Technology
An external audit of the company’s financial operations has just been completed. Last week, an “early look” copy of the audit was sent to the CFO with a request for a formal written response for each of the findings. Some of the problem areas were known to the CFO’s staff and they were already working on the required responses. But, there is one set of findings that came as a complete surprise — Shadow IT — the unauthorized/unapproved use of cashless payment technologies by certain locations and offices within the company. These technologies included: Micropayments using a payment card issued by guest services to hotel guests and via unattended vending machines to visitors. These payment cards are loaded with a cash value deposited to the card’s account via a credit card charge. Guest services also credit some of these payment card accounts with “reward dollars” for guests who belong to the hotel’s affinity program. The payment cards are used at service locations that do not have a cashier station. e.g. game arcade, self-service laundry or sales kiosk, etc. The payments are processed by a third-party service provider which then uses an electronic funds transfer to pay the hotel its share of the income. Mobile Payments for services booked through the concierge desk with an authorized but independent provider (not a hotel employee). These services include private lessons with a tennis or golf pro, childcare, tours and tour guides, interpreters, etc. These payments are made by cell phone either as a mobile payment using a contactless payment system such as Apple Pay or by swiping a credit card through a magnetic stripe reader connected to the provider’s cell phone. The payment accounts which receive the guests’ payments are connected to the hotel’s merchant card accounts. The hotel pays the providers monthly via electronic deposit and issues an IRS Form 1099 to record the income. The CFO must make a presentation to the IT Governance board about these payment systems as a first step towards either getting approval for continued use or issuing a “cease and desist” directive to force the rogue offices and locations to stop using the unapproved payment systems. The presentation must include information about known or suspected compliance issues for PCI-DSS. The IT Governance board has previously asked project sponsors for information about potential privacy and security issues. Due to the size and complexity of the problem, the CFO has split the available staff into two teams. Team #1 will focus on micropayment cards. Team #2 will focus on mobile payment systems. You have been asked to join one of these two teams and assist with their research. (Note: you *must* pick one and only one of the two technologies to focus on for your discussion paper this week.) Your team leader has asked you to read the provided background information (see the Week 7 readings) and then put together a 2 page summary of the important points from your readings. You have also been asked to help identify and describe/explain 5 or more privacy and security issues that could arise in conjunction with the use of the technology being studied by your team. Remember to keep your focus on the financial aspects of the technology implementation since you are contributing to the CFO’s effort. (Financial aspects include how payments are made, what types of information are exchanged and with whom, how that information is protected, etc.)
[ORDER SOLUTION] Analyzing And Visualizing Data
Pick two (2) charts of different chart type (Categorical, Hierarchical, Relational, Temporal and Spatial) [Do not choose bar, pie and line charts) For each use a tool that can be used to create the selected chart. Use a different tool to create each chart. For each chart, write how to read the chart and what to look for. Delivery: A word file with the following information: 2 Charts 2 Screenshots of the charts in development with the tools selected. Paragraphs detailing how to read each chart and what to look for.
[ORDER SOLUTION] Project Composition and Chart Composition
Composition deals with the overall readability and meaning of the project. As noted by Kirk (2016), the topic of composition is divided into project-level and chart-level composition. Select one component of either project composition or chart composition and discuss.
[ORDER SOLUTION] The CIO of the Organization
The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning: Part A: Create 1- to 1.5-page summary including the following. The number of additional employees necessary to rollout and support an IDS desktop solution, An explanation as to how individuals work with the existing desktop support and malware teams, The job title for those who normally perform rollout and support functions for the IDS desktop solution, An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution Part B: Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following: The job titles provided in your summary and how they fit in with the existing cybersecurity team. A list of the industry certifications the new IDS rollout-and-support-function employees should have or can work toward. Include citations as necessary in APA format.
[ORDER SOLUTION] Harmed and Bankrupted Companies
Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case-study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.
Use Promo Code: FIRST15