Category: Computer Science homework help

  • Title: Exploring the Most Interesting Standard or Organization in Information Systems Security The field of information systems security is constantly evolving to keep up with the ever-growing threat landscape. As a result, several standards and organizations have been established to provide guidelines,

    APA FORMAT 200 WORDS WITH REFERENCES AND CITATION. no plagiarism no ai no chat gpt
    Of all the standards and organizations listed in Chapter 13 in the book Fundamentals of Information Systems Security, which one did you find the most interesting.  Do a little research and tell us a little more about it, in your own words.    

  • Title: Non-Determinism in Real-World Scenarios

    APA FORMAT 250 words with References and Citations no plagiarism no AI no chat gpt
    Can you think of a Real-World example of Non-Determinism?   By that I mean an example of something that can happen with more-than-one outcome from “state 1” given the occurrence of “condition A”  (single condition occurs…but somehow – multiple outcomes then also occur)???

  • “Agile vs. Waterfall: Choosing the Right Process for our Semester Project” Agile vs. Waterfall: Choosing the Right Process for our Semester Project Introduction The process of software development is a crucial aspect of any project, and choosing

    For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think will work better in our project this semester – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding class project tasks that have to be completed and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
    Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

  • Title: “Securing the ACME Yearbook Company’s Internet-Based Product: A Cryptographic Implementation”

     
    IT543-4: Design an implementation of cryptographic methods for an organization.
    Assignment Instructions:
    This assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:
    The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and design the school’s yearbook, including the ability to import additional photographs and lay out each yearbook page. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each yearbook page.
    Note: Their previous product used CD ROMSs, and there was no Internet access for development, viewing, or purchase.
    The company uses this data set to produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record-keeping or for direct sale to students to accompany their hard copies.
    The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.
    The Internet-based product should include the following additional features:
    Allow all yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
    Allow the desktop product to be used to edit the yearbook and any new Internet version of the product.
    Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
    Allow people to purchase copies of the completed yearbook using a credit card.
    Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also, make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.
    Security concerns include:
    Licensing of the application client on school PCs.
    Security for the output designs on the cloud and on CDs.
    Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
    Online purchasing of electronic copies of yearbooks.
    Communications security.
    You must do the following:
    Identify and list RISKS to be addressed.
    Design a solution or a solution set.
    You do not have to address all of the items below, but here are some possible topics to consider:
    Email
    Remote access (VPN)
    Whole disk encryption
    Encrypted flash sticks
    E-commerce transactions
    Database encryption
    Use of hashes (e.g., for checksums, passwords, perhaps even credit card information)
    Cloud access security
    Digital certificates (at various levels)
    DRM for electronic copies of yearbooks
    Acceptable use policies regarding the use of company computers, personal computers, and perhaps even use of personal encryption
    Identify potential vulnerabilities with your proposed solution. (Note: Not all vulnerabilities can be solved with encryption.)
    Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.
    Your design should take into consideration the data storage, data processing, and data communication needs of the system.
    It is anticipated that the length of the paper will be 10–12 pages.

  • Title: Implementing Two-Factor Authentication for the Enterprise Architecture Repository Development Project

     
    The Enterprise Architecture Repository is an online, web-based platform designed to store and organize Enterprise Architecture artifacts produced by EA software tools. You work as a developer for CMS and want to protect the security of the organization. You have developed a level of trust with the development team, and they see that your skills and personality are a match to their organization. Now they have requested your opinions on this application development project.
    Your research has shown that many organizations have formulated methods to implement greater security principles by incorporating two-factor authentication.
    Develop a proposal that will incorporate two-factor authentication for this development project. You have already had a plan to create an internal certificate and use this as the two-factor check for any devices that have already authenticated once.
    Please be sure to include the following into your documentation:
    Recommendation of why an updated certificate is needed and your rational for your recommendation.
    Description of two-factor authentication and how it is becoming more widely used within the industry.
    Explanation of the plan for two-factor authentication in the first login. Include screen shots within this section as proof of how this will work. Then include a brief explanation of how an internal certificate will be used thereafter for that device.