Computer Science 2023 Ethics, Law And Cybersecurity

2023 CSCI 415 Ethics Law and Cybersecurity Chapter 3 Quiz NAME DATE | Assignment Collections

 

CSCI 415 Ethics, Law and Cybersecurity

Chapter 3 Quiz

NAME: _______________________________DATE: _________________

Chapter 3 – Quiz 3

Instructions:  There are two (2) topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 3) shown in your course syllabus.  Please provide appropriate responses in essay form for bothIn most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first two (2) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be uploaded into the appropriate eCollege Dropbox, no later than 11:59pm on the due date.  Do well.

  1. Based on what you have learned in this chapter and using appropriate components, properly construct an argument to: (1) support or refute the view that all undergraduate students should be required to take a course in cyberethics; and (2) apply the seven steps (in Section 3.8) to your argument.  Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (comprehension)
  2. Using appropriate components construct an argument for or against the view that privacy protection should be improved in e-commerce transactions.  Next evaluate your arguments against the rules for valid, inductive, and fallacious arguments.  Does your argument contain any of the common or “informal” fallacies discussed in Section 3.9?  If so, elaborate. Please elaborate (beyond a yes or no answer) and provide your rationale in support of your responses (knowledge)

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename:

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

 NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Netweork paper 120531

2023 Above is the Global Finance Inc GFI network diagram A hypothetical company GFI has grown rapidly | Assignment Collections

Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth.

GFI’s network has historically been fairly stable, and the company has not experienced many full scale network outages. GFI has hired three (3) network engineers to keep up with the network growth, as well as the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.

The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

  1. Describe the company network, interconnection, and communication environment.
  2. Assess risk based on the GFI, Inc. network diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.
    1. Defend your assumptions where pertinent information from the scenario isn’t available.
    2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.
    3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.
  3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.
  4. Explain the way in which you would present your findings and assessment to the company’s management and thus facilitate security buy-in and concentration.
  5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Note: The graphically depicted solution is not included in the required page length.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Research Paper (OPSEC)

2023 Note 600 words must Note 48 hours duration from now Give 5 6 references please do neat | Assignment Collections

Note: 600 words must 

Note:48 hours duration from now

Give 5-6 references 

please do neat and clean , send me turntin report as well . 

In July of 2017, Equifax suffered a security breach. It is estimated that over 143 million Americans had their birthdate, social security number, addresses and driver’s license numbers stolen. In addition, over 206,000 credit card numbers with PII attached were accessed and ~182,000 people involved in credit card disputes.  In the latter cases, customers in the UK and Canada were also affected.

It is said that a patch was not applied to the Apache Struts and that vulnerability allowed the hackers to break in.  In addition, the breach occurred between May and July of 2017, but was not reported to the public until September after Equifax had hired Mandiant to do an internal investigation of what had happened.

Also three Equifax executives sold off almost US $1.8 Million of their personal shares a month prior to the public disclosures. 

Equifax set up a website for people to use https://www.equifaxsecurity2017.com which later was classified as insecure and built almost like a phishing website. 

Using what we have learned in this class, write a 2 to 3 page paper that addresses:

• What policies and procedures appear to have been lacking at Equifax?• Do any of the policies and procedures address what the executives are accused of doing?• Why did they wait so long to inform the public?  Legally what are they required to do?• How could this have been avoided?

State your premise and supporting arguments, etc. clearly.  

Note that I will take off up to 10% of the grade for poor grammar and misspellings. So be sure to run grammar and spell check

Resources:

Giant Equifax Data Breach, http://money.cnn.com/2017/09/07/technology/business/equifax-data-breach/index.html

https://www.nytimes.com/2017/10/03/business/equifax-congress-data-breach.html

https://en.wikipedia.org/wiki/Equifax

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 homework

2023 10 pionts Write an algorithm in Pseudocode for a program that computes the | Assignment Collections

 

(10 pionts) Write an algorithm  (in Pseudocode) for a program that computes the cost of painting and installing carpet in a room.  Assume the room has one door, one windows and one bookshelf (built into the wall and not painted).  Your program should do the following:

Output the cost of painting the room, and the square footage to paint

Output the cost of carpeting the room, and the square footage to be carpeted

 

(30 points total) Given:

int x=1, m=2, h=3;

long z= 9; long w = 0;

double n = 5.0, y = 4.0;

 

Which of the following assignments are valid.  If an assignment is not valid state the reason.  If the assignment is valid show the result of the calculation, and your work to derive the answer . NOTE assume that the effect of these assignment statements are not accumulative.

 

y = (z * 4 / 3) % 5;

n +=    17 /  7;

y = h * 3.5 + 8 / 3;

m =  (int) (15.5 * 2 – z/3);

x = m * 2 / 3 – h % 4;

w = h + (–x) + m++;

 

 

(10 points) For problem P4.12 on page 174 of your text, give a valid Java expression (s) for the set of arithmetic calculations given in the problem.  An entire program is not necessary

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Discussion Questions

2023 Discussion 1 Cisco Switches Please respond to the following You connect two new Cisco switches together and expect them to | Assignment Collections

Discussion 1

“Cisco Switches”  Please respond to the following:

  • You connect two new Cisco switches together and expect them to use DTP and create a trunk. However, when you check statistics, you find that they are access ports and didn’t negotiate. Based on your learning this week, why do you think DTP didn’t work on these Cisco switches? As network administrator, how would you have addressed this scenario? What recommendations would you make to management?

Discussion 2

“Security Monitoring”  Please respond to the following:

  • Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.
  • According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) would be more appropriate to use over the other. Provide a rationale to support your chosen example.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer Science Assignment – Network Report

2023 CSCI 620 Fall 2013 Final Examination Please read carefully the case study that you have to solve | Assignment Collections

CSCI – 620

Fall 2013

Final Examination

 

Please read carefully the case study that you have to solve. Your statements have to be logically justified. Your diagrams have to be detailed and well explained. The case study is open ended, so you will have to make assumptions and consistently use them throughout the entire paper. You can use the book, other network security related books, the presentations and the Internet as references. Any source used has to be referenced.

Case Study

You have been named the CIO administrator for a small size bank, which has nine branches and the headquarters which also works as a bank. Your responsibility is to come up with a plan for securing the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in crafting the security policies, and mechanisms to enforce the policies for the IT of the bank. An understanding of the security issues the company is facing in order to conduct its business has to be reflected in the security aspects of the infrastructure (you should justify why a security measure is taken and how it will affect the business of the bank).

The bank network consists of a main site, a backup site and nine branch sites. Each branch network connects to the main site through a dedicated connection. The branches are each handling investment business as well as regular banking business. Three of the branches are located in the downtown area in very close proximity (two blocks apart, but the buildings are adjacent). The branches need to have access to the central database of the bank besides their own databases. Each of the branches has roughly 50 employees except for the headquarters which has 150. Ten percent of the employees are investment bankers who need constant access to the internet for market updates. Given the nature of the business, all the employees require email access. Internet access is also required. The bank uses customized software to interface to the databases and provides the customers with web access to their accounts as well as to other financial tools. Each branch has its own database but periodically the information from this database updates the main database. However, the management, which is located at the headquarters, must have access to all the information. The bank also has a backup site. The Human Resources department has its own database and so does the payroll department. Each of these departments has a staff of 10 people and does not need access to the other databases. The IT department employs roughly 80 people, 40 of which are located at the headquarters.  The software development for the bank is partly done at the headquarters by a group of 10 developers and partly outsourced to a large software development firm.

Your plans should contain detailed information of how the access to networks at the branches, at the headquarters and at the backup site will be controlled. Physical security should also be addressed. Given the diverse staff employed by the firm, it is necessary to have detailed policies regarding file access, system access, documents access, systems and network security. Choices of OS, security software and hardware have to be justified. Vulnerability analysis is also done every year.

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Order # 13438

2023 Title Enterprise Network Optimization Paper type Other Not listed Paper format APA Course level Undegraduate Subject Area Other Not listed pages 2 or 600 | Assignment Collections

Title: Enterprise Network Optimization

Paper type Other (Not listed)

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Preparation

To prepare for this final assessment, please complete the practice labs as they may be helpful.

Look in the Capella library and on the Internet for articles and information on the topics of availability and load balancing. You will need at least three recent, professional resources to support your work on this assessment.

Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Assessment 1 Resources for more information.

Review the feedback you received on the previous four assessments and revise your work accordingly.

Instructions

For your final assessment, you will use your work from the previous four assessments, along with this final piece to produce a cohesive plan for enterprise network optimization. Organize your work logically, as if you would actually present it to senior IT leadership in the organization you selected.

Use the following structure to organize and complete your assessment:

•Title page.

•Executive summary (approximately one page that provides a high-level overview of what is in the document).

•Body of the document: ◦Your network diagram, updated to include the following: ◦Apply basic load-balancing techniques as an effort to ensure network availability.

◦Analyze the technology presented in your diagram (you may use the information you provided in previous assessments, but do not simply cut and paste). ◦Explain your decisions for hardware placement, hardware devices, topology, and overall infrastructure design.

◦Support your analysis with recent, relevant resources.

◦Explain the techniques and strategies for maintaining high availability on the network.

◦Explain your load balancing strategy.

◦Explain how your network design addresses globalization. How can you be sure it will succeed internationally?

•References page. ◦Include at least six recent, relevant professional references.

◦Format references according to APA guidelines.

Your final assessment should be approximately 6–8 double-spaced pages, not including the title page and references page. Be sure it is professionally written, free of errors, and uses Times New Roman, 12-point font.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Digital Forensics – Data Breach

2023 Background Assume that there has been a data breach at your organization The root cause was one of the following | Assignment Collections

 

Background:  Assume that there has been a data breach at your organization.  The root cause was one of the following:  Insufficient or weak user authentication, deliberate actions of a disgruntled employee, a server that was missing a critical security patch for 90 days, or a misconfigured SaaS program that was unknown to the IT department.

Topic:  Select one of the possible root causes listed above and write a recommendation to senior management for addressing the problem.  Suggest an immediate action that would need to be taken, then attempt to persuade management to support a project to address the root cause.  Address at least one regulatory reason for action, one ethical reason, and one reason based on industry standards.  Knowing that this effort would be too early for accurate financial numbers for a project, include one paragraph that would address three key financial impacts a project would have on an already fully committed IT budget.

Mechanics:  This portfolio assignment has a target word length of 2,000-2,500 words.  It must be in APA format.  Due to the length, an Abstract is not required.  The word count excludes the Title Page, Reference Section, and any appendices you may desire to add.  A minimum of 3 scholarly resources must be used.  To qualify as a scholarly resource, the resource must be a peer-reviewed article published in a journal in the field related to Digital Forensics.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Table

2023 P2 Create a data dictionary similar to the metadata table shown in Table 1 1 | Assignment Collections

P2. Create a data dictionary similar to the metadata table shown in Table 1-1 in Chapter 1 to document your choices. For each table in the relational schema you developed earlier, provide the following information for each field/data element: field name, definition/description, data type, format, allowable values, whether the field is required or optional, whether the field is indexed and the type of index, whether the field is a primary key, whether the field is a foreign key, and the table that is referenced by the foreign key field.

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Final Project

2023 Overview In the meeting with your executives your CEO announced that you would need to prepare | Assignment Collections

Overview:

In the meeting with your executives, your CEO announced that you would need to

prepare a PowerPoint presentation of your department achievements for the last quarter

and present it in front of the hospital’s board of trustees who will be visiting your hospital

by the end of the month.

Instructions:

Based on that information, your IT Director asked you to prepare a 12-15-page

PowerPoint presentation which will take a fifteen-minute time slot where you discuss the

following:

• As you have opted for Windows-based computers, what are the significant

differences between a Mac and a Windows-based computer?

• What are the main differences between the leading operating systems: Windows,

Mac OS, and Linux?

• What are the measures that you are taking to keep computers safe and to avoid

health hazards from computer use?

• Is the hospital safe and immune from online annoyances such as spam and

adware? How can you further secure your system from malware?

• The advantages of your recent implementation of VoIP?

• Describe the improvements you have implemented in the hospital’s customer

relationship management (CRM) and how are you managing your relationship

with your vendors.

• Discuss whether the adoption of a medical expert system could be beneficial to

the doctors at your Hospital.

• Describe how social media can be effectively used as part of the hospital’s web

strategies and improve its position in the market?

Requirements:

• This assignment is a PowerPoint presentation consisting of 12-15 slides, using

APA formatting and citations.

• Include four references.

• Record voice narration and include closed captioning or script saved to the notes

in PowerPoint.

o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now