Computer Science Homework Help

Common Weakness Enumeration & Policy and Legal Ethics Papers

 

Hello , pls answer below 2 questions in a saperate WORD Doc

Course: Building Sec web Aplctns:

  1. Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.Pick one of common weaknesses identified on their site and describe it. Your assignment should be 200-300 of your own words. add 2-3 references at end

———————————————

Course: Policy, Legal, Ethics Cmplc :

1) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search?

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent.

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work?

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?

9. Should Facebook be regulated, at least as far as it’s privacy and data policies?

10. How many public cameras is too many?

Computer Science Homework Help

CIS 599 Strayer University Network Infrastructure and Security Discussion

 

Overview

This assignment consists of two sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and/or assume all necessary assumptions needed for the completion of this assignment.

With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.

Instructions

Section 1: Infrastructure Document

Write a 5–10 page infrastructure document in which you:

  1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
  2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  4. Create and describe a comprehensive security policy for the company that will:
    1. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.
    2. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Revised Project Plan

Use Microsoft Project to:

  1. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with 3–5 new project tasks each consisting of 5–10 subtasks.

The specific course learning outcome associated with this assignment is:

  • Prepare a design document proposing the configuration of a secure network infrastructure and a security policy to protect company assets.

Computer Science Homework Help

ITS 530 UC Performance on Codes Regular and Wildcards Expressions Discussion

 

When thinking about data visualization, it is important to understand regular expressions in data analytics. Therefore, note the importance of data visualizations and choose two types of expressions (* – wildcards for example) and discuss the difference between the two types of expressions.

Computer Science Homework Help

ITS 530 University of Cumberlands CH5 Editorial Thinking Data Visualization Discussion

 

This week we focus on establishing your editorial thinking. What does the author mean by editorial thinking? Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking. Please pick one major concept from the video and note what was said and your thoughts about the topic.

Computer Science Homework Help

ISOL 536 University of Cumberlands Network Restrictions Computer Science Discussion

 

Briefly respond to all the following questions. Make sure to explain and backup your responses
with facts and examples. This assignment should be in APA format and have to include at
least two references.
The network restrictions surrounding the web authentication service is one layer of defense. As
was noted, this component is too valuable to trust to a single defense. Furthermore,
authentication requests are tendered by the least-trusted component in the architecture. That
component, HTTP termination, resides on the least-trusted network.
What additional steps can be taken?

Computer Science Homework Help

NEC Cyber Security Planning and Management & Network Security Essays

 

Hello , PLs answer below 3 questions in a separate WORD Doc

Sub: Cybersecurity Planning and Management

  1. In 500 words, Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

Use at least three sources. Use the(https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

Sub: Network Security

  1. In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS/IPS tools that are currently on the market. Use APA format and add 2-3 references at end

2) Task: Assignment

11.1 List and briefly define three classes of intruders.

11.2 What are two common techniques used to protect a password file?

11.3 What are three benefits that can be provided by an intrusion detection system?

11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?

11.5 What metrics are useful for profile-based intrusion detection?

11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?

11.7 What is a honeypot?

11.8 What is a salt in the context of UNIX password management?

11.9 List and briefly define four techniques used to avoid guessable passwords.

Computer Science Homework Help

San Jose State University Machine Learning in Financial Investment Discussion

 

1.Outline of dissertation topic (Minimum 150 words about Topic Name: Machine learning in financial investment)

1 Reference APA format

2.Goals for this semester as they relate to the dissertation course. (Minimum 150 words)

1 Reference APA format

Note:

Must be entirely focused on the specific content.

Add some generic points that could apply

Please check plagiarism, Grammarly

References:

1.

Title: Publication Manual of the American Psychological Association

ISBN: 9781433832178

Authors: American Psychological Association

Publisher: American Psychological Association (APA)

Publication Date: 2019-10-01

2.

Title: Writing a Successful Thesis Or Dissertation

ISBN: 9781412942256

Authors: Fred C. Lunenburg, Beverly J. Irby

Publisher: Corwin Press

Publication Date: 2008-01-01

Computer Science Homework Help

NECBF Data Backup Procedures & Unified Communication Systems Essay

 

TASK 1

Find and view
several online videos on unified communications. Identify the URLs for three
that you think do a particularly good job illustrating the characteristics and
capabilities of UC systems. Select the one that you think is best and briefly
justify your selection.

Need Primary post –
300 -350 words.

I’m attaching 2
secondary post which you need to provide reply’s with 150 to 200 words

TASK 2

Search
“scholar.google.com” for a company or school that has reported
issues, problems, concerns about their backup procedures. Discuss the issue of
securing backups. There have been several incidents lately in which backup
media containing personal customer information were lost or stolen. How should
backup media be secured? What about off-site storage of backups?

Need Primary post –
350 -400 words.

I’m attaching 2
secondary post which you need to provide reply’s with 150 to 200 words

Computer Science Homework Help

Cumberlands Action Plan and Impacts on Creating Risk Mitigation Plan Discussion

 

Task1:words:300

In week 4, describe a plan of action and its impact on creating a risk management plan. The initial post must be completed by Thursday at 11:59 eastern. You are also required to post a response to a minimum of two other student in the class by the end of the week. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.