Oconee Fall Line Technical College Cyber Security Questions

Question Description

I’m working on a cyber security question and need an explanation and answer to help me learn.

Your company plans to purchase a new printer, and you want to evaluate the printer manufacturers’ websites to determine which site offers the best support. Research three websites listed in Table 10-1 and answer these questions, supporting your answers with pages that you have saved or printed from the websites:

  1. Which website made it easiest for you to select a new printer, based on your criteria for its use?
  2. Which website made it easiest for you to find help for troubleshooting printer problems?
  3. Which website gave you the best information about routine maintenance for its printers?
  4. Which website gave you the best information about how to clean its printers?

Brookline College Oklahoma City Katz vs United States Discussion

Description

Read the following articles:

https://www.sans.org/blog/searches-and-the-us-4th-amendment/ (Links to an external site.)

Answer the following questions in a Word document following APA format (12pt font, double spaced, first-line indent) with a minimum 100 words:

  1. Do you feel that government, especially law enforcement, should be limited in their scope of search when collecting digital evidence? Explain and provide evidence to support your argument.
  2. Do you feel that the government, specifically law enforcement, is allowed free online reign to search all aspects of the internet for evidence tied to a person? Evidence must be proven to originate or be accessed by the person to be used in a legal case.
  3. Do you feel that Katz vs. United States has given the law enforcement too much reach or not enough? Explain.

ISM 561 CSU Global Natural Disaster Recovery Paper

Description

Disasters take place around the globe on a regular basis, creating challenges for various stakeholders responsible for managing the aftermath of such disasters. Large-scale disasters bring about many challenges regarding human rights, research, ethics, and social policies.

Search the web for recent natural disaster recovery stories (i.e., hurricanes, tornadoes, and tsunamis). Review the article from your search and then write a report on how different businesses, in different industries, handled the disaster and the associated recovery steps. Then, answer the following questions:

What were the gaps in their recovery plans?

If the gap(s) is not known or published, provide your own thoughts on their disaster recovery gap(s) that you see.

  • Please note, you have an option of selecting one business from one industry or a few businesses from different industries.

UOT pubmed.gov Artificial Technology Discussion

Description

For this journal club discussion, we will focus on the example of exoskeletions used to treat paraplegia, e.g. the eLEGS technology in Module 10. 

Search Pubmed.gov for an article on how this wearable artificial technology was evaluated in clinical trials.  Here is a helpful link (Links to an external site.) to one article (you can use this article or other suggestions at the bottom of the page).

1.  Post a brief description of 2 ways the technology was evaluated from the clinical trial you selected. 

2.  What were the outcomes, that is what were the results of the clinical trial?  How did the clinical trial measure successful outcomes?  If it is a review article covering multiple clinical trials, please note that in your discussion forum.

University of Lahore Internet Policy Paper

Description

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

Plan:

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-…

Lahore University Firewalls & Control Access Worksheet

Question Description

I’m working on a networking question and need guidance to help me learn.

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Simon Fraser University Firewalls Question

Description

Cisco is a pioneer in producing a variety of firewall applications with many features. To configure any Cisco firewall, IP Access Control List (ACL) is used. The document “Tutorial on Cisco Firewall Rule Format” describes the general format of ACL, and also shows how ACL can filter network traffic. Please read this document to get a perspective on how to configure a CISCO Firewall using ACLs.

Apart from Cisco, there are many other vendors in the market that produce different types of firewalls. For this part of the assignment, you will survey any four commercially available firewalls from four different vendors, and write a summary comparing their technical features and capabilities, benefits, and limitations.

University of London Database Models Discussion

Description

OPEN xx/xx/xxxx 12:01 AM EST. – CLOSES xx/xx/xxxx 11:50 PM EST. To Create a Moodle Thread: Click “Discussion Forum 2”, then click “Create Thread”. To respond to a Moodle Thread: Click “Discussion Forum 2”, then click on the thread you are interesting in responding to, then click “Reply” to post your response. DISCUSSION FORUM CREDIT WILL ONLY BE GIVEN TO THOSE THAT CONTRIBUTE EACH WEEK THE FORUM IS OPEN. • Discussion Forum 2 Question This discussion forum focus on traditional database processing models used by developers to create a successful database system. Discuss at least three of the database processing models identifying each of their respective advantages and disadvantages. See course syllabus for additional details on submission requirements.

Lewis University Research in Computer Science Paper

Description

Hi, I attached the PDF below, Assignment-2 write in Latex IEEE format. I attached Latex download links in PDF below.

Format: Use the attached Latex IEEE template (Assignment2.zip)

Consider the following two papers:

  • Introduction to Embedded Software Verification (PDF)
  • Comparison of Model Checking Tools for Information Systems (PDF)

Write a 3-page review of the themes developed in these two papers. Your review should include the following points:

  • Concepts or new knowledge presented.
  • Model checking tools presented.
  • Area of applications covered.
  • Application of the concepts presented in these papers to address software verification/testing issues in your professional activities

Submission: Provide the complete zip file that contains the latex source and its compiled PDF of your assignment (assign2_yourname.zip).

CS 3733 University of Texas at San Antonio Operating System Discussion

Description

Problem Solving Quiz – psq15-tk10-synch-condition-variable Suppose there are three threads P, Q and R. They are sharing three variables x, y, z, which are initially set to 0. • P waits for the condition (x < y && y < z). If that condition is true, it sets x to y+z; Otherwise, it waits until that condition is true. • Q: increments y by 2 and decrements z by 1 • R: increments z by 2 and decrements y by 1 As shown below, suppose we simply implemented these using “busy waiting” at P. Now you are asked to modify them with the necessary synchronization mechanisms to avoid “busy waiting” while coordinating them and protecting the shared data