Discipline: Computer Science

Week 4 Discussion: Research CMMI and post your understanding why this model existsWeek 4 Discussion: Research CMMI and post your understanding why this model exists

https://www.youtube.com/watch?v=8zxzqpw0jBA 1) GRC Capability Model (Red Book) pages 12-16 https://go.oceg.org/grc-capability-model-red-book 2) GRC Capability Model (Red Book) pages 18-23 https://go.oceg.org/grc-capability-model-red-book Research CMMI  Capability Maturity Model Integration  and post your understanding why this model exists

Write at least a 400 word research paper on Security Goals, Threats, Safeguards, and Ethical UseWrite at least a 400 word research paper on Security Goals, Threats, Safeguards, and Ethical Use

Learning online is a collaborative experience, and this assignment provides students an opportunity to share their computer knowledge as well as learn to use the References feature within Microsoft Word. For this assignment, you will write a research paper in APA format with a minimum of 400 words, explaining the purpose of an information system and describing […]

Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm.Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm.

Encryption is an important aspect of computer security. For this discussion, you are to research Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm. Answer the questions in full paragraphs.  Cite your sources Questions: Define and explain Advanced Encryption Standard Define and explain Data Encryption Standard Define and explain Symmetric cryptography Define and explain Asymmetric cryptography Define […]

Cybersecurity in Software Quality Assurance: Addressing Threats and Ensuring Secure Software SystemsCybersecurity in Software Quality Assurance: Addressing Threats and Ensuring Secure Software Systems

Define your problem or area of investigation  State your goal of the paper  Why is this work significant and relevant?  Review current research in your area of choice.(your three papers)  Summary, conclusion, and future work.   Your paper should pay close attention to maintaining a consistent flow in form. The document must be well written and […]

If a database is not maintained or if incorrect data is entered into the database then what can happenIf a database is not maintained or if incorrect data is entered into the database then what can happen

If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems could occur if a medical records database is not maintained? What problems could occur if a database that maintains financial data (such as a credit card database) has incorrect data? The paper must be […]

In your own words describe each of the four methodologies and give an example of software that you might develop using each of the methods.In your own words describe each of the four methodologies and give an example of software that you might develop using each of the methods.

In your own words describe each of the four methodologies and give an example of software that you might develop using each of the methods. For one, explain why you chose that method and what would be in each area of the methodology. Agile- DevOps- Waterfall- RAD-

Compile the Implications for Non-Compliance with Generic Cybersecurity Laws and RegulationsCompile the Implications for Non-Compliance with Generic Cybersecurity Laws and Regulations

Please ensure that a organization is described according to the instructions below, it important this is written towards an organization and meets the guidelines For this week’s assignment, you will write a paper that synthesizes penalties, sanctions, and targets for non-compliance with federal, state, and international data privacy laws that are related to generic organizations, […]

Discussion Thread: Cybersecurity — Information Hiding-Least Privilege-ModularizationDiscussion Thread: Cybersecurity — Information Hiding-Least Privilege-Modularization

The NSA has identified what they call the First Principles of cybersecurity. The following List three of these: Principle Last Name Starts With Information Hiding     A through H Least Privilege I through Q Modularization R through Z For your discussion, describe the principle assigned to the first letter in your last name (in the above table). […]

Create a payroll program named CalcPay that allows the user to enter two double value sand a string namely hours worked, hourly rate and name.Create a payroll program named CalcPay that allows the user to enter two double value sand a string namely hours worked, hourly rate and name.

Create a payroll program named CalcPay that allows the user to enter two double valuesand a string namely hours worked, hourly rate and name. After the user enters the rate, hours,and name the program should calculate the gross pay. Compute federal withholding tax which is subtracted from gross based on the following table: Hints:  (100pts) Use methods […]