Computer Science
Types of Cyber Threats
You will be presented with two questions to be answered in your own words. You may use any legitimate resource from the web, textbook, lecture, etc., but use your own analytical thought process to ensure evidence of understanding of the material. Your response to each question must be at least one page in length. Questions Define state and non-state actors and discuss the types of cyber threats they pose to our nation. Include in your discussion the potential impact (life, costs, governmental, etc.) of each set of actors against our nation. Outline and discuss Clarkes assessment that there are five takeaways from the genesis of Cyberattacks as he presents in chapter one of Cyber War. Why is it important to understand these takeaways and their role in fighting Cyberattacks.
Firewall Rules
Discussion (Chapter 7): Using firewall rules can hinder the performance of a network, what are some way to stop that from happening? What are some methods that you would use to improve the performance of a firewall? Can those methods be used with on-prem firewalls as well as cloud firewalls?
Systems Implementation Plan
Description of Capstone Project Use the company profile and scenario found here as the subject of your Systems Implementation Plan. This assignment is a document describing the requirements based on your own individual views. Research and analyze the stated requirements. What unstated requirements are there, and what method(s) would you use to collect a more comprehensive set of requirements? Develop a Word document that describes all of the requirements and explains how they would be met using hardware, software, networking, and security. In other words, summarize the elements of the solution that are necessary to address the requirements. Support your proposal.
Flowchart Development
For the third milestone, you will need to develop several modules that incorporate the actions throughout your game. Before you start, do the following: Incorporate any feedback from Milestone 2.Review this article for modular programming: https://opensource.com/article/19/7/get-modular-python-functionsIf needed, call or meet virtually with me to make sure you have the okay to move forward with the game (I will indicate whether a call or virtual meeting is necessary for the feedback on Milestone 2). You will create the modules needed for your action game. This will be for each chapter of your story from Milestone 2 that has been designated by you (or by me as your instructor) as a good fit for a module. Download the Milestone 3 file (located in this module) which contains an example of a module of code that you can use as a guideline. Submit your modules as Python files (one for each chapter)Professors feedback from the milestone 2 – Adventure Game Outline: Flowchart Development Good work on your flowcharts. I noticed that in every chapter you ask for the user name, can this be done in the first chapter and carry that variable (name) across all chapters? Also, start thinking about how you would code each action in your flowchart in Python code.
Preventive Controls
What is the use of encryption to protect data at rest, in motion, and in use? Write an essay of at least five hundred words Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay format not in outline, bulleted, numbered, or another list format. Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title. Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
Cloud Service Models
1. There are three common Cloud Service Models. Define one and identify at least three cons and three pros for that particular Cloud Service Model. 1 page2. Identify and define at least three Cloud Deployment Models. What are their characteristics? What are the pros and cons? Two-page minimum (cover sheet does not count) Double Spaced APA Format3. Describe how a cloud-based database management system differs from an on-site database. – 1 page4. Here is a questionnaire for you to take on your “Influencing Style”. Provide feedback on how it relates to you and your style. How might you use your style with organization management? How does your style prepare you for operations strategy? 1 page
Table of Visualization
A picture is worth a thousand words may be a lovely cliché, but its exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link: http://www.visual-literacy.org/periodic_table/periodic_table.html Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantages do your choices have over the others.
Operating Systems Design and Evaluation
Introduction to operating systems design and evaluation. Computer software systems performance, robustness, and functionality. Kernel structure, bootstrapping, input/output (I/O) devices and interrupts. Processes and threads; address spaces, memory management, and virtual memory. Scheduling, synchronization. File systems: layout, performance, robustness. Distributed systems: networking, remote procedure call (RPC), asynchronous RPC, distributed file systems, transactions. Protection and security. Exercises involving applications using, and internals of, real-world operating systems.
Systems Assessment
What does an assessor need to understand before she or he can perform an assessment? How active is each threat agent? How might a successful attack serve a particular threat agents goals? This assignment should be in APA format and have to include at least two references.
Related Publications
Find related publications, how are they related to the thesis? The topic is related to Human-computer science, usable privacy, social media, user interface design The list should include at least ten related scientific publications (and also the list of related non-scientific publications if appropriate for a thesis topic). These publications should be most relevant to the thesis. Each publication in the list should be presented with the title, the authors, and a short summary (2-3 sentences). It should also be explained how the publication is relevant for the thesis (2-3 sentences to point out what was learned through reading for a particular thesis, e.g. which methods a person would like to take).
Use Promo Code: FIRST15