Categories
Computer Science homework help

  Part I:  You must use VirtualBox you can download from https://www.virtualbo

 
Part I:
 You must use VirtualBox you can download from https://www.virtualbox.org/ 
Follow the instructions on how to install the VirtualBox at http://cs.westminstercollege.edu/~greg/osc10e/vm/index.html 
Do not forget to download OSC10e.ova which is the Kernel for the linux we are using. Remember this linux has only the bare minimum and must install some good editors.
Optionally, you can then follow these steps at this link to install a GUI on the Ubuntu.
Part II 
Also for those who have not linux command background you must review and test linux commands from this site on your linux VM which you have now created. 
Put together screenshots into a Word document of all the milestones for each section above into a Word document and submit.

Categories
Computer Science homework help

 As you create files on your computer, how will you organize and backup the info

 As you create files on your computer, how will you organize and backup the information on your computer? Would you use a feature like OneDrive? 

Categories
Computer Science homework help

   Assignment Objectives:  Analyze testing methods to find out vulnerabilities A

  
Assignment Objectives:  Analyze testing methods to find out vulnerabilities
Assignment Directions:  Suppose, you want to find out vulnerabilities in a system by simulating an external attacker trying to gain access to the system. But, you don’t want to invest too much time in it. Which testing method will you choose for this purpose?  In a word document, discuss the assigned topic in approximately ten sentences. 

Categories
Computer Science homework help

   Choose an Alert closely related to the weekly topic and write a concise summa

  
Choose an Alert closely related to the weekly topic and write a concise summary using the template.
Assignment Directions: 
 The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
 Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

Categories
Computer Science homework help

 Discuss at least two unique circumstances that an organization may face while t

 Discuss at least two unique circumstances that an organization may face while testing software. Respond to two peers by discussing a suitable testing method to use for each situation. 

Categories
Computer Science homework help

Business Case: Local Hospital’s data center Companies spend billions on security

Business Case: Local Hospital’s data center
Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.
Where the Local Hospital’s parameters are:  600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations. 
Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.
QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it.  What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?
How can you adapt the principles for your hospital case?
Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 2: Companies should assess threats and develop controls for the most critical assets.
If the threats against tour Hospital IT System are 
Manipulation of software
Unauthorized installation of software
Misuse of information systems
Denial of service
What would be controls that you should apply to mitigate above listed risks?
Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?  
Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

Categories
Computer Science homework help

 Discuss at least two unique circumstances that an organization may face while t

 Discuss at least two unique circumstances that an organization may face while testing software. Respond to two peers by discussing a suitable testing method to use for each situation. 

Categories
Computer Science homework help

   Choose an Alert closely related to the weekly topic and write a concise summa

  
Choose an Alert closely related to the weekly topic and write a concise summary using the template.
Assignment Directions: 
 The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
 Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

Categories
Computer Science homework help

Assignment Content Question 1 In virtually all systems that include DMA module

Assignment Content
Question 1
In virtually all systems that include DMA modules, DMA to main memory is given higher priority than CPU access to main memory. Why? 
Question 2
When a device interrupt occurs, how does the processor determine which device issued the interrupt? 
Question 3
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

How many 8-bit I/O control module registers do we need for status reading and control of each device? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 

Question 4
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

What is the total number of needed control module registers given that the first device is an output-only device? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 
Question 5
A system is based on an 8-bit microprocessor and has two I/O devices. 
The I/O con- trollers for this system use separate control and status registers. 
Both devices handle data on a 1-byte-at-a-time basis. 
The first device has two status lines and three control lines. 
The second device has three status lines and four control lines. 

How many distinct addresses are needed to control the two devices? 
***Explain your reasoning and show your mathematical calculations on how you derived your answer 
Question 6
Consider a microprocessor that has a block I/O transfer instruction such as that found on the Z8000. 
Following its first execution, such an instruction takes five clock cycles to re-execute.
 However, if we employ a nonblocking I/O instruction, it takes a total of 20 clock cycles for fetching and execution. 

Calculate the increase in speed with the block I/O instruction when transferring blocks of 128 bytes. 
**Explain your reasoning and show your mathematical calculations on how you derived your answer 

Question 7

What is the difference between memory-mapped I/O and isolated I/O? 

Categories
Computer Science homework help

Assignment Content STOP!  Have you watched the two, past assigned, short video

Assignment Content
STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both. 
In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)
For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following:

Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
Page 2 = 60 pts (breakdown below): Simply answer the following questions
(1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts) 
(2) What is the title of the research article you found? (5 pts)
(3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words. (30 pts)
(4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings. (20 pts)
Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)