Do you think the NSA’s powers should be checked when it comes to privacy? Do you think the NSA protects the national security interests of the country and its people and should be given the authority to do so?

Cryptography & NSA

Read the following article on NSA cryptography.

In 2-3 paragraphs explain what YOU think the NSA’s code should be when it comes to code breaking and code making. Do you think the NSA’s powers should be checked when it comes to privacy? Do you think the NSA protects the national security interests of the country and its people and should be given the authority to do so?

Develop an understanding of data structures and programming techniques in context of a programming language.

The assignment is given as three separate tasks. Each task is to be
answered individually. Task 1 has been written and designed to check your knowledge
and understand of data structures and programming techniques, including pseudocode.
Task 2 checks your knowledge and understanding of Algorithms and arrays, in order for
you to put given integers in the correctly stated order. Task 3 gives you the opportunity to
write an extended code, once the initial pseudocode has been written. This particular task
will check your knowledge and understanding of loops and IF statements.
Note:
The code that you write in order to complete all three tasks will be documented in two ways. The first being screenshotted evidence within your submitted word document, with detailed reasoning and justification for your processes. Secondly, your written code for each task that you have screenshotted, will be copy / pasted into the appendices at the end of your submission, so it can be checked for validity within the software.

Learning outcomes:
After completing the modules you should be able to:
• Develop an understanding of data structures and programming techniques in context of a programming language.
• Demonstrate an understanding of how programs are developed i.e. from concept to development and testing.
• Demonstrate an ability to write programs using appropriate structure and language rules

Critically analyze it through the four general education lenses: history, humanities, social sciences, and natural and applied sciences.

Analyzing an Issue or Event in Technology through the Lenses of History and the Humanities

For the first part of your final project, the critical analysis portfolio, you will select an issue/event of technology and critically analyze it through the four general education lenses: history, humanities, social sciences, and natural and applied sciences.

By viewing the issue/event through these lenses, you will gain insight into how the interconnected nature of technology affects society as well as both your own individual framework of perception and the choices, attitudes, and behaviors of others in the world around you.

Provide a presentation to the team members on how to install and configure Windows 10. The presentation should include how to improve the firm’s backup and recovery process using Windows 10 tools.

Your proof of concept was well-received by the client, Tetra Shillings Accounting. The firm has accepted your company’s plans. The client has a small IT team, and the members have limited knowledge of Windows 10. It will be up to you to provide a presentation to the team members on how to install and configure Windows 10. The presentation should include how to improve the firm’s backup and recovery process using Windows 10 tools, as well as best practices and screenshots from the VM you created for the proof of concept.

Procedure to Recover a Restore Point: Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Identify at least 5 potential causes of network failure.For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure.

For this assignment, you will develop a Fault Tolerance Plan section to add to the overall Network Improvement Plan document.

Fault Tolerance Plan
Identify at least 5 potential causes of network failure.
For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure.

Include the cost and benefit comparison for each risk reduction plan to justify the plan.

How many instructions will be executed for your code in Q1 without optimisation?

The coursework consists of one program with three questions to answer: Q1, Q2 and Q3. You should compile your answers to Q1, Q2 and Q3 and related discussion in a document to submit to Canvas. Please add a front page to the document showing your name, student number, module title and code, and assignment title.

The C program shown in the Appendix will add the coursework array marks to the exam array marks and store them in the results array. Assume the number of students is 10. The program will then increase the marks in the results array if half of the students fail. Note that CURVE is a function called by the main program. Finally, the program will create counters for the number of students with a result >= 70, >=60, >=50 and < 50.

Q1 Use the MIPS instruction set and the MARS MIPS simulator to:
Write the equivalent MIPS assembly code for the C-code shown above. Remember to add comments to your assembly code.
Test the assembly code program via the MARS MIPS simulator.
Show the assembly code and all test results of running the assembly code in the report.

Q2    Consider the basic MIPS 5-stage pipeline.  Assume that there is full forwarding and branch not taken.

Show the pipeline execution table of your code from Q1.
Based on the pipeline execution table, does your solution in Q1 have any pipelining hazards?
If yes, then list these hazards and show how these hazard(s) can be resolved by rewriting the code you produced in Q1. You should test the rewritten code and provide the new code and the results in the report.
If your code from Q1 does not have any pipeline hazards, discuss why this is the case and how did you resolve the pipeline hazards issues in Q1.

Q3   Performance measurement.
How many instructions will be executed for your code in Q1 without optimisation?
Optimise using inline expansions and loop unrolling to use a minimum number of instructions in to run your assembly code and explain the methods done.
How many instructions will be executed for your code with optimisation conducted?

Appendix

Provide an excellent report of the incident details as required by the NIST template.

IT: Project #1 Incident Response Report – Part A: Incident Response

Incident Report Part A: Assignment #1 Requirement

Provide an acceptable title page for the file. Provide a complete section 1 of the Incident Report Form that included realistic but fictionalized data for all of the following fields:
Provide an excellent report of the incident details as required by the NIST template. Responses for all items must be clear, concise, and reflected the analysis of the Blue Team with additional contributions by this student.
Provide an excellent report of the incident causes using information reported by the Red Team  and additional analysis performed by the Blue Team and this student. Appropriately use information from the Sifers-Grayson Overview and Enterprise Architecture diagrams. Reporting of analysis must be clear, concise, and reflected the analysis of the Blue Team with additional contributions by this student.
Provide an excellent analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis must be clear and concise. Include information from the Blue Team and supplemente it with additional analysis by this student.
Provide an excellent discussion of the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson . Include information from the Blue Team and supplemente it with additional analysis by this student.

Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

TCP/IP Addressing and Management
Document an addressing scheme for the TCP/IP addresses used for the network.
Include categories of network resources, users, and the address ranges to be used for the current and potential future resources and users.
Provide justification for the addressing scheme.
Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

Develop a decision tree that can be used to solve Chang’s problem. You can assume in this part of the problem that she is using EMV as a decision criterion. Build the tree so that she can enter any values for p1, p2, and p3 and automatically see her optimal EMV and optimal strategy from the tree.

Read Case 6.3: Electronic Timing System for Olympics on pages 275-276 of the textbook. For this assignment, you will assess and use the correct support tool to develop a decision tree as described in Part “a” of Case 6.3. Analyze and apply the best decision making process to provide answers and brief explanations for parts “a”, “b”, “c”, and “d”. The answers and explanations can be placed in the same Excel document as the decision tree.Develop a decision tree that can be used to solve Chang’s problem. You can assume in this part of the problem that she is using EMV as a decision criterion. Build the tree so that she can enter any values for p1, p2, and p3 and automatically see her optimal EMV and optimal strategy from the tree.
If p2 = 0.8 and p3 = 0.1, what value of p1 makes Chang indifferent between abandoning the project and going ahead with it?
How much would Chang benefit if she knew for certain that the Olympic organization would guarantee her the contract? Assume p1 = 0.4, p2 = 0.8, and p3 = 0.1
Suppose now that this is a relatively big project for Chang. Therefore, she decides to use expected utility as her criterion, with an exponential utility function. Using some trial and error, see which risk tolerance changes her initial decision from “go ahead” to “abandon” when p1 = 0.4, p2 = 0.8, and p3 = 0.1.

In your Excel document,

Develop a decision tree using the most appropriate support tool as described in Part a.
Calculate the value of p1 as described in Part b. Show calculations.
Calculate the possible profit using the most appropriate support tool as described in Part c. Show calculations.
Calculate risk tolerance as described in Part d. Show calculations.

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

Software Engineering, CMMI, and ITIL

IT managers will commonly manage software development and systems integration activities. Write a 3–5 page paper in which you:

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

Analyze the CMMI levels and define a road map that the organization will need to follow to get their software development processes to CMMI level 3. Note: This is important because the CMMI level that an organization achieves impacts their software development reputation.

Explain the auditing tasks that must be performed in order to achieve level 3.

Determine the continuous assurance auditing activities that the organization will need to implement to help achieve CMMI level 3.

Analyze the ITIL service management guidelines and principles.

Examine how ITIL service management practices relate to CMMI levels and continuous service auditing.

Use at least three quality resources.