Categories
Computer Science homework help

 Discuss at least two unique circumstances that an organization may face while t

 Discuss at least two unique circumstances that an organization may face while testing software. Respond to two peers by discussing a suitable testing method to use for each situation. 

Categories
Computer Science homework help

   Assignment Objectives:  Analyze testing methods to find out vulnerabilities A

  
Assignment Objectives:  Analyze testing methods to find out vulnerabilities
Assignment Directions:  Suppose, you want to find out vulnerabilities in a system by simulating an external attacker trying to gain access to the system. But, you don’t want to invest too much time in it. Which testing method will you choose for this purpose?  In a word document, discuss the assigned topic in approximately ten sentences. 

Categories
Computer Science homework help

   Choose an Alert closely related to the weekly topic and write a concise summa

  
Choose an Alert closely related to the weekly topic and write a concise summary using the template.
Assignment Directions: 
 The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
 Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

Categories
Computer Science homework help

 As you create files on your computer, how will you organize and backup the info

 As you create files on your computer, how will you organize and backup the information on your computer? Would you use a feature like OneDrive? 

Categories
Computer Science homework help

  Part I:  You must use VirtualBox you can download from https://www.virtualbo

 
Part I:
 You must use VirtualBox you can download from https://www.virtualbox.org/ 
Follow the instructions on how to install the VirtualBox at http://cs.westminstercollege.edu/~greg/osc10e/vm/index.html 
Do not forget to download OSC10e.ova which is the Kernel for the linux we are using. Remember this linux has only the bare minimum and must install some good editors.
Optionally, you can then follow these steps at this link to install a GUI on the Ubuntu.
Part II 
Also for those who have not linux command background you must review and test linux commands from this site on your linux VM which you have now created. 
Put together screenshots into a Word document of all the milestones for each section above into a Word document and submit.

Categories
Computer Science homework help

 Discuss at least two unique circumstances that an organization may face while t

 Discuss at least two unique circumstances that an organization may face while testing software. Respond to two peers by discussing a suitable testing method to use for each situation. 

Categories
Computer Science homework help

Pink Sky  Entertainment is an online music sales company. The company has been k

Pink Sky  Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.   
Here are the current databases under Pink Sky   Datacenter  (on-premises).
Databases for customers to reach 
Database 1: Movie Soundtracks
Database 2: Videos
Database 3: Pictures
Databases for Employees (workforce members) to reach 
Database 4: HR
Database 5: Payroll
Database 6: Heath insurance 
Please address the Pink Sky   Entertainment Company manager’s expectations and requirements.
Question 1: Pink Sky Entertainment products  ( Databases  1, 2, and 3) will be moved to the cloud:  How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud?  The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.
Question 2: Pink Sky   Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and  Pictures)  by having only one account. Pink Sky   Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files.  They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?
Question 3: Pink Sky  Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky   Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?

Categories
Computer Science homework help

Assignment Content Question 1 In virtually all systems that include DMA module

Assignment Content
Question 1
In virtually all systems that include DMA modules, DMA to main memory is given higher priority than CPU access to main memory. Why? 
Question 2
When a device interrupt occurs, how does the processor determine which device issued the interrupt? 
Question 3
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

How many 8-bit I/O control module registers do we need for status reading and control of each device? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 

Question 4
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

What is the total number of needed control module registers given that the first device is an output-only device? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 
Question 5
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

How many distinct addresses are needed to control the two devices? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 
Question 6
Consider a microprocessor that has a block I/O transfer instruction such as that found on the Z8000. 
Following its first execution, such an instruction takes five clock cycles to re-execute.
 However, if we employ a nonblocking I/O instruction, it takes a total of 20 clock cycles for fetching and execution. 

Calculate the increase in speed with the block I/O instruction when transferring blocks of 128 bytes. 
**Explain your reasoning and show your mathematical calculations on how you derived your answer 

Question 7

What is the difference between memory-mapped I/O and isolated I/O? 

Categories
Computer Science homework help

Business Case: Local Hospital’s data center Companies spend billions on security

Business Case: Local Hospital’s data center
Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.
Where the Local Hospital’s parameters are:  600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations. 
Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.
QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it.  What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?
How can you adapt the principles for your hospital case?
Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 2: Companies should assess threats and develop controls for the most critical assets.
If the threats against tour Hospital IT System are 
Manipulation of software
Unauthorized installation of software
Misuse of information systems
Denial of service
What would be controls that you should apply to mitigate above listed risks?
Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?  
Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

Categories
Computer Science homework help

   Choose an Alert closely related to the weekly topic and write a concise summa

  
Choose an Alert closely related to the weekly topic and write a concise summary using the template.
Assignment Directions: 
 The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
 Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example