For this assignment, given what we have discussed about waterfall and agile dev

For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

  IT543-4: Design an implementation of cryptographic methods for an organizatio

 
IT543-4: Design an implementation of cryptographic methods for an organization.
Assignment Instructions:
This assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:
The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and design the school’s yearbook, including the ability to import additional photographs and lay out each yearbook page. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each yearbook page.
Note: Their previous product used CD ROMSs, and there was no Internet access for development, viewing, or purchase.
The company uses this data set to produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record-keeping or for direct sale to students to accompany their hard copies.
The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.
The Internet-based product should include the following additional features:
Allow all yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
Allow the desktop product to be used to edit the yearbook and any new Internet version of the product.
Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
Allow people to purchase copies of the completed yearbook using a credit card.
Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also, make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.
Security concerns include:
Licensing of the application client on school PCs.
Security for the output designs on the cloud and on CDs.
Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
Online purchasing of electronic copies of yearbooks.
Communications security.
You must do the following:
Identify and list RISKS to be addressed.
Design a solution or a solution set.
You do not have to address all of the items below, but here are some possible topics to consider:

Email
Remote access (VPN)
Whole disk encryption
Encrypted flash sticks
E-commerce transactions
Database encryption
Use of hashes (e.g., for checksums, passwords, perhaps even credit card information)
Cloud access security
Digital certificates (at various levels)
DRM for electronic copies of yearbooks
Acceptable use policies regarding the use of company computers, personal computers, and perhaps even use of personal encryption

Identify potential vulnerabilities with your proposed solution. (Note: Not all vulnerabilities can be solved with encryption.)
Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.
Your design should take into consideration the data storage, data processing, and data communication needs of the system.
It is anticipated that the length of the paper will be 10–12 pages.

  Attached two files , one for the data you will work on in excel file and file

 
Attached two files , one for the data you will work on in excel file and file discription for the data in PDF
As a data scientist please study the data and answer the following questions 
1- what is the primerly diagnosis ?
2- What potential risk factors were there?
3- Make a statistical description of the data ( primely diagnosis, risk factors, gender, age ,…etc.)
4- is there a statistal relationship between the primely diagnosis and its risk factors?
please show your work in excel file and pdf file Including  tables and graphs with explanation

  Your job is to: 1) implement the one algorithm in these files that is not alr

 
Your job is to:
1) implement the one algorithm in these files that is not already implemented (merge sort),
2) Tell me in a comment in your code three things:
what the runtime of this algorithm is
whether it is “destructive”
whether it is “in-place”
3) submit timing data along with your code to show that your code actually has the runtime you claim it does.
Your submission will be:
– A zipped copy of all the files I’m providing, with the unimplemented algorithm implemented and the comments attached to taht algorithm indicating its properties (see above).
– And, in your zip file, you should include some kind of graph showing the growth of the runtime of your implementation of the algorithm, as determined by running it under different conditions and timing it, along with the raw timing data you used to make the graph.You can make the graph however you like (hand-drawn is fine).

A privacy impact assessment (PIA) is a process to help you identify and minimiz

A privacy impact assessment (PIA) is a process to help you identify and minimize data privacy risk. Specifically, this type of assessment helps identify the risks to an individual when an organization collects personal information for a business purpose. There are many reasons an organization might collect personal data. For example, all businesses must collect personal information from employees to process payroll taxes. Many businesses collect personal information from customers to ship goods and services or conduct research to create new products.An organization should complete a PIA any time it intends to collect a new data element from an individual, such as name, date of birth, age, race, sex, address, biometric identifier, or any other element of personal data. Completing a PIA helps an organization think deeply about privacy issues and risks related to collecting specific types of data. To complete a PIA, an organization should:
Clearly specify the data that it wishes to collect from a person.
Clearly document why it must collect that data.
Describe how the data will be collected, used, and stored.
Document the risks of collecting, using, and storing, the data.
Describe the measures that the organization will take to reduce the risks of collecting, using, and storing the data.
Organizational leaders will use the information provided in a PIA to determine whether the need for collecting the data outweighs the risks to the organization that are posed by collecting it. This is a business decision. Stakeholders such as legal counsel, human resources professionals, and information security and privacy professionals will often help prepare and review the PIA. An organization usually does not need to share its PIA with other entities.In this lab, you will learn about and prepare a privacy impact assessment for a fictitious organization.Lab OverviewThis lab has three parts, which should be completed in the order specified.
In the first part of the lab, you will document the personal information that a company seeks to collect.
In the second part of the lab, you will document the risks of data collection.
In the third part of the lab, you will explain why (or why not) the company should collect the personal information specified in Part 1.
Finally, if assigned by your instructor, you will complete a challenge exercise that allows you to use the skills you learned in the lab to conduct independent, unguided work – similar to what you will encounter in a real-world situation.Learning ObjectivesUpon completing this lab, you will be able to:
Identify personal data elements.
Describe risks to the collection of personal data.
Justify data collection activities.

  Prepare the peer’s presentation topic by finding and reviewing the Internet

 
Prepare the peer’s presentation topic by finding and reviewing the Internet resources and documents about the topic that you are assigned to review.
Prepare for your feedback and questions that you will raise throughout the presentation.
 provide feedback to your peer. 
 Ask your questions, critique the presentation, and make your contributions to the presentation.

  The Enterprise Architecture Repository is an online, web-based platform desig

 
The Enterprise Architecture Repository is an online, web-based platform designed to store and organize Enterprise Architecture artifacts produced by EA software tools. You work as a developer for CMS and want to protect the security of the organization. You have developed a level of trust with the development team, and they see that your skills and personality are a match to their organization. Now they have requested your opinions on this application development project.
Your research has shown that many organizations have formulated methods to implement greater security principles by incorporating two-factor authentication.
Develop a proposal that will incorporate two-factor authentication for this development project. You have already had a plan to create an internal certificate and use this as the two-factor check for any devices that have already authenticated once.
Please be sure to include the following into your documentation:
Recommendation of why an updated certificate is needed and your rational for your recommendation.
Description of two-factor authentication and how it is becoming more widely used within the industry.
Explanation of the plan for two-factor authentication in the first login. Include screen shots within this section as proof of how this will work. Then include a brief explanation of how an internal certificate will be used thereafter for that device.

  IT543-4: Design an implementation of cryptographic methods for an organizatio

 
IT543-4: Design an implementation of cryptographic methods for an organization.
Assignment Instructions:
Perform the lab described in the zip folder Wireshark — Capturing SSL Packets.
Follow the directions, perform the indicated instructions, and provide the requested information.
Take screenshots of each step to show that you are working through the steps.
Instructions are 

Group Project Part 4: Prototype Development & Testing    Objectives: Develop

Group Project Part 4: Prototype Development & Testing   
Objectives:
Develop a prototype.
Conduct initial tests for functionality and effectiveness.
Prepare a Communication Plan.
Module 4:
Prototyping methods.
Basics of product testing.
Deliverables:
Update your Briefing PowerPoint document from Module Two to reflect the prototype and initial testing report. Also, update the budget with possible ways to mitigate the shortfall.
Based on the people involved in the project (Program Manager, Engineer, Logistics, Legal, and Finance), prepare a very brief Communication Plan (add it to the PowerPoint).
Scenario:
Emma gathers her project team in the familiar conference room, a sense of urgency underpinning her composed demeanor. “Welcome, everyone. We’ve reached Month (Module) Four, and there are significant updates to discuss. First, the PowerPoint presentation will need to be revised due to a change in budget and logistical issues..”
“We’re pivoting from our original ideas of reverse osmosis and distillation,” Lisa, the Engineering Lead, explains. “After reviewing the prototype challenges and the feedback from your team and the market research, we’ve decided to utilize reed beds for water purification. This simplifies our technological approach, meets the sponsors’ environmental requirements, and makes us more agile.”
Raj, in charge of Logistics, seems pleased. “That would certainly alleviate some of our logistical constraints. Reed beds are more easily sourced and installed.  I’ve started mobilizing our supply chain.”
Emma nods and continues, “We made need that agility.  The second update is some bad news – it’s financial.” 
Maria from Finance frowns, “We’ve had a reduction in our budget by $75,000. One of our funding sources – I’ve mentioned them to you before, has had to reduce its funding.  “The Lindsey Wilson Project Team may have some options to mitigate the impact.  We could aim to shorten the timeline, reduce performance features, or produce fewer units.  That’s not my area though.  Sorry for the bad news.”
Emma gazes thoughtfully at her Lindsey Wilson Project Team. “We’ll need to weigh these options carefully, understanding the impact on quality and deliverables. I’ll need that briefing PowerPoint updated by Sunday at midnight.”
Tim, the Legal Counsel, remarks, “I’ll review any legal implications of these changes, especially the shift to reed beds, and will advise.”
“Great,” Emma says. “Lastly, for this week’s deliverable, the Lindsey Wilson Project Team will also create a Stakeholder Communication Plan.”
New to these meetings, Ethan, the community outreach coordinator, is already making notes. “This is an excellent opportunity to reassess how we’re engaging with our stakeholders given the changes. We’ll define what they need to know, when, and how.”  (Add Ethan to your Stakeholder Communication Plan.  His role will be important toward the end of the project.  Also make sure the Board of Directors and Sponsors are included).
Emma feels a wave of relief wash over her; the challenges are formidable but so is her team. “Exactly. Let’s remember, adaptation is a form of progress. We’ll adjust our sails to reach our destination, even if the winds have shifted.”  Sensing renewed determination in the room, Emma concludes, “By the end of this week, Sunday at midnight, we need an updated Briefing PowerPoint reflecting our new scope and budget, as well as a simple Stakeholder Communication Plan. These are our lighthouses, guiding us through these turbulent waters.”
A chorus of agreement signals a team united, ready to adapt and forge ahead, undaunted by the ever-changing landscape of their ambitious project.
Welcome to the accelerated six-module Water Purification Project!
Your task is to leverage project management and system design principles to address an urgent issue – providing clean water in rural communities. Working in teams, you will research, design, and present a technology-enabled water purification system capable of producing at least 500 gallons of clean water per day per unit. With a generous budget of $1 million (now $925,000) for 1,000 units, you’ll focus on scalability, efficiency, and sustainability. 
Use your textbook and PMI.org resources to prepare your deliverables.
Your evaluation will be based on the feasibility, scalability, and quality of your deliverables, as well as your final presentation. Good luck!

From your Course Water Purification Project, give three dependencies that you w

From your Course Water Purification Project, give three dependencies that you would add to a precedence diagramming diagram.  What is your reasoning?
Your Chief Engineer, Lisa, wants more time to test the prototype on this project, and she is probably right.  How could you convince her that the schedule cannot be altered, and what is your strategic rationale?