Computer Science
[SOLVED] Anomalies in IoT Smart Home Devices
Anomalies in IoT smart home devices: Mitigating controlled attacks in a smart home using machine learning (convolutional neural network) and IDS Topic: Anomalies in IoT smart home devices: Mitigating controlled attacks in a smart home using learning algorithm and IDS This project is a level 9 masters project. I need an expert in cybersecurity who can produce this research within the stipulated time. all instructions should be followed strictly, please. The project consists of two parts. first two pages contain the abstract, research value and justification
[SOLVED] The Concept of Risk Modelling
Research paper discussing the concept of risk modelling. Also, evaluate the importance of risk models. Lastly, construct an approach to modelling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks. The paper should meet the following requirements: Be approximately four pages in length, not including the required cover page and reference page. Follow APA7 guidelines. The paper should include an introduction, a body with fully developed content, and a conclusion. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.
[SOLVED] Algorithms and Data Structures
Algorithms and Data StructuresAssignment Generalized TreesIntroductionThe file system on most modern operating systems is organized as a generalized tree structure. The nodes of the tree are regular files and subdirectories. The subdirectories provide hierarchical structure, as they can contain other subdirectories as well as regular files.For this assignment, write a Java program that recursively traverses the file system starting at a fully qualified subdirectory. The subdirectory must be provided as a command line parameter. When processing begins, the first line of output is the fully qualified subdirectory.For each subdirectory encountered, get a list of the files in that subdirectory. For each entry in the list, if it is a regular file, output the file name and extension. Do not include the path name; just the file name and extension. If the file is a subdirectory, output just the subdirectory name; do not include the pathname that precedes the subdirectory name. In either case, after outputting the name, recursively descend into subdirectory and continue. You may recognize this as a pre-order traversal.For each line of output, prefix the file or subdirectory name with indentation that provides a visual indication of the depth of the recursive descent.Students are responsible for· public FileTreeWalk(String pathname)· public String listAllFiles()· public String toString()class FileTreeWalkFileTreeWalk is a Java class used for traversing a file system. In addition to a constructor, the class provides two public methods for traversing the file system, and a public toString method for displaying the traversal results.The public interface to the class follows:public FileTreeWalk (String pathname)The constructor takes a String parameter that specifies a pathname. The pathname is a starting point for the file system traversal. The parameter is either a fully qualified path name, or a relative pathname. Fully qualified pathnames start with an optional drive letter, or a slash. On other operating systems (e.g., Linux, Unix), a fully qualified pathname starts with a slash. Relative pathnames start at the current working directory. In either case, the pathname parameter specifies where the file system traversal is supposed to begin.As FileTreeWalk traverses the file system, it adds file names and subdirectory names to a generalized tree structure that when finished will represent the current state of the file system from the starting point specified by the String parameter, pathname.public String listAllFiles ()
[SOLVED] Improving Customer Experience through IT
How can IT improve customer experience? Use your own experience as good or bad examples.
[SOLVED] Ransomware Attack
Your organization is a large hospital system that has just had a huge Ransomware attack. 320,000 patients that their health information may have been exposed to a ransomware attack. The ransomware incident took the network offline for 6 days. Non-emergency medical procedures were canceled due to the lack of access to the electronic health record system and other computers. Providers and clinicians were forced to pen and paper, to allow patient care to continue. Your organization has been in the news with many negative stories about the cyber breach. As a result, you need to create the following: A cybersecurity breach emergency response plan. A business continuity plan to address this issue now and in the future. A crisis communication team. A crisis communications plan. The benefits to the organization of these plans and final conclusion. Prepare Review the selected case study once more. Mindset To help you add more insights of other issues that you need to address you need to think about your topic as if your manager told you that you needed to fix the issue and answer the following questions: What does the organization have to understand about this issue to really address the topic of Ransomware with hospitals? What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a cybersecurity breach emergency response plan? What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a business continuity plan? What variables, issues, phenomenon, models, and theories explain why it is important for organizations to have a crisis communication team and plan? What are the potential consequences for organizations that do not have a cybersecurity breach emergency response plan? What are the potential consequences for organizations a crisis communications team and a plan? Research Remember, cybersecurity technology generally has a very short lifespan. Therefore, research material should reflect such life. This means the majority of the reference list on the paper should be no more than five years old. That is, technical academic references older than five years (with the exceptions of theoretical underpinnings sources) should be used sparingly.Tasks Write an overview of 1-2 pages introduction paper explaining what is currently happening. the paper should address the following questions: What are ransomware attacks? How are ransomware attacks occurring in hospitals? What are the costs and impacts of ransomware attacks on hospitals? What are some key statistics and trends about ransomware attacks on hospitals?
[SOLVED] Biometrics Access Control Systems
Research how the U.S. Department of Homeland Security is testing the privacy impact of Biometrics Access Control Systems and evaluate the appropriateness based on your perspective.
[SOLVED] Strategic Planning Process
Consider your own company or one that you know well. What are the strategically relevant factors for the industry and your company within this macro-environment? What strategic moves are rivals likely to make and why? What factors are driving changes in this industry and why? Keeping in mind the role that interpreting environmental factors will play in analyzing a case, what do you see as the most important external data you would want this organization to have in any strategic planning process, and why? How does this discussion board relate to our coursework this week?
[SOLVED] Enterprise Network
You are a network security consultant and have been hired by a manufacturing firm, Vandelay Industries, to help them secure their enterprise network. Each item below was requested by Vandelay’s executive management and small IT team. Assume that the company has nothing in terms of security as you approach recommending solutions in these areas. Also, assume that money is no object, so don’t worry about how much something costs but be within reason in the context of the company’s details below. In other words, they’re not a Bank of America with a 300 million dollar information security budget. Vandelay’s requested milestones: Prevention and detection of phishing messages. Defence of workstations and servers (aka endpoint defence). Top five operating system hardening techniques for Windows workstations. Network defence and security monitoring. Best practices for protecting sensitive systems & information within AWS. Network architecture recommendations to prevent ransomware and destructive malware outbreaks. Aggressive monitoring on a small group of servers containing highly sensitive information. Physical security recommendations for both facilities. Vandelay corporate information and network details: 375 employees, two locations – an HQ building and one distribution facility nearby (pictures attached of each building). Employees use Windows workstations. Vandelay’s full system fleet has a mixture of Windows workstations, Windows servers, and Linux/Unix servers. Vandelay utilizes Microsoft O365 for email, productivity, cloud storage etc. Vandelay utilizes AWS for their corporate website in addition to several applications such as inventory tracking, logistics, customer orders etc. You don’t need to go extremely deep, but pitch recommendations that are well-thought-out and make sense for this company.
[SOLVED] Independent Experimental and Paired Design
an argument against the use of single-sex classrooms. Justify your position. Consider the effect on individual learners (educationally, psychologically, and sociallyin the present and in the future of the individual), as well as the effect on society. Consider schooling at all levels: elementary, middle school, high school, and college.
[SOLVED] Polypharmacy
Purpose The purpose of student discussions is to provide the opportunity for a deeper understanding of polypharmacy Activity Learning Outcomes Through this discussion, the student will demonstrate the ability to: Summarize the different polypharmacy definitions found within the literature. Discuss polypharmacy risk factors. Explain the actions steps for polypharmacy prevention Provide an example of how your clinical preceptors have addressed polypharmacy.
Use Promo Code: FIRST15