The Importance of Investing in an Identity Governance and Administration Solution to Combat Insider Threat

 

Identity Governance and Administration Solution

Write a 3 to 5 paragraph briefing paper that identifies and explains the three most important reasons why Sifers-Grayson should invest in an Identity Governance & Administration solution to help combat insider threat.

Your audience is a mixed group of managers from across Sifers-Grayson’s operating areas (company HQ’s, Engineering, Finance & Accounting, Program Management, Sales & Marketing). Some of these managers are familiar with the importance of separation of duties and least privilege but most are not. One or two of the managers might know the definition for RBAC. Your briefing paper needs to address these information needs as well as discussing why information should be labeled as to its sensitivity (“classification”) and ownership.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

Artificial Intelligence: Transforming the Future

Provide a small 10 slide powerpoint on a technology topic of your choosing. you will over the years be tasked to create a powerpoint either for a prsentation to colleagues or in front of management

-at least 10 slide
– make sure to include cover slide and works cited slide
-images there should be at least be three images accompanying your slides, that are relevant to your topic
-transitions the ppt swill have transitions
– theme the ppt will have a chosen theme
-the ppt will have a notes area with ate least 1 slide with notations

Possible topics

-Virtual reality
-Augmented reality
-PC hardware
-PC software
-RAM
-CPU
-Gaming culture
-Social media and culture
-Artificial intelligence
– How To’s based on some tech,cyber crime and security,etc

 

 

 

Creating a Secure Wireless Network at International Plastics, Inc.

You are part of the networking team for a plastics manufacturing company, International Plastics, Inc., reporting to the director of IT infrastructure.

The director gave you an assignment to create detailed technical plans for the creation of a secure wireless network at the corporate offices only.

The wireless network must meet the following criteria:
• Cover the entire campus with no loss of connectivity when moving from one area to the next.
• Comply with all Federal Communications Commission (FCC) regulations.
• Be fast enough for employees to complete normal business activities while using wireless connectivity.
• Be cost-effective—the organization wants costs to be minimized while still meeting the other requirements.
• Be secure—due to client contractual terms, the wireless network must be secure and prevent man-in-the-middle attacks.

Write a 1- to 2-page report for the director of IT describing the requirements you are considering as your team implements the wireless network. Include the following:
• Design requirements that must be addressed
• Justification to use different frequencies, channels, and antennae in the installation
• Regulatory requirements to consider in implementation
• Security requirements

Create a 1-page table summarizing possible frequency choices. Include an explanation of the strengths and weaknesses of each.

 

Designing a Data Storage System for IoT in a Smart Factory Setting

 

Data Processing for IoT
The Internet-of-Things (IoT) will be one of the backbones of future smart factories and advanced cyber-physical systems. One of the cornerstones of the IoT is the collection and recording of a wide range of sensor data to be used in data-driven analytics approaches. Choose a specific setting (e.g. a steel mill casting steel, a factory assembling cars from components) and design a data storage system that captures relevant data in a dedicated data store. Explain which type, amount, and velocity of data will be captured, as well as specific requirements for processing sensor data. Explain your assumptions and design choices.

 

Polynomial Calculation

 

1. Consider the following polynomial with n terms, where ai is the ith coefficient:
P(x) =
n−1

i=0
aixi = a0 + a1x + a2x2 + … + an−1xn−1
Below is pseudocode of a naive algorithm that calculates P(x) for some input x:
1 Function pow(x, i):
2
// x is a number, i is an integer, returns xi
3
exp := 1
4
p := 1
5
while p ≤ i do
6
exp = exp ∗ x
7
p += 1
8
return exp
9 Function calculatePoly1(x, a, n):
10
// x is a number, a is a list of numbers, n is the length of a
11
sum := 0
12
i := 0
13
while i < n do
14
sum += a[i] * pow(x, i)
15
i += 1
16
return sum
(a) (4 points) Prove a tight bound for the runtime complexity of calculatePoly1 using summations.
(b) (4 points) Give a tight bound for the space complexity of calculatePoly1. Explain your
bound.
Assume that all integers and floats require the same, constant amount of memory.
Note: Unless otherwise specified, we ignore the space required to store the input arguments, since this will remain the same for all algorithms that solve the same problem.
(c) (10 points) Propose an algorithm calculatePoly2 with asymptotically better runtime
compared to calculatePoly1 and provide its pseudocode.
Give tight bounds for your algorithm’s runtime and space complexity.
Explain your bounds.
Your answer may not use a built-in exponentiation operator (like xˆn or x**n). You may
use other basic operators like addition, multiplication, etc.
2. For each of the following questions, briefly explain your answer.
(a) (4 points) If an algorithm’s best case runtime is Θ(n), is it possible that it takes Θ(n2)
time on some inputs?
(b) (4 points) If an algorithm’s best case runtime is Θ(n), is it possible that it takes Θ(n2)
time on all inputs?
(c) (4 points) If an algorithm’s worst case runtime is O(n2), is it possible that it takes o(n2)
time on some inputs?
(d) (4 points) If an algorithm’s worst case runtime is O(n2), is it possible that it takes o(n2)
time on all inputs?
3. (6 points) Prove the following bound using the inequality definition of O: 18n lg(n) + 2n2 =
O(n2)
4. (10 points) Consider all exponential functions of the form f(n) = kn, where k is a positive
constant.
Do there exist two exponential functions of this form with different bases (e.g. f(n) = 2n and
g(n) = 3n) such that their growth rates are asymptotically equivalent?
Prove your answer.
5. (10 points) Prove the property of transitivity for O: For any two asymptotically non-negative
functions f and g, if f(n) = O(g(n)) and g(n) = O(h(n)), then f(n) = O(h(n)).
6. (25 points) Order the following functions from least to greatest growth rate, such that for any
two functions f and g, if f comes before g, then f(n) = O(g(n)). You must prove each
ranking.
For example, if the functions were f, g, h and you gave the order g, h, f, then you would need
to prove that g(n) = O(h(n)), g(n) = O(f(n)), and h(n) = O(f(n)).
• f1(n) = √n
• f2(n) = nn
• f3(n) = n0.00001
• f4(n) = n!
• f5(n) = lg(n)

 

The Dark Side of the Internet: Identity Theft and the Deep Web

Have you or anyone you know ever been a victim of identity theft? If so, explain how it happened and the outcome. If not, do a bit of research and fully describe a particularly damaging instance of identity theft. Do you or anyone you know have any experience with the Deep Web and/or buying and purchasing with BitcoinLinks to an external site. or other “Cryptocurrency”? If so, explain the process of buying bitcoin, purchasing with bitcoin and cashing in bitcoins. If not, do a bit of research and fully describe a criminal endeavor that involved the Deep Web and/or bitcoins.

Before addressing this week’s discussion, view the following videos regarding identity theft and online fraud.






The Equifax Data Breach: Impact, Recovery, and Government Initiatives

 

We have all read or heard about breaches in privacy in many corporations over the past few years.  Cybercrime is on the rise and organizations must examine and identify challenges faced in managing information about key stakeholders, including employees and customers.
Research a recent cybercrime attack on a company (within the past 5 years) and briefly discuss this event.  What was the impact on stakeholders?  How did the company recover post-attack?
What efforts are being made by national and international governments to combat cybercrime?
*References should be provided in this discussion based on your research*
Initial post and peer replies should be thorough and substantial for full credit.  A solid initial post should be between 250-300 words. Two scholarly sources for support are required for maximum point potential.