Please be sure to read all of this assignment description carefully. It’s very detailed. It describes two separate things. However, all items will be submitted in ONE Word document.
The portfolio that contains elements you have been working on throughout the course; and
The final p (problem analysis) that you will include as part of the portfolio.
Let’s look at the BIG picture first, the final portfolio.
What is a portfolio?
A portfolio is a collection of items organized in a notebook, file, or a similar format. By collecting this information throughout a course, you can clearly see the connections among assignments as well as the progress you have made. In ENGL110, your portfolio will reflect the work you have done in a specific discipline or topic, ending with the analysis of a problem you have explored. Here are the required elements of the portfolio. The required sections are included in the template.
Title Page
Table of Contents
Item 1 of the Portfolio – Description of Discourse Community in Your Field
This is the assignment you submitted in week 2. You are to submit a final version of the description, including any changes recommended to you in the instructor’s feedback. Item 2 of the Portfolio – Annotated Bibliography for your fp
This is the assignment you submitted in week 4. You are to submit a final version of the annotated bibliography, including any changes recommended to you in the instructor’s feedback. Item 3 of the Portfolio – Final Pr – Analysis of a Problem
This is the final problem analysis paper that is the culmination of all the work you have done in the course. Please see the complete description of the paper below
Assignment Instructions
This analysis project requires you to tackle a problem within your field of study by first exploring it, its causes, and its impacts. Then, if you want, you can recommend one or more practical solutions to solve the problem.
After deciding on the problem you wish to tackle, begin building questions about it. Your goal for the analysis is to answer the questions through your sources. Finding multiple angles and perspectives is ideal so that you explore those possibilities in the final paper before settling on your recommendation. Be sure to identify what is at stake.
Here are questions to help guide your analysis:
What is the problem being addressed (explain, describe, and “prove” that it exists)?
Who is affected by this problem?
Why does this problem exist? (Identify the root causes.)
Why does the problem persist? (Identify the major factors that contribute to the problem’s ongoing presence.)
What is at stake if the problem is not solved?
If you decide to include a solution, use these questions to guide you:
Who can take action?
What should they do, exactly?
Why would this help?
What are the positive and negative aspects of your solution(s)?
PURPOSE: To analyze a problem and possibly provide a solution
AUDIENCE: Classmates, others interested in the field
LENGTH: 900 – 1,000 words (Times New Roman font). Please do not go significantly (~10%) under or above the word count requirement. This word count includes only the paragraphs in your final (not the Works Cited/References page or previously submitted sections).
SOURCES: 5 (five) sources (These may include sources you used in previous assignments. Going under this number will cost points in grading.)
FORMAT: The citation style that is appropriate for your discipline
Submit your assignment as a Word document attached to the assignment link so it can be automatically processed through Turnitin. Use either the MLA or APA template provided. You can save the template with a title like this: Your Name Portfolio Final Pa.
Category: Computer Science homework help
Instructions Each Research Paper: Topic Proposal and Outline must include th
Instructions
Each Research Paper: Topic Proposal and Outline must include the following 3 items:
1. A brief (at least 3–4 bullets with 1–2 sentences per bullet) overview of the research topics of your paper – you will need to address these in the Research Paper: This will be titled “Research Objectives”.
2. A list of at least 3 questions (in a numbered list) you intend your research to ask and hopefully answer. These must be questions that will require you to draw conclusions from your research. These must not be questions to answer your research objectives. This section will be titled “Questions.”
3. At least 3 initial research sources, 1 of which is an academic journal or other peer-reviewed source. These should match APA formatting of sources.
Example formats for Topic Outlines (an example, not a template):
Research Objectives
· Briefly describe the overall concept of system integration.
· Discuss the traditional approach of big-bang integration including the major advantages and disadvantages of this approach.
· Discuss the traditional approaches of top-down and bottom-up integration and their major advantages and disadvantages.
· Discuss the traditional approach of mixed integration, combining the desirable advantages from the top-down and bottom-up integration approaches.
Questions
1. Why is system integration an important step in the software development process?
2. Why has big-bang integration not survived as a useful testing method?
3. Why have top-down and bottom-up integration not been replaced by more modern methods?
4. Why would you use mixed integration all the time rather than sometimes using top-down and bottom-up integration exclusively?
References
1. Herath, T., & Rao, H. (2012). Encouraging information security behaviors in the best organizations: Role of penalties, pressures, and potential effectiveness. Descision Support Systems, 47(2), 154-165.
2. Testing Computer Software, 2nd Edition, by Cem Kaner
3. Anderson, R. (2008). Security Engineering: A Guide to Building Dependable Distributed Systems (2nd ed.). Cambridge, MA: Wiley.
Review the answers you provided earlier. Your employer has asked that you to ex
Review the answers you provided earlier. Your employer has asked that you to explore more innovative tools and enhance the organization’s strategies to compete in healthcare.
> Develop a strategy for enhancing IT healthcare usage.
> Perform an analysis using quantitative measures to determine the proper course of action (Chapter 2)
> Provide a report of your resulting analysis. It should explain in detail also what you would need to do to accomplish your strategy.
> Be sure to address whether your strategy will require your employer to collaborate with external stakeholders and, being a proactive and forward thinker, any new products and services for promoting IT healthcare usage will require.
Need 8-10 pages in APA format with minimum 9 peer-reviewed citations. Must include introduction and conclusion.
The Open Systems Interconnection (OSI) model is a guiding principle in online s
The Open Systems Interconnection (OSI) model is a guiding principle in online system design. By working from the OSI model, you could ensure that your employer’s online environment could accommodate interoperability among different online software products and services.
> Draw a chart for the OSI model and their numbers from top to bottom.
> Name three problems with cabling and the methods to counteract those issues.
> How do you protect your employer’s domain name from being hijacked?
Need 2-3 pages with peer-reviewed citations. No introduction or conclusion needed.
APA FORMAT 300 words and REFERENCES AND CITATIONS The acceptance of Bring Your
APA FORMAT 300 words and REFERENCES AND CITATIONS
The acceptance of Bring Your Own Device into corporate environments and government environments has created a unique business challenge that must be solved. This challenge is based on the fact that the IT asset is owned by the employee.
Discuss two of the most interesting elements commonly addressed in a Bring Your Own Device (BYOD) policy definition (from pages 129 – 131 from the book Fundamentals of Information Systems Security 3rd Edition). Mention why they are interesting to you.
APA FORMAT 300 words REFERENCES AND CITATIONS What is meant by “Test Coverage”
APA FORMAT 300 words REFERENCES AND CITATIONS
What is meant by “Test Coverage”? Is it usually “impossible” to test all possible combinations of input values in order to guarantee some code is correct? Or is it possible to test all combinations? What is practical?
https://enterprisersproject.com/article/2018/6/10-ted-talks-sharpen-your-commun
https://enterprisersproject.com/article/2018/6/10-ted-talks-sharpen-your-communication-skills?page=0%2C0
BASED ON TED TALK ON BELOW LINK
Follow this link to access an article from The Enterprisers Project. Each student will select a Ted Talk. Then, watch the Ted Talk and take good notes.
Answer the following quetions:
1. Identify the specific Ted talk
2. What is the overall theme of the Ted Talk?
3. What key points of the Ted Talk are important to consider as related to organizational communication?
4. Based on what you have learned in the class, how does the Ted Talk align with organizational communication theory?
Prepare First, download and install CrypTool. If using a Windows® PC, insta
Prepare
First, download and install CrypTool.
If using a Windows® PC, install CrypTool 1.
If using a MAC PC, install JCrypTool.
Note: In order for the CrypTool program to function, you must first OPEN a text file. Only then will items on the toolbar become enabled.
Additional information for this assignment is covered in the Assignment 3 — CrypTool Lab document.
Part 1.1
Identify the digital signature schemes and MAC schemes that are supported by CrypTool. For each scheme, determine the key sizes supported by CrypTool and which key sizes are recommended by NIST.
Encrypt text using two digital signature schemes, measure the execution time for key generation (if applicable), signature generation, and signature verification. Measurements should be performed multiple times, and then the analysis should use the average time for comparisons. In order to obtain measurable results, you will likely need to use long messages (i.e., 5 MB or larger).
Record results and draw conclusions. Identify the encryption algorithm used. Discuss the results of the measurements and any variations or trends observed when comparing the results from the group members. Report the results and the analysis. Be sure to include details on the measured results and details on each member’s computer (i.e., processor type, speed, cache size, RAM size, OS, etc.).
Part 1.2
Using CrypTool, generate an MD5 hash for a small plaintext document.
Record the hash result (cut and paste).
Change one character in the plaintext and regenerate a hash on the changed text.
Record the hash (cut and paste into your report).
Do you think you could find a hash collision (that is, can you find two different texts that produce the same hash)? Experiment a few times and draw a conclusion about whether this can be done easily.
Part 1.3
Generate a large prime (at least 20 digits long) and a short prime (less than 10 digits in length) (HINT: Individual Procedures RSA Cryptosystem Generate prime numbers).
Determine which factorization algorithms are implemented within CrypTool (Indiv. Procedures -> RSA Demonstration -> Factorization of a Number).
Identify the characteristic features of these algorithms by reading the “Factorization algorithms” help within the tutorials section of CrypTool’s built-in help.
Try to factor the primes using some of these methods.
Report your results, identifying the methods you used. Be sure to include how long the factorization took (or how long it was estimated to take if it was not completed in a reasonable time).
Now, just enter numeric values to be factored (again, one long number and one short one).
What are the results? Were factors found? Are you good at guessing prime numbers?
Tasks may not be submitted as cloud links, such as links to Google Docs, Goog
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Address ethical issues for cybersecurity by doing the following:
1. Discuss the ethical guidelines or standards relating to information security that should apply to the case study.
a. Justify your reasoning.
2. Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.
3. Discuss what factors at TechFite led to lax ethical behavior.
B. Describe ways to mitigate problems and build security awareness by doing the following:
1. Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.
2. Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.
a. Explain how the SATE program will be communicated to TechFite employees.
b. Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.
C. Prepare a summary directed to senior management (suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Demonstrate your knowledge of application of the law by doing the following:
1. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study.
2. Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.
3. Discuss two instances in which duty of due care was lacking.
4. Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.
B. Discuss legal theories by doing the following:
1. Explain how evidence in the case study supports claims of alleged criminal activity in TechFite.
a. Identify who committed the alleged criminal acts and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity.
2. Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite.
a. Identify who was negligent and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices.
C. Prepare a summary (suggested length of 1–2 paragraphs) directed to senior management that states the status of TechFite’s legal compliance.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.