This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system.

Question Description

1) This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario:The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

  • Proper APA Format
  • Must be original no palagarisim
  • Title page
  • Abstract
  • Body (in-text citations)
  • Conclusion
  • References (3 min)

2) Discussion:

From the Research Paper share the types of countermeasures you discovered.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyberattack from occurring.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

Question Description

Question1: Paper

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario:

The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

  • Proper APA Format
  • Title page
  • Abstract
  • Body (in-text citations)
  • Conclusion
  • References (3 min)

Question 2 -Discussion:

From the Research Paper share the types of countermeasures you discovered.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyberattack from occurring.

Picot process

Question Description

Choose one (1) clinical scenario above, and answer the following questions:

  1. What is evidence-based nursing practice and why is it important?
  2. What is the PICO process?
  3. Formulate a well defined clinical question that will yield the most relevant and best evidence.
  4. Describe the background of the question
  5. Present the question using PICOT format
  6. Indicate what will be the best study to answer the clinical question.

Scenarios:

#1 A nurse in the PACU is interested in ways to decrease the use of pain medication in post-op patients. She’s wondering if classical music or guided imagery might be efficacious.

#2 A 17-year-old African American woman, just diagnosed with hepatitis B, has been taking acetaminophen for headaches. Her mother has heard that acetaminophen can cause liver problems, and she asks you if her daughter should continue taking the drug for her headaches, considering her hep-b diagnosis.

#3 You are on a hospital committee exploring best practices in inpatient oncology nursing. The first question to come before the committee is, “how can we improve patients’ sleep quality and quantity without resorting to sleep medication?” The committee decides to explore relaxation techniques (e.g., massage; music), noise reduction, bed/pillow comfort, and ambient temperature changes. Your assignment is to find the best practices to reduce noise levels on the unit.

#4 A 53-year-old woman with rheumatoid arthritis wants to possibly change her medication to short-term low-dose corticosteroids instead of NSAIDS, which are upsetting her stomach. Will the corticosteroids be as effective?

#5 Jeff, a smoker of more than 30 years, has tried to quit unsuccessfully in the past. A friend of his recently quit with acupuncture. He wonders if he should try it.

Just follow the instructions!

Question Description

  1. SUMMARY
  1. Adjust the code we did in class to do a recursive binary search on a sorted array of Strings instead of integers.
  1. This lab will involve the following new features:
    1. Recursion
    2. Binary Search Algorithm
  1. DETAILS
  1. These instructions will be more bare than usual since the source code from class is being provided and I want you to think through all the changes you need to make.
  1. Set up your String array.
    1. Instead of having a “for” loop populating your array with random numbers, go ahead and make your array 10 in length and populate it in 10 lines of code that put a different string in each array slot, such as:

asWords[0] = “Frank”;

  1. Change all references to the array and any references pulling values from the array to String type instead of int type.
  1. Adjustment to binary search method.
    1. Besides figuring out which things have to now become String type, you need to compare the string values a bit different than the integers by using the “equals” and “compareTo” methods.
      1. Example for equals check:
        1. Instead of…
          1. iTarget == …
        2. It’s this…
          1. sTarget.equals(…)
      2. Example for greater than check:
        1. Instead of…
          1. iTarget > …
        2. It’s this…
          1. sTarget.compareTo(…) > 0
            1. The reason you are seeing if the comparison is greater than 0 is because the “compareTo” method returns a number greater than 0 if sTarget is greater than the string that’s passed in the parentheses. If it’s equal, it returns 0 (but that won’t happen because the equals comparison was in the first if statement). And if it’s less than, it returns a number less than 0.
  1. You can remove, comment out, or update the traditional search method at the bottom of the code. It’s up to you.

Computer Science l

Question Description

A number of things can happen on a project.

Sometimes things line up and you make progress.

Sometimes you don’t for a number of reasons.

Sometimes you just didn’t have time.

Sometimes you chose to use your time on other things, such as passing classes, or on other things, like entertainment.

Every week you are given 168 hours.

I would like you to spend some of that time to provide yourself an honest assessment of how your project is going.

First, give an honest assessment of how much time you have spent on your project this week.

It might be helpful to use a spreadsheet to keep track of what you are doing and when. I usually like to keep track of my time in 15 minute blocks.

I also want you to identify the things that you plan to get done in the next week.

Finally, please address what your biggest concerns are for meeting your commitments to yourself.

Please maintain documentation.

If you did a google search, a YouTube search, watched a Lynda video, or read a book, please keep track of this in your weekly report.
• (10 points) Give an account of how much time you spent on this project
• (10 points) Give an account of what you spent your time doing.
• (10 points) What part of your project did you complete?
• (10 points) What part of your project will you complete next week?

• (10 points) What are your biggest concerns about your goals for next week
• (10 points) Cite any sources from the previous week

Example of a Weekly Project Update:

https://docs.google.com/document/d/11eEMNej2lLsrkcCmHgYJWbhRw5Ak-bxY8rZrVgPZYDI/edit?usp=sharing (Links to an external site.)

no specific question, please respond to the 3 discussion topics below as instructed (minimum 100 words each)

Question Description

IT117: Website Development

Topic 1:

This discussion has two parts.

Part 1: You will download the provided HTML file, Unit 5 Debug.html, located here, which has errors that need debugging. Once you have corrected the code, respond in this forum with what you have learned in the debugging process.

What troubles did you have? What breakthroughs? How will you apply what you have learned in this debugging process to future development?

Part 2: This week, you will use CSS to format a website layout and navigation. Cascading Style Sheets (CSS) is a formatting language that can be used with HTML to format website page elements.

Discuss the advantages and challenges of using CSS on a website. Include at least two advantages and two challenges of using CSS to format a website.


IT261: Desktop Administration

Topic 2: Public WiFi Security

The salespeople in your company all use laptops, so they can take data and information with them on the road. You are a salesperson for a retail business and, while on the road, you need to communicate with your customers and office personnel using public WiFi services (e.g., hotel, airport, coffee shops). Perform research on the Internet and find out some of the security breaches that have taken place at organizations within the last 5 years using unsecured public WiFi services. Report your findings and include the reference. In addition, list some of the steps that you should take as the salesperson to help secure the privacy of the information of your customers and employer as you make use of the laptop to communicate through WiFi in public establishments.

Research Paper/Report and PPT

Question Description

Subject: Emerging threats & Countermeasures

Residency Paper and PowerPoint Presentation:

In this scenario, hackers launch cyber-attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week.

Research Paper/Report

  • Create an official report of what issues this cyber-attack has caused on the nation’s financial infrastructure.
  • From your experience, discuss this attack could have occurred.
  • Research to find if this type of attack or a similar attack has happened before. Discuss this similar attack and how it was mitigated or are you currently working for a company that has experienced a similar attack? If so how was it mitigated? Or in your current position/experience (IT related), how would you handle this type situation?
  • Identify the countermeasures that need to be implemented to prevent these cyber-attacks from occurring in the future. Be specific in recommending countermeasures for this scenario.
  • This paper will need follow the APA guidelines, at least 8-10 pages long excluding the title and works cited page, 12 font, double space.

Power Point Presentation

  • Group Power Point Presentation will need to be approx. 15 minutes (include all details related to paper in PPT with notes related to each slide)
  • Between 8-10 slides
  • Follow the APA guidelines for citing resources.

Discussion: Privacy and Compliance

Question Description

Learning Objectives and Outcomes

  • Analyze importance of privacy and compliance with the privacy regulations.
  • Identify information that is protected by the Privacy Act.

Assignment Requirements

Read the worksheet named “Privacy and Compliance” and address the following:

Using what you have learned about the importance of privacy and compliance with the privacy regulations, identify information that is protected by the Privacy Act.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply. Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Worksheet: Privacy and Compliance (ws_privacycompliance)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

Policymakers are tasked with making decisions on issues characterized as wicked problems because of controversies, unknown relationships between causes and consequences, and uncertain futures.

Question Description

Chapter 10 – Policymakers are tasked with making decisions on issues characterized as wicked problems because of controversies, unknown relationships between causes and consequences, and uncertain futures.

From this perspective, Moody and Gerrits (2015) think that it’s desired to get decisions mapped ahead of the possible outcomes prior to the actual decision-making because that would generate certainty in ambiguous situations. Looking closely at the Technological perceptions, technology is thought to revolve around humans. It reflects on questions of who drives technology.

Q1: Please identify and name a few of those questions discussed in this debate and provide a brief explanation around your thoughts?

  • identify and name five (5) of the few questions discussed in the debate
  • provide a short and clear narrative for each question identified to support your responses,
  • *************************************************************************************************************************************************************************************************************************

Chapter 10 Policymakers are tasked with making decisions on issues characterized as wicked problems because of controversies, unknown relationships between causes and consequences, and (consequently) uncertain futures. From this perspective, it would be desirable to map the decisions and their possible outcomes prior to the actual decision making because that would generate certainty in ambiguous situations. Broadly speaking, this provides the motive for using computational modeling for policymaking as expressed in, e.g., policy informatics.

Q2: From this revelation, why is it more common to work with models “modded off-the-shelf” (MOTS) or even tailor-made models to suit specific questions and conditions?

  • identify and name the reason for why it’s more common to work with MOTS as indicated above?
  • provide a short and clear narrative to support your responses,

Please finish the following 2 question in this file.

Question Description

I need a complete process of solving problems.

You will create a design for an Ethernet network connecting four buildings in an industrial park. Hand in a picture showing your network. There will be a core switch in each building.

Building A is the headquarters building.

Building B is 85 meters south and 90 meters east of the headquarters building. A line will run directly from Building A to Building B.

Building C is 150 meters south of the headquarters building. A line will run directly from Building A to Building C.

Building D is 60 meters west of Building C. A line will run directly from Building C to Building D.

Computers in Building A need to communicate with computers in Building B at 600 Mbps.

Computers in Building A need to be able to communicate with computers in Building C at 1 Gbps.

Computers in Building A must communicate with computers in Building D at 500 Mbps.

Computers in Building C must communicate with computers in Building D at 750 Mbps.

  • Draw a picture of the situation.

b) Determine the traffic volume on each transmission line. Explain your answers.

First, show all of the traffic between pairs of sites:

Second, add up the traffic for each line.

c) Determine what standard to use for each transmission line. Explain your answers.

If the distance is more than 100 meters, use fiber; if it is 100 meters or less, select UTP.

Then, select the lowest-speed standard (including bonding) sufficient to handle the traffic.

Problem #2

Please do Problem 9-3 Parts: A – E on page 320:

Please show ALL Work for full credit

Worth 25 Points: