+1(316)4441378

+44-141-628-6690

Archive for the ‘Computer science’ Category

Lockdown

CISO Deliverable Overview
This document contains full details for each final assignment to be assessed, as well as guidelines for video submissions.
As a synthesis of prior steps and interim submissions, you will be assessed on the following assignments:
1.    Cyber Operations and Risk Management Briefing
2.    Intelligence Debriefing
3.    Lessons Learned Video Presentation
4.    Digital Forensic Investigation Report

Cyber Attack Scenario Memorandum

Scenario:
A recent cyber attack occurred where a botnet type attack targeted a major US defense firm. No physical damage occurred to the firms network, but significant technological secrets about a new surveillance and targeting system from the firm, Defense Applications International (DAI), appear to have been compromised. Incidental, but nonetheless as a result of the attack, the virus also infected a software program that DAI was testing at electrical plant in Pennsylvania. The plant had to be shut down for 12 hours while repairs were made. The NSA believes it has credible evidence that the attack had a direct connection to the elite cyber unit Department 2112, of the country of Redistan, an adversary of the United States, although the attack itself appears to include private citizens of Redistan. The attack, however, was routed through several third countries including Bluelandia, an ally of the United States.

You are a new cyber desk officer working for the National Sec

Any topic (writer’s choice)

Write a pseudocode solution for each of these problems.
1.    Design a While loop that lets that user enter a number. The number should be multiplied by 10, and the result stored in a variable named product.  The loop should iterate as long as product contains a value less than 100.

2.    Design a Do-While loop that asks the user to enter two numbers.  The numbers should be added and the sum displayed.  The loop should ask the user whether he or she wishes to perform the operation again.  If so, the loop should repeat; otherwise it should terminate.

3.    Design a For loop that displays the following set of numbers:  0, 10, 20, 30, 40, 50 ..... 100.

4.    Design a nested loop that displays 10 rows of # characters. There should be 15 # characters in each row.

5.    Convert this For loop to a While loop.

Declare Integer count
For count = 1 to 50<

computer information systems

Describe the fundamental components of an information system.
Explain the importance of ethical behavior and what are the guiding principles .
Discuss the need to keep information systems secure and the methods by which this is done.


Requirements:

Your essay should follow MLA format under 'Style' in the References tab
Include an automatic 'Cover Page'
have an introduction
have a paragraph explaining each of the topics above
conclusion
use Word's 'Manage Sources' feature in the References tab.
have at least 5 sources (your eText can be one of the sources)
use Word's automatic Works Cited feature in the 'Bibliography' button of the References tab
use Word's Insert Citation feature in the References tab to cite sources throughout your paper
Your essay should be at least 750 words.
edit your essay using MLA format

Concepts and Applications of Information Technology

This second assignment will have you building on your understanding of and ability to use the basic elements of Excel that you have been exploring in the readings and tutorials in Weeks 1-5. We start with a same data file used in Project #1 but incorporate additional functions of Excel in the analysis of the data.

From the Assignments tab (not the link that appears here in the title), click on the assignment name (Excel Project #2) and download the two attached files.The first file contains the instructions for completing the project. The second file contains that data that you must use to complete the project.

Georgia Tech App – Georgia Tech is committed to creating solutions to some of the worlds most pressing challenges. Tell us how you have improved or hope to improve the human condition in your community.

The topic is application directions. Want you to talk about how I want you to use cybersecurity as my way to change the world. Hit on keeping people safe for attacks, and maybe bring up keeping the election safe. If you need any more information just let me know.

Concepts and Applications of Information Technology


IFSM 201 6979 Concepts and Applications of Information Technology (2208)

This second assignment will have you building on your understanding of and ability to use the basic elements of Excel that you have been exploring in the readings and tutorials in Weeks 1-5. We start with a same data file used in Project #1 but incorporate additional functions of Excel in the analysis of the data.

From the Assignments tab (not the link that appears here in the title), click on the assignment name (Excel Project #2) and download the two attached files.The first file contains the instructions for completing the project. The second file contains that data that you must use to complete the project.

Ethical Hacking – Penetration Test Proposal

Project 1: Rules of Engagement
Instructions

The first deliverable of the Penetration Test Proposal is the rules of engagement (ROE) document, a formal one to two page document that outlines the objectives, scope, methodology, and overall test plan agreed upon by the penetration testers and client system administrators. Penetration testing can cause complications such as network traffic congestion, system downtime, and may cause the same vulnerabilities and compromises it was designed to prevent. Due to the potential consequences of penetration testing, it is vital to agree upon a comprehensive ROE before testing.

For your ROE deliverable, consider the following:
    How will you identify Haverbrook Investment Group's [attached] network characteristics, expectations, constraints, critical systems, and other relevant information?
    What are your preliminary engagement activities with regard to scheduling, scope, and key stakeholders?

COGNITIVE SYSTEMS

Cognitive Systems

Present the basic structure of a Cognitive System and describe its basic elements (parts and mechanism).

If you were to create such a system describe the basic steps to follow.

For making your case easier it is suggested to choose a real system from the medical world as a case study.

Note: Suggested length with figures up to four pages for your answer.

IT Password Requirement Essay

Your boss wants to implement new password requirements. She'd like you to make a recommendation on what the new requirements will be. She knows this is new for you, so she expects you to do some research and present your recommendations, fully cited with the resources you used to write those recommendations. Your paper should be between 600 and 800 words, and should describe the current issues associated with password security (including examples), what is considered "best practice" and why, and provide a conclusion of what the policy should be. Be sure to discuss length, expiration, as well as any other issues you might consider important. Each essay in our class should have three sections: Intro: Short, and to the point. Basically just states what the paper is about Body: 90% of the paper's length. Facts. Just facts. No opinions. This is where you discuss the issue in the context of research. Most, if not all of your citations end up here. Conclusion/recommendation: This is where you