Case Scenario: Charlie And Carol Are Students At A University In A Computer Science Program.

Case Scenario: Charlie And Carol Are Students At A University In A Computer Science Program.

_ Case scenario:

Charlie and Carol are students at a university in a computer science program. Each writes a program for a class assignment. Charlie's program happens to uncover a flaw in a compiler that causes the entire computing system to fail; all users lose the results of their current computation. Charlie's program uses acceptable features of the language; the compiler is at fault. Charlie did not suspect his program would cause a system failure. He reports the program to the computing center and tries to find ways to achieve his intended result without exercising the system flaw. The system continues to fail periodically, ten times (beyond the first failure). When the system fails, sometimes Charlie is running a program, but sometimes Charlie does not. The director contacts Charlie, who shows all his program versions to the computing center staff. The staff concludes that Charlie may have been inadvertently responsible for some, but not all, of the system failures, but that his latest approach to solving the assigned problem is unlikely to lead to additional system failures. On further analysis, the computing center director notes that Carol has had programs running each of the first eight (of ten) times the system failed. The director uses administrative privilege to inspect Carol's files and finds a file that exploits the same vulnerability as did Charlie's program. The director immediately suspends Carol's account, denying Carol access to the computing system. Because of this, Carol is unable to complete her assignment on time, she receives a D in the course, and she drops out of school.

_ Requirements:

A. Analyse of the case scenario should have the following details clearly mentioned:

1. What are the ethical issues in the case?
2. Gather the relevant information about the case including all the stakeholders, any related facts, details, etc.
3. Find all the consequences of the case, the rights of each person involved etc.
4. Analyze the case from different points of view.
5. Explain how the problem could be solved USING the ethical model that you chose by applying the principles that you have learned so far or feel free to search for the relevant ones to be required to solve the case.
6. How can the problems found in the case be prevented in the future?

B. Will be scored based on the following:

+ Clear Analysis of the case study and relevant modules (40 points)
+ The document looks clear, neat, and presentable format with appropriate headings and subheadings (10 points)
+ All the details specified in the instructions above (50 points)

     

    Describe The Various Sources Of Systems And Software Components. > Describe How To Plan Purchases

    Describe The Various Sources Of Systems And Software Components. > Describe How To Plan Purchases

    > Describe the various sources of systems and software components.

    > Describe how to plan purchases and acquisitions, as well as the steps in the procurement process.

    > Explain how to conduct procurement, including its inputs, processes, and outputs.

    > What is a statement of work? Why is it so important to procurement?

    Need 4 pages in APA format with peer-reviewed citations. No need for introduction or conclusion.

       

      Your task this week is to check the internet and the¯Common Vulnerabilities and Exposures CVE

      Your task this week is to check the internet and the¯Common Vulnerabilities and Exposures CVE

      Your task this week is to check the internet and the¯Common Vulnerabilities and Exposures (CVE) List¯for networked IoT or¯IoMT¯devices with publicly known problems identified in the past six months.¯¯ Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices. For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product. Use this Memo Template to record your work. How Will My Work Be Evaluated? In writing a clear and concise memo to inform management about potential vulnerabilities, you are demonstrating communication skills, technical expertise, and responsiveness to stakeholder needs and concerns. The following evaluation criteria aligned to the competencies will be used to grade your assignment: 1.2.1: Identify the target audience, the context, and the goal of the communication. 1.3.4: Balance original content with supporting sources. 1.4.1: Produce grammatically correct material in standard academic English that supports the communication. 2.1.1: Identify the issue or problem under consideration. 10.1.1: Identify the problem to be solved. 10.1.3: Define the specifications of required technologies. 12.1.1: Determine business needs that require policies, processes, and procedures. 12.3.1: Select controls. 12.3.2: Describe the implementation of controls.

      Your internship assignment for this week is with the Office of the Corporate Counsel &

      Your internship assignment for this week is with the Office of the Corporate Counsel &

      Your internship assignment for this week is with the Office of the Corporate Counsel & Chief Privacy Officer. Padgett-Beale’s Chief Privacy Officer has invited you to ‘shadow’ the company’s internal investigators as they look into a privacy problem that was uncovered in the Resort Operations organization (see ‘Background Information’ at the end of this message). Your recent experience working in that organization is viewed as a plus since you may have seen or heard something during your time in Resort Operations and Guest Relations. The CPO has also asked you to assist with identifying a set of appropriate and relevant updates to the company’s internal training program for staff members with access to guest information. The goal of these updates should be to strengthen the training provided to staff so that they understand (a) the importance of maintaining guest privacy and (b) the consequences that may be imposed upon staff who are found to have violated company rules and policies regarding guest privacy. To begin, read the Background Information section below. Then consult the course readings and do additional research into the privacy, data security, and liability issues surrounding the stated privacy problem.  Next, identify 3 to 5 specific recommendations for appropriate and relevant updates to the Guest Relations staff training program. Remember to focus your research and recommendations upon the hospitality industry (specifically hotels). ***** Summarize your research and present your recommendations in a 3 to 5 paragraph briefing paper. Please remember to list and cite your sources (APA format preferred). ***** Background Information Special requests from guests are entered into the reservation database for use by front desk, concierge, housekeeping, and maintenance personnel. Food service personnel may also need to access this information in order to address special dietary needs. Guests may enter the information themselves using a web-based form or a call center operator may enter it on a guest’s behalf. The Chief Privacy Officer recently became aware of a disturbing practice in which anonymous staffers have been posting ‘outrageous guest requests’ under the ‘Humor’ section of employee bulletin boards in the Resort Operations staff locker rooms. Some of these postings have included guest names and room numbers along with names and ages of children. This practice is a shocking violation of guests’ privacy and could seriously harm the company’s reputation if the practice were to continue. The bulletin boards have been moved to the semi-public hallway outside the locker rooms as a first step towards stopping this behavior. A deeper investigation into the situation revealed that the recently revised guest relations privacy policy has strong protections in place that detail (a) who is allowed to access guest information and (b) the permitted uses of guest information. The consequences for violations, as listed in the policy, range from a two-week suspension without pay to termination of employment. For examples of guest privacy policies, please see these resources: https://www.lhw.com/Privacy-Policy 2. https://www.ihcltata.com/privacy-policy/ 3. https://www.fourseasons.com/privacy/

      Your nation’s technical staff expects you to report on all summit events once you return

      Your nation’s technical staff expects you to report on all summit events once you return

      Your nation’s technical staff expects you to report on all summit events once you return to your nation’s capital. The CISO has requested that each analyst work independently to create an Intelligence Debriefing for technical staff. This debriefing is a comprehensive report and is comprised of your BCP, SITREP 1, SITREP 2, and SITREP 3. Each team member should develop his or her own briefing and submit independently. You may, however, use your team’s discussion area to share your findings with your peers.Step11.docxCYB670TeamUKProject3SITREP3.docxCYB670TeamUKProject3SITREP2.docxCYB670Project3step7businesscontiunityplan11.docx

      Youwill describe via an xls the characteristics of at least four 4 different types

      Youwill describe via an xls the characteristics of at least four 4 different types

      You  will describe (via an xls) the characteristics of at least four (4) different types of theorized hypothesis indicating the type of variables implicated (dependent, independent, categorical, quantitative, impact of outliners) and their count (i.e. ANOVA, 2 or more categorical IV, 1 dependent quantitative variable, outliners only applicable to IV).

      You are required to submit your code as demonstrated in the lab manual and running

      You are required to submit your code as demonstrated in the lab manual and running

      You are required to submit your code (as demonstrated in the lab manual) and running results (with comments if necessary). An Industrial-Grade RSA System. The RSA Corporation put out a number of public challenges with monetary rewards to factor some very large RSA modulRSA no longer offers such challenges, but RSA-640 was the last of these challenges that they put out in 2001 to be factored. The factorization was announced in 2005 by a team of scientists and it took 30 2.2GHz-Opteron-CPU years (in over 5 months of calendar time). RSA-640 has 193 decimal digits (640 bits) RSA-640 = 310741824049004372135075003588856793003734602284272754572016194882320644051808 150455634682967172328678243791627283803341547107310850191954852900733772482278 3525742386454014691736602477652346609 In the following tasks, use hexadecimal format for all numbers in your code: Find the two prime factors and verify that they are indeed the factors of RSA-640. (Use VirtualBox and Openssl and BIGNUM library).

      write and submit a lab report of a minimum of 3 pages on what you

      write and submit a lab report of a minimum of 3 pages on what you

      write and submit a lab report of a minimum of 3 pages on what you learned in the lab, with screenshots and analysis of the following labs in testout. Please follow the attach instructions.   LabsinCYA.docxSampleoftheLabreportCYA……..1.docx

      What is the difference between between homogenous and heterogenous system architecture?Where are

      What is the difference between between homogenous and heterogenous system architecture?Where are

      What is the difference between between homogenous and heterogenous system architecture? Where are heterogenous system architecture applied? Why is coherence and consistency between FPGA cache, GPU and CPU in heterogeneous architecture beneficial?  What are the advantages and disadvantages of NUMA structure? Analyze the differences between distributed memory versus local memory (NUMA, NoC etc) in context of GPUs

      What is the purpose of the reverse lookup zoneCan more than one

      What is the purpose of the reverse lookup zoneCan more than one

      What is the purpose of the reverse lookup zone? Can more than one DNS server be configured using Active Directory on the network, and if so, what is the advantage? What is the most efficient way to update DNS records?