how DHS should handle the situation described in the preceding paragraph.

Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.Post should be 300 words or more. No plagiarism, also attached the textbook for referring the chapter.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Assignment 2: Best Coding Practices CIS 542 Kesha Gray

Assignment 2: Best Coding PracticesDue Week 9 and worth 215 pointsYou have been promoted to manager for the e-Commerce site for the company you made up in Assignment 1. You are concerned about the recent SQL attack. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the Website and database to be compromised by a SQL injection attack.Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all of the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.For Part I, you’re going to write a memo to the CEO and CSO documenting your guidelines based on your findings when you evaluated your company’s processes.Justify why it is less expensive to build secure software than to correct security issues after a breach.Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing your thoughts into your existing processes.Identify three resources that can be used as “reference material” and act as a beginner’s guideline for new employees. Outline the importance of each resource and how each resource can assist new coders.Use at least four quality references in this assignment. Note: Wikipedia and similar websites do not qualify as quality references. Be sure to CITE your sources with complete functioning Web links. Test the links to ensure they work before submitting your paperFormat your assignment according to the following formatting requirements:Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.Include a reference page. Citations and references must follow professional business language format.Part II: PowerPoint PresentationCreate a PowerPoint presentation for your team in which you:Outline the all of the major aspects of the Best Practice Coding guideline, including objectives, purpose, resources, and methodology. Note: Please include your fictional company’s name on each slide of your presentation. Remember, you’re planning on using this experience when you take what you’ve learned out into the real world.The specific course learning outcomes associated with this assignment are:Analyze common Website attacks, weaknesses, and security best practices.Describe the attributes and qualities of secure coding practices and the tools used to conduct security verification.Analyze the role and importance of quality assurance testing for Web applications using a security lifecycle.Use technology and information resources to research issues in securing Web-based applications.Write clearly and concisely about Web application security topics using proper writing mechanics and technical style conventions.Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the followingrubric.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Corey’s Home wk 1 CMGT/582

Part A: Ch. 10 Role Playing Sim: Vampire LegendsIn this role-playing simulation, you will be the acting CIO and will specifically work on the strategy and the budget of the game Ancient Age, the sequel to Vampire Legends. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.Using the Vampire Legends Access link, complete the interactive before moving to Part B.Part B: Memo to CEOWrite a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts:Part 1: Analysis of Components of Information Security that does the following:Categorizes the components of information securityAnalyzes the components of information security as it applies to the scenario presented in Vampire LegendsContains a breakdown of the budget reportDiscusses your allocation strategy based on the risks and expenses involvedDescribes your choice for the best advertising campaignOutlines the course of action in handling information security threats in the futurePart 2: Role of Ethics that does the following:Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organizationDescribes the consequences of the conflictDiscusses the solution to the conflictDiscusses the impact of ethics on revenueNote: The title page and reference page do not count toward the assignment length requirement.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

PHD written interview

PhD candidates should provide an authentic personal statement reflecting on their own personal interest. In the event that any outside resources are used, those should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. Applicants must answer each of the four prompts for their program.PhD ITWhat are your research interests in the area of Information Technology? Why are you inspired to research in this area, and why do you think it is important to research in this area?Why did you select PhD in Information Technology? Why did you select University of the Cumberlands?As an individual, what are your strengths and weaknesses and how will they impact you as a PhD IT student?Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology from UC?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Unit 6 Reflection Paper: E-Commerce

Please see all attachments before acceptingPlease follow Instructors assignment directionsPlease Please Please no PlagiarismPlease Use Proper and Correct citations.  APA formatting and complete accurate citationsPlease DO NOT SEND ANOTHER STUDENT’S COMPLETED WORK

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Chapter 3 discusses methods to assess the quality of simulations

Quality of Simulation PaperChapter 3 discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.Suppose  you lead a task force that is developing a simulation to provide  strategic planning recommendations for property use zoning for a county  of 750,000 residents. The zoning board and county commissioners want a  simulation that allows them to assess the impact of various zoning  decisions based on a variety of dynamic factors, including  age, race, education, and income status. Which of the three views  discussed would provide the best quality assessment for this type of  simulation? How would you ensure the highest level of accuracy with your  simulation, and how would you go about determining accuracy?Please create a 3-page paper (3-page main body, does not include the title page or references page), APA formatted the answers the following question:As  indicated above, identify which of the three views discussed in the  chapter that would provide the best quality assessment for the situation  described above, and explain your decision. How would you ensure the  highest level of accuracy with your simulation, and how would you go  about determining accuracy?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Information Systems Discussion-1

Discussion activity for Management Information Systems class.1 Page.APA STYLENO PLAGIARISMI need ORIGINAL work only.Please, find the attached file for instructions.You will need to delete the answer file after I download it.I need it in 7.Thank you

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Discussion: Writing Exercise #3 – Reading and Writing for a VBM Literature Review

The work of a literature review can inform a scholar’s entire research project. From past scholarship, researchers often derive and refine key concepts, hypotheses, sampling strategies, analytical techniques, solutions to ethical dilemmas, and other helpful ideas, and practices.Despite their wide-ranging impact, literature reviews are often associated with the introductory sections of a journal article—everything after the abstract and before the methodology section—because that is where scholars summarize prior research and explain how their article will add to it. In these introductory sections, much gets accomplished. Researchers expertly distill key points from the dozens or hundreds of prior studies that they have read; they identify competing perspectives, uncover important contradictions or disagreements that need to be resolved, and show the connections (and disconnects) between disparate studies—studies that may have been conducted decades apart by scholars in different disciplines and subfields. (Harris, 2014, p. 38)The reading for this week focuses on literature reviews. You have likely encountered this component of scholarly research in your previous educational pursuits, but the importance and significance of the literature review in a doctoral program cannot be overstated. Locating and becoming acquainted with the body of research that exists on your topic is an essential skill for successfully completing this program.  Moreover, your ability to write a literature review masterfully can convey to the readership your selective and interpretive treatment of prior works in a written form representing a meaningful and credible critique.For this writing exercise, you will complete (a) a literature review scavenger hunt—as detailed in the textbook How to Critique Journal Articles in the Social Sciences, (b) a working bibliography, and (c) an annotated bibliography. The aim is to give you an opportunity to conduct a literature review and practice using two means that are beneficial for collecting literature information. When done well, the literature review can later draw on the findings included in the working bibliography and or the annotated bibliography.Upon successful completion of this discussion, you will be able to:Integrate the Virtuous Business model into their reading, research, writing, and reporting.Background InformationWorking BibliographyWhat is a working bibliography? A working bibliography includes the sources that you discover in your initial inquiry into a topic. It is your first step after deciding on a preliminary topic for a paper. The working bibliography includes all sources that you discover as you begin your research. They may not all be used in your final writing as the focus of your paper can change, you may find duplication of what sources are saying, you may find too many sources. (Creating a Working Bibliography, n.d., para. 1)Annotated BibliographyWhat Is an annotated bibliography? An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief (usually about 150 words) descriptive and evaluative paragraph, the annotation. The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited.Annotations vs. AbstractsAbstracts are the purely descriptive summaries often found at the beginning of scholarly journal articles or in periodical indexes. Annotations are descriptive and critical; they may describe the author’s point of view, authority, or clarity and appropriateness of expression.Creating an annotated bibliography calls for the application of a variety of intellectual skills: concise exposition, succinct analysis, and informed library research.First, locate and record citations to books, periodicals, and documents that may contain useful information and ideas on your topic. Briefly examine and review the actual items. Then choose those works that provide a variety of perspectives on your topic.Cite the book, article, or document using the appropriate style.Write a concise annotation that summarizes the central theme and scope of the book or article. Write a concise annotation that summarizes the central theme and scope of the book or article. Include one or more sentences that (a) evaluate the authority or background of the author, (b) comment on the intended audience, (c) compare or contrast this work with another you have cited, or (d) explain how this work illuminates your bibliography topic. (How to Create, n.d., paras. 1–3)Literature ReviewA literature review is a document or section of a document that collects key sources on a topic and discusses those sources in conversation with each other (also called synthesis). The lit review is an important genre in many disciplines, not just literature (i.e., the study of works of literature such as novels and plays). When we say, “literature review” or refer to “the literature,” we are talking about the research (scholarship) in a given field. You will often see the terms “the research,” “the scholarship,” and “the literature” used mostly interchangeably. (Writing a Literature Review, n.d., para. 1)ReferencesCreating a working bibliography. (2021). OCLS. Indiana Wesleyan University.https://ocls.indwes.edu/ld.php?content_id=64326262(new tab)APA annotated bibliography. (n.d.). OCLS. Indiana Wesleyan University.https://ocls.indwes.edu//ld.php?content_id=62397563(new tab)Writing a literature review. (n.d.) Purdue Online Writing Lab. https://owl.purdue.edu/owl/research_and_citation/conducting_research/writing  (new tab)InstructionsReview the rubric to make sure you understand the criteria for earning your grade.Read Chapter 4—Literature Review in How to Critique Journal Articles in the Social Sciences.Select two articles for use in this assignment. You my use an article from a prior exercise in this course, or you may select articles that will support the completion of writing the popular article in this workshop.Access and read How to Read a Book [or Article] in 10 Minutes(new tab) which informs how to expedite reading.Access and read How to Write a Literature Review(new tab).Download the document Example Working Bibliography(PDF document).Download the document Outline for Working Bibliography(PDF document).Download the document Example Annotated Bibliography(PDF document).Download the document Outline for Annotated Bibliography(PDF document).Working Bibliography. Select one of the two articles (Article 1 or Article 2) to complete a working bibliography per the example document.Annotated Bibliography. Use the remaining article to complete an annotated bibliography per the example document.Format the working bibliography and annotated bibliography like the examples provided.Use Grammarly to edit your discussion post, classmate response, and writing exercise content before submitting.Use APA for all citations and references in the uploaded documents and the discussion forum postings.Upload the working bibliography and the annotated bibliography to the post as two separate Word documents.Use Grammarly to edit submissions.Submit the initial discussion post by Day 5 of the workshop.Read and respond to at least one of your classmates’ postings and any follow-up instructor questions directed at you by the end of the workshop. When responding, utilize at least one of the following ways to engage in scholarly dialogue:Extension: Expand the discussion.Relevancy: Relate the topic to a current event.Exploratory: Probe facts and basic knowledge.Challenge: Interrogate assumptions, conclusions or interpretations.Relational: Make comparisons or contrasts of themes, ideas, or issues.Diagnostic: Probe motives or causes.Action: Identify application or an action in personal or work life.Cause & Effect: Cite causal relationships between ideas, actions or events.Hypothetical: Pose a change in the facts or issues.Priority: Seek to identify the most important issues.Summary: Elicit synthesis

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

5-page short essay on the failure of healthcare.gov initial launch from the Systems Analysis and Design perspective

Hi,- Will be using Turn It in, Must be 100% original work.- 5 pages, double-spaced, follow outline below, add table of contents (6th page)- $20 offers only, all other will be rejected.——————————————————————————————–You will write a 5-page short article on the failure of healthcare.gov initial launch from the Systems Analysis and Design perspective (e.g. take a look at the table of contents of the text book. Essentially you can address its failure for each chapter in the text book. You need to identify the most significant causes of its failure.)Outline:(1) OverviewTell us some background of the Affordable Care Act (ACA) and its mandates(2) Identify the scope. highlight the main points.(3) Vendor selection How the general contractor was selected?(4) Development Strategies, Architecture, Testing, and Deployment Issues What strategies did they pick? Who are “they”?(5) Early Warning Signs of Failure – Where was the Management “The Emperor’s new clothes”?(6) Lesson Learned and Concluding Remarks List 3 major causes you identified above that are fatal errors.Here are some resources to get you started, try to utilize them. Otherwise, use credible sources!book: attached.http://www.cio.com/article/2380827/developer/developer-6-software-development-lessons-fromhealthcare-gov-s-failed-launch.htmlhttps://www.brookings.edu/blog/techtank/2015/04/09/a-look-back-at-technical-issues-with-healthcare-gov/https://www.theverge.com/us-world/2013/12/3/5163228/healthcare-gov-obamacare-website-shows-how-government-can-do-tech-betterhttps://www.bloomberg.com/news/articles/2013-10-16/why-the-obamacare-website-was-destined-to-bomb1 – Office of Inspector General, HealthCare.gov: CMS management of the federal marketplace: a case study, Available at: https://oig.hhs.gov/oei/reports/oei-06-14-00350.pdf [Accessed November 18, 2016].2 – Goldstein, A., 2016. HHS failed to heed many warnings that HealthCare.gov was in trouble. Washington Post. Available at: https://www.washingtonpost.com/national/health-science/hhs-failed-to-heed-many-warnings-that-healthcaregov-was-in-trouble/2016/02/22/dd344e7c-d67e-11e5-9823-02b905009f99_story.html [Accessed November 18, 2016].3 – Healthcare.gov. Wikipedia. Available at: https://en.wikipedia.org/wiki/Healthcare.gov [Accessed November 18, 2016].4 – Johnson, C. & Reed, H., 2013. Why the Government Never Gets Tech Right. The New York Times. Available at: http://www.nytimes.com/2013/10/25/opinion/getting-to-the-bottom-of-healthcaregovs-flop.html [Accessed November 18, 2016].https://oig.hhs.gov/testimony/docs/2016/bliss-testimony-032016.pdfhttps://search.proquest.com/docview/1708019028?pq-origsite=gscholar

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

HealthOne Medical Database

This will include your models, SDLC and Project Management Requirements.See attached document.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"