Create a new thread containing the name of the topic/subtopic, the Chapter, location/page/section number in course textbook, and location/slide number/page in the Chapter presentation PDF in the thread title and minimum 300 words.

Sets and Maps

The initial post should summarize a subtopic/section from Chapter 18, 19, 20 and 21 . Create a new thread containing the name of the topic/subtopic, the Chapter, location/page/section number in course textbook, and location/slide number/page in the Chapter presentation PDF in the thread title and minimum 300 words. The post should be original and should not cover any previously posted topics. You are not going to earn any credit for duplicated topics. (Sets and Maps is chapter 21)

Participate in Hack the Box, an online pentest competition. Write a report on how far you were able to achieve.

Cybersecurity- Hack The Box penttest report

Hack The Box

Participate in Hack the Box, an online pentest competition. (https://www.hackthebox.eu)

Write a report on how far you were able to achieve.

The report should include:

  • Tools and techniques used
  • Methodology
  • Relationship of the competition to pentesting
  • The overall value of the competition
  • Include screenshots of achievements
  • Paper Specifics:
  • 4-5 pages (not counting title, references, etc.)

 

What is the influence of the competence profile of employees and technology on municipalities that work data-driven with a data lab?

Competence profiles of employees

What is the influence of the competence profile of employees and technology on municipalities that work data-driven with a data lab?

Provide some theory about: Competence profiles of employees IT technologies And how both effect this for the use of Data-driven working for municipalities with a data lab

 

Give as accurate (Big-Oh) an analysis as you can of the expected running time of each algorithm. Calculate the actual running time for each algorithm by writing programs to execute each algorithm 10 times, to get a good average.

CUS1126: Introduction to Data Structures

Lab 1: Running Time Analysis

The Lab1.java included with this assignment has two algorithms.

  1. Give as accurate (Big-Oh) an analysis as you can of the expected running time of each algorithm.
  2. Calculate the actual running time for each algorithm by writing (separate) programs to execute each algorithm 10 times, to get a good average. The program should print out the running time to the screen.
  • Plot the average running time for both algorithms. Each algorithm should run ten times. The average of these ten runs should be plotted.
  1. Compare your analysis with the actual running times.

N is the size of input. Calculate the running time of each algorithm for N = 250, 500, 1000, 10000 and 20000

The input is a set of random integer numbers in range of [-9, 9].

Compare the running time of two algorithms. Plot the results and write your conclusion about the running time comparison of these algorithms.

Submission:

Submit the plot, conclusion and source code assignment under Running Time Analysis.

Note 1: compile your file .java and run the program before submitting it.

Note 2: How to locate Java file?

First you need to locate your java file.

  • Right click on your project in Eclipse
  • Click on “Properties”
  • You can see the location of your Java file

Or

  • Right click on your Java file in Eclipse.
  • Copy the file
  • Paste the file on your desktop

Note 3: Your Java program should follow the Style Guidelines. Style Guidelines document can be found in blackboard.

 

Guideline:

Program should begin with a header comment that provides the name of the homework, the name of the author, the date, and a short description of the program.

 

Select a risk you would like to assess. Provide your results from the FAIR U tool and document any insight into your thoughts on your results

Cybersecurity

Perform a FAIR end-to-end risk assessment using the Small Business Risk Analysis Case StudyActions . Your end-to-end assessment should include the following:

Select a risk you would like to assess. Perform your scenario scoping and values selection. This should include: 1. Scope Table (with your most important scenarios), 2. LEF Table, 3. Primary Loss Table, 4. SLEF Table, 5. Secondary Loss Table. You must provide your rationale for each value selection. (e.g. why have you chosen a specific asset at risk, why have you chosen a particular threat effect, where did you get a specific loss value, how did you estimate your LEF values, etc.). The justification is more important than the values you select.

Enter your values into the FAIR U tool and run your scenario. Provide your results from the FAIR U tool (you can take and post screenshots) and document any insight into your thoughts on your results (e.g. are they higher than you thought and you suspect you may have some errors in your values/assumptions? If so, what are they? Was anything surprising to you in this process? What was particularly challenging in this process? What wouchold you do differently next time?)

 

Conduct quantitative risk assessments using the FAIR methodology for the top 3 risks from the above question. Feel free to use the FAIR-U tool.

Cybersecurity

Conduct quantitative risk assessments using the FAIR methodology for the top 3 risks from the above question. Feel free to use the FAIR-U tool. Provide the following information for each risk:

All tables and continuums associated with the FAIR process

All individual values used for each risk analysis

How those values were identified (if you did additional research or made assumptions, provide that information)

Attach any exports of calculations from your FAIR analysis Top three risks Network segregation – understanding what should be segmented or reachable by third-parties or applications can help prevent bigger breaches.

Performing network vulnerability checks – It took 5 months for Home Depot to discover the breach.

They should be performing network scans or hire an outside company to scan the network for vulnerabilities. This creates a means to detect/patch breaches before they become serious.

Chip-and-Pin Cards – this adds an extra layer of protection as card numbers are encrypted and pins are only known by the owner The Fair-U website: https://app.fairu.net/login?redirect=%2Fanalysis

 

Describe cloud services. Describe current cloud security practices Describe current cloud security threats.

Cloud Security

Term Paper:

Paper should cover what the cloud is, would be good to reference AWS, GCP, and Azure.

Describe cloud services. Describe current cloud security practices Describe current cloud security threats.

 

Provide an assessment of the vulnerability for multiple locations in the health care system. Discuss the potential harm that can result from authorized individuals accessing patient information.

Vulnerability Assessment Plan

You have been tasked with conducting a vulnerability assessment for the medical facility where you work. The company has three sites in one city but constantly shares information within their electronic health care system via emails.
After assessing your company’s vulnerabilities, you will need to develop a vulnerability assessment plan. Your plan must include the following information.
1. Provide an assessment of the vulnerability for multiple locations in the health care system.
2. Discuss the potential harm that can result from authorized individuals accessing patient information.
3. Explain the impact if an unauthorized person gains access to the electronic health care system.
4. Discuss potential legal cases that may ensue if data is accessed from outside the health care network.
5. Identify regulations health care facilities must follow to help protect patient information.

Your vulnerability assessment plan must be at least three pages in length.
The concepts required to complete this assignment can be found in your reading assignment and in the unit lesson, but you may find useful information in all of the lessons and readings in this course.

What is the most useful app that you have used? Explain your reasons. What is the worst app that you have used? Explain your reasons.

COMPONENTS OF A COMPUTER SYSTEM

  1. With the components of a computer system provided below, choose one and and illustrate
    1. Motherboard
    2. Graphics Card
    3. CPU
    4. RAM

 

NOTES TO REMEMBER:
  • Freedom in how you want to illustrate it – draw to paper and scan, edit via PowerPoint, anything. Just make sure you did the work.
  • Provide a behind-the-scenes photo (Maximum of 3) of you illustrating the component of a computer.
  • Attach the image in your document before you submit the computer system.

 

  1. What is the most useful app that you have used? Explain your reasons. Do not forget to attach the icon/logo of the app below.
  2. What is the worst app that you have used? Explain your reasons. Do not forget to attach the icon/logo of the app below

 

Describe the relevant issue in your own words and explain why it is important to address it. Demonstrate clearly that such an issue exists in the data with suitable illustration/evidence. Clearly state and explain your choice of action to address such an issue.

Data Mining Assignment

In this assignment, you will perform predictive analytics. You are given an sqlite3 database file (Assignment2022.sqlite) which contains a total of 5500 samples across two tables.

Table “train” contains 5000 samples have already been categorized into three classes.

You are asked to predict the class labels of the 500 samples in the “test” table.

Tasks

In this first task, you will examine all data attributes and identify issues present in the data. For each of the issues that you have identified, choose and perform necessary actions to address it.

Apply these actions to both the training and test data at the same time. At the end of this phase, you will have two data sets: one for training and one for the final testing task. Below is a list of data preparation issues that you need to address

Identify and remove irrelevant attributes.

Detect and handle missing entries.

Detect and handle duplicates (both instances and attributes).

Select suitable data types for attributes.

Perform data transformation (such as scaling/standardization) if needed.

Perform other data preparation operations (This is optional, bonus marks will be awarded for novel ideas).

For each of the above issues your report should:

Describe the relevant issue in your own words and explain why it is important to address it. Your explanation must consider the classification task that you will undertake subsequently.

Demonstrate clearly that such an issue exists in the data with suitable illustration/evidence.

Clearly state and explain your choice of action to address such an issue.

Demonstrate convincingly that your action has addressed the issue satisfactorily.