Project Part 5 Modules
Modify the pseudocode design that you created in ITP 100 Project Part 4 to include at least the following modules.
studentID to Enter the Student ID
calcBill to Calculate the Bill
prtBill to Print the Bill
After the student has finished entering the course titles, the system will calculate and print the bill.
Create a hierarchy chart for the modules. Save the hierarchy chart as ITP100Project-Part4-Hierarchy-LastName.doc
Save the pseudocode design using the filename ITP100Project-Part4-LastName.doc
Submit for a Grade:
Upload the files ITP100Project-Part4-Hierarchy-LastName.doc and ITP100Project-Part4-LastName.doc file to the ITP100_Project_Part4 file upload area.
Grading:
The project is worth 10% of your final course grade.
Please review the following for this week as well as All Week 8 Online Course Materials:
NIST SP 800-82 Rev. 2, Guide to Industrial Control Systems (ICS) Security, May 2015.
View the following video:
https://www.youtube.com/watch?v=2jbFOCcvEJk&feature=youtu.be&t=4
------------------------------------------------------------
Final Exam
Question 1 (2 pages)
1. (a) In the NIST Cybersecurity Framework, the Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. It presents key cybersecurity outcomes identified by stakeholders as helpful in managing cybersecurity risk. What are elements that comprise the Core? (Answer: Identify, Protect, Detect, Respond, and Recover)
(b) Provide a brief description of each of these elements.
(c) The cybersecurity Framework also incorporates Implement
e researching on is LI Script. It is in Long Island, Syosset. It is a pharmaceutical company it provides pharmaceutical care for residents of skilled nursing and other long-term treatment facilities on Long Island. LI scrips Pharmacy goals to achieve the best customer satisfaction to exceed their expectation. LI scrips have given its customers the best services and have best management system. People consider this company because it has the best customer service, cost-saving opportunity and technology. LI Scripts was opened in September 2009 and originated as a response to a serious need for dramatically improved pharmacy services. Since 2009 company of 4 people has grown to a multi-million-dollar business. In this business company currently, 125 employees are employed.
The Director of the Company is Michael Shamalov. Before opening this company, Mike worked on the units with the nurses in the facility. During that time, he learned what the nurses need for their patient, from
please follow along with the attachment I have provided, everything you need to know will be in that document. The topic is essentially whichever you choose, as all you have to do is examine causes of a problem, but again, please refer to the attachment. Thank you.
1. How does the group work and how it is organized.
2. Where do the biggest skills stand of this group.What are the most succesful cases till today.
3. Identify the preventive tools that you need to have given the managment aspect, organization and technology of a company that offers products/online services
People use our public infrastructure and there is a need for data exchange (ex. Is a specific bridge safe to cross). Research and write a 2000 word paper describing security mechanisms That must balance the trade off Between openness of data exchange and safety of public infrastructures
-- How are these literature reviews organized?
-- How do the authors group and present the literature?
-- How do the authors go about analyzing and critiquing the literature?
-- Do they establish relationships among the literature? How?
-- Do they point out opportunities for future research?
from the yahoo article discuss the following:
from http://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html?_r=0
What breach did you select?
What is the background of the attack?
Was the breach detected right away?
How much time (approximately) went by before the breach was discovered and reported?
Did the victim organization determine the extent of the breach? If so, explain.
What was the response? (Think about the various types of response and comment Political/Diplomatic/Legal, Technical, Corporate).
Finally, when considering response and recovery, it can be important to understand how to address security flaws. Cryptography is important but can be difficult to implement. There are also ways to bypass authentication. Select two flaws from the article below and discuss how to avoid them. Do you have any recommendations regarding the attack you selected?
Respond to the following:
Select topic on incident response from the documents above and do a SWOT analysis of the topic(s).
Describe and explain why the topic(s) is/are an important component of incident response?
Are there challenges that should be considered in regard to implementation of the topic?
Assess what makes a proposal more challenging to write than other forms of technical writing covered in this course.
Think about how considerations such as organization, professional tone, readability, relevance, and so on may need to be approached differently in a proposal compared to other forms of technical writing.
Determine when you might present an informal proposal as an e-mail. Provide an example to illustrate your point.