Instructions Write a 2- to 4-page paper in which you: Explain why ISI needs an a

Instructions
Write a 2- to 4-page paper in which you:
Explain why ISI needs an a

Instructions
Write a 2- to 4-page paper in which you:
Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
Develop at least three layered access security strategies that can be used to protect ISI’s data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
Explain a best practice process and procedures for implementing ISI’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
Describe the verification process that can be used to ensure that ISI’s access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
Explain how ISI’s verification process will be maintained and updated in response to future changes in access requirements.
Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.​​​​​​
Cite each source listed on your source page at least one time within your assignment.
For help with research, writing, and citation, access the library or review library guides.
Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
Use section headers in your paper to clearly delineate your main topics.

Assignment Instructions In this exercise, you will use a cloud platform like Azu

Assignment Instructions
In this exercise, you will use a cloud platform like Azu

Assignment Instructions
In this exercise, you will use a cloud platform like Azure, specifically its digital twin services. you will start using its 3D Scenes Studio, an immersive 3D environment where business can visualize and interact with a demo and see the power of this twin to make decisions quickly and effectively.
Steps for Completing the Assignment
1. Download the template below and follow the step-by-step instructions to complete this assignment. In it, you will have to answer the questions that appear in each exercise. At the end, you will have to upload this template with your answers to the exercises: Template for Assignment A2.1-1.docxDownload Template for Assignment A2.1-1.docx
2. Create an Azure Subsсrіption: First, you will need an Azure subsсrіption to complete this exercise. If you don′t have one already, create one for freeLinks to an external site. here. You must choose the Student Subsсrіption option and fill in the form with your info to create your account. You may be prompted to verify your identity in the process, so use your IE credentials to do so. As an IE student, you must access https://portal.azure.comLinks to an external site. using your IE username when you log in.
3. Create an Azure Digital Twins instance: You will create a new instance of Azure Digital Twins using the Azure portalLinks to an external site.. Please follow the steps in the document provided above.
4. Submit the template with your answers to the exercises.
Exercises and Questions to Answer
Answer each question below by filling out your answer in the template provided above:
Question 1: What is the temperature of the Harmony Module? You need to take a picture and upload it using the button.
Question 2: There are two dangerously high CO2 level alerts. Capture an image of the alert with the highest CO2 level and upload it.
Question 3: Now that we have analyzed the alerts and anomalies of our space station′s twin, we need to devise a way to anticipate and avoid getting into a serious and unsolvable situation. Could artificial intelligence help us? How could we solve it?
Question 4: Capture an image of the result showing the robotic arm and the behavior and upload it. There are more options to create alerts and widgets.
Question 5: As we have studied, digital twins are a perfect base on which to apply artificial intelligence to optimize, predict, and intelligently prescribe our business. Let′s think about the digital twin of the packaging center we have modeled, where robotic arms pack hundreds or thousands of packages per day. Making use of the data we have in the model or other data you specify, could you describe how artificial intelligence would improve this scenario and what use cases?
Assignment Deliverables
Please submit the completed template in PDF format. Please note that your answers to the five questions should be around one page long.
also please let me know type of information needed so you can also create the student account under my name

Please, note, that starting from the Part 2 section of the assignment (because I

Please, note, that starting from the Part 2 section of the assignment (because I

Please, note, that starting from the Part 2 section of the assignment (because I cut off part 1), answer only questions 2 & 3 marked in RED, but leave question 1, the first question. Refer to the textbook and review the contents as recommended to be familiar with question materials. Textbook Chapter 8, with the name/title listed. I made some copies of the TEXTBOOK contents, but look for it if you need more information. Follow all the direction/rubric and address the questions directly in few words but concise. No plagiarism, and include all the sources used. Please follow the APA 7th edition completely. The instructor is meticulous in marking. 

Objective: The primary objective of this bachelor project is to investigate and

Objective:
The primary objective of this bachelor project is to investigate and

Objective:
The primary objective of this bachelor project is to investigate and analyze the digital transformation strategies at Per Aarsleff A/S, a leading entity in Denmark’s construction and civil engineering industry. The study aims to understand how the integration of digital technology is reshaping the operational and strategic facets of the company.
Research Questions:
1. How is Per Aarsleff A/S integrating digitalization into its core business processes, especially in data collection and utilization?
2. In what ways does the company adapt to various digital working methodologies?
3. How does the digital transformation at Per Aarsleff A/S align with the stringent regulations for emissions and data management in the industry?
Methodology:
The research will employ a qualitative case study approach, utilizing both primary and secondary data. Primary data will be collected through interviews with key stakeholders at Per Aarsleff A/S, while secondary data will be sourced from company reports, industry publications, and relevant academic literature. The study will also include a comparative analysis with similar transformations in other leading construction firms to contextualize Aarsleff’s digital journey.
Expected Outcomes:
The project aims to provide a comprehensive overview of the digital transformation in the construction sector, with a specific focus on Per Aarsleff A/S. It is expected to reveal insights into how digital technologies can be effectively integrated into traditional industries and their impact on business models, productivity, and regulatory compliance.
Focus in general, and i will add more from my interviews later.

BY DAY 3 Post 300–400 words in which you summarize your findings. Your summary s

BY DAY 3
Post 300–400 words in which you summarize your findings. Your summary s

BY DAY 3
Post 300–400 words in which you summarize your findings. Your summary should:
Include a copy of the code that either (A) exemplifies concise, generalized code; or (B) presents the perfect opportunity to apply loops, arrays, and lists to reduce the length of the program using a more elegant solution. Do not undertake a lengthy program; limit your code to approximately 20 lines.
If the code is an exemplar of good coding, explain what leads you to that conclusion. Be specific.
If the code needs improvement, include a rewritten version of the code, in which you apply oneof the methods (described above) to improve the program. Explain how your solution better embraces a computer’s strengths as a tool that can perform calculations quickly, perform repetitive tasks, and/or manage data effectively.
Add or revise comments in the code to accurately describe the function of the loop and list.
Do not include the entire source code of the program you choose. Select just the portion with the necessary information, such as variable declarations and methods called from outside the class or method.

Assignment Please review the Materials in Module 14 –  Storytelling Intersection

Assignment
Please review the Materials in Module 14 –  Storytelling Intersection

Assignment
Please review the Materials in Module 14 –  Storytelling Intersections Between Technologies.
Revise your PowerPoint slides that you submitted in Part I of the Skills Assignment to add 3 to 5 new slides that incorporate what you learned in Module 14 about storytelling and technology.
Submit the updates slides (with updated speakers notes).
Readings and Other Materials
Required
Module 14 – Video
Module 14 – PowerPoint Slides
Please just add 4 more slides to existing PowerPoint that will be uploaded.

Week 2 Discussion – Twitter Breach  On July 15th, 2020, several Twitter accounts

Week 2 Discussion – Twitter Breach 
On July 15th, 2020, several Twitter accounts

Week 2 Discussion – Twitter Breach 
On July 15th, 2020, several Twitter accounts associated with prominent figures were hijacked and sent out a bitcoin scam.
Describe the breach, including the type of attack and its ramifications.
How did human nature factor into the breach?
What type of access controls could be implemented to mitigate or minimize the effects of this type of breach?
After reading a few of your classmate’s postings, reply to those from which you learned something new or to which you have something constructive to add. For example:
Discuss what you learned.
Ask probing questions or seek clarification.
Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
Suggest research strategies or specific resources on the topic.
Then Respond to: Kynnady Mack
On July 15, 2020, several high-profile Twitter accounts were hijacked and used to send out a bitcoin scam message. The affected accounts belonged to prominent figures and organizations, including Barack Obama, Joe Biden, Elon Musk, Bill Gates, Kanye West, Apple, and Uber. The messages posted from these accounts falsely promised to double any Bitcoin sent to a specific wallet address, effectively attempting to scam people out of their cryptocurrency.
Type of Attack
The attack was a form of social engineering known as a “spear-phishing” attack. The attackers gained access to Twitter’s internal systems by targeting Twitter employees with administrative access. By deceiving these employees, the attackers were able to gain the credentials necessary to access and control the accounts of high-profile users.
Ramifications
Financial Losses: People who fell for the scam sent Bitcoin to the provided wallet address, resulting in financial losses. Reports indicate that the attackers received over $100,000 worth of Bitcoin. 
Reputation Damage: The breach damaged the reputation of Twitter as a secure platform. Trust in the security and reliability of the platform was undermined, which can have long-term effects on user engagement and business relationships.
Security Overhaul: Twitter had to conduct a thorough investigation and overhaul its security protocols, which likely involved significant time and resources.
Potential Data Breach: Although the primary goal appeared to be the Bitcoin scam, the attackers also had the potential to access direct messages and other private information, posing further risks.
Human Nature and the Breach
Human nature played a significant role in this breach. Social engineering attacks exploit human psychology, such as the tendency to trust and the desire to be helpful. The attackers targeted Twitter employees, possibly with convincing pretexts or urgent-sounding requests, to gain access to internal systems. Once they had the credentials, they could bypass technical security measures.
Access Controls to Mitigate or Minimize the Effects
Multi-Factor Authentication (MFA): Implementing MFA for all administrative access would require an additional verification step, making it more difficult for attackers to gain access using stolen credentials alone.
Least Privilege Principle: Ensuring that employees have the minimum level of access necessary for their job functions can limit the potential damage from compromised accounts.
Role-Based Access Control (RBAC): Using RBAC to assign permissions based on job roles can help to ensure that only authorized personnel have access to sensitive systems and data.
Regular Security Training: Conducting regular training sessions to educate employees about the latest social engineering tactics and how to recognize and respond to suspicious activity.
Behavioral Analytics: Implementing systems that monitor and analyze user behavior to detect unusual activity, such as accessing accounts or systems outside of normal patterns.
Incident Response Plan: Having a robust incident response plan in place to quickly identify, contain, and mitigate breaches can help minimize their impact.
By understanding the human element in security breaches and implementing strong access controls, organizations can better protect themselves against similar attacks in the future.
References
Twitter investigation report (2020) Department of Financial Services. Available at: https://www.dfs.ny.gov/Twitter_Report Links to an external site.(Accessed: 01 July 2024). 

Overview Imagine you are the manager of a software development team working on n

Overview
Imagine you are the manager of a software development team working on n

Overview
Imagine you are the manager of a software development team working on new applications for your company, Optimum Way Development, Inc. Your director has called for all development teams to submit product briefs detailing their current projects. The director plans to share the most promising product briefs with clients at an upcoming meeting. You have software design documents PDF for two projects your team is currently working on
Since communications must be targeted to a specific audience, before you can create a product brief for a client, you must know more about the client. Your knowledge of the client will inform the decisions you make in the client brief—from the type of language you use to how you present data and graphics. To begin this milestone activity:
Choose one of the software design documents to focus on.
Consider all of the different groups of people (audiences) who are likely to use that application.
Choose one audience to focus on for your persona.
Choose a stock picture and name for the persona that will serve as the representation of your chosen audience.
Identify demographics and psychographics associated with this audience.

Use the Data in the attached PDF file, the data is also available for you to vie

Use the Data in the attached PDF file, the data is also available for you to vie

Use the Data in the attached PDF file, the data is also available for you to view at the bottom of this page, as well. This data is the daily average passengers that ride Bart from Richmond to Downtown San Francisco (Table 1) and from El Cerrito Del Norte to Downtown SF (Table 2). This data is as of August 2020.
Your completed assignment should have one excel ″workbook ″ with two sheets (Sheet1 should have Table 1) and (Sheet 2 should have Table 2). Assignment is worth 20 pts, 10 pts per table.
Perform the same tasks below on both sheets. In essence work on sheet 1, and once you are finish, complete sheet 2
Each worksheet should have the following:
On Cell B4, type ″BART Average Ridership for the Month of August 2020″ –1pt
Starting on Cell B6 , type ″Destination″, on Cell C6 type ″Richmond Boarding Station″ (these will be the Column Titles) –1pt
Underline and Bold the Column Titles –1pt
Leave a row between the titles and the data –1pt
Type the data as listed in the attached PDF, which is also listed at the bottom of the page
On Column D, Cell D6 type ″Ticket Price″ –1pts
Starting on Cell D8 to Cell D11 type $5.55 (Make sure that it is formatted in dollar signs, where you show the cents) –1pt
On Column E , Cell E6 Type ″Average Revenue per Day″ –1pt
Starting on Cell E8 to Cell E11 type a formula that multiplies the contents by row of (Columns C and Column D) –1pt
Add a sum on Cell E12, which would sum Cell E8 through Cell E11 –1pt
Double underline this Cell (E12) and Bold & Call this sum ″Total Average Revenue per Day″ –1pts
THIS IS THE DATA TO USE
Average Daily Passengers
Table 1
Destination Richmond
Embarcadero 2,534
Montgomery Street 2,506
Powell Street 2,907
Civic Center 2,007
Table 2
Destination El Cerrito Del Norte
Embarcadero 3,214
Montgomery Street 3,404
Powell Street 3,575
Civic Center 2,893
Important Info

The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.

Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc)