Python Programming Assignment Paper

Python Programming Assignment Paper
a) Describe the necessary user input to your program using the following table format. Choose the appropriate data type to store each user input. Explain your choices.
Provide the screenshot of your Python code ONLY for prompting and storing user inputs. Python Programming Assignment Paper
(15 marks)
(b) Draw a flowchart to show the steps and briefly describe the logical program flow for calculating the interest earned from the input information. (15 marks)
(c) Apply your Python programming skills to write a program named “tma.py”. Ensure that you do not change this program file name. Your program shall calculate the total interest earned per month.
The program should have sufficient comments, which should include your name and PI number at the beginning of the source codes, as well as explanations of the corresponding execution steps and analysis of program logic and flow you described in (b).
Submit your program “tma.py” through Canvas separately from the written report. (55 marks)
(d) Develop three (3) test cases to test the conditional constructs in Question (b). For each test case, describe the inputs, expected output and the screenshots of executing your program “tma.py” with EACH given set of inputs. (15 marks) Python Programming Assignment Paper

ORDER A PLAGIARISM-FREE PAPER HERE

a) Describe the necessary user input to your program using the following table format. Choose the appropriate data type to store each user input. Explain your choices.
Provide the screenshot of your Python code ONLY for prompting and storing user inputs.
(15 marks)
(b) Draw a flowchart to show the steps and briefly describe the logical program flow for calculating the interest earned from the input information. (15 marks)
(c) Apply your Python programming skills to write a program named “tma.py”. Ensure that you do not change this program file name. Your program shall calculate the total interest earned per month.
The program should have sufficient comments, which should include your name and PI number at the beginning of the source codes, as well as explanations of the corresponding execution steps and analysis of program logic and flow you described in (b).
Submit your program “tma.py” through Canvas separately from the written report. (55 marks)
(d) Develop three (3) test cases to test the conditional constructs in Question (b). For each test case, describe the inputs, expected output and the screenshots of executing your program “tma.py” with EACH given set of inputs. (15 marks) Python Programming Assignment Paper
 

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Managing Security for Sunrise Bank Paper

Managing Security for Sunrise Bank Paper
Scenario I
“Sunrise Bank”, established in 2002, is a leading commercial bank in Nepal founded by reputed entrepreneurs understanding the needs of a growing economy and is managed by a team of professionals and experienced bankers. The main mission of the bank is to be leading Nepali bank, delivering world class service through the blending of state of the art technology and visionary management in partnership with competent and committed staff, to achieve a sound financial strength with sustainable value addition to all the stakeholders. The bank is committed to do this mission while ensuring the highest levels of ethical standards, professional integrity, corporate governance and regulatory compliance. Managing Security for Sunrise Bank Paper
The bank is committed in providing quality service and planning to utilize all the technological facilities that enhance quality service with high degree of compliance and risk management. The bank has an IT department which is responsible to manage and implement all required IT infrastructure. IT department has defined a policy that all of the branch office must connect to head office through secure VPN. All other clients must be member of the centralized domain. User access of the system has been managed via proper access control mechanism and the access control list, and the service access has been managed via ports and services.

ORDER A PLAGIARISM-FREE PAPER HERE

The bank has security policies for managing the security of all its assets, functions and the services. VPN access has been managed for limited person of all branch office employees and IT administration team of head office. Defense in depth approach is to be implemented in order to confirm the IT security at various level of network infrastructure. IT infrastructure security design including address translation, DMZ, VPN, firewall, antivirus and intrusion detection system are to be implemented for internal and external security policy.
You have been working as an IT Officer for the bank. Your key role will be to manage, support and implement a secure network infrastructure for banks LAN/WAN environment. In order to assess the possibility, you have been assigned the following in which you have to demonstrate that you are able to assess risks to IT security, describe different possible IT solutions, review mechanism to control organizational IT Security and manage organizational security. Managing Security for Sunrise Bank Paper
Part: 1
Before you start the implementation of the IT security measure for the organization, you need to assess the IT security risks in the organization. You need to consider various aspects of risks such as unauthorized access of the system and data, naturally occurring risks, host, application and network risks etc. You are required to consider organizational security procedure such as business continuance, backup/restoration, audits etc. and then produce a report for the CEO of Sunrise Bank containing:
1. Identified security risk types to the organization along with description of organizational security procedure.
2. Develop a proposal of a method to assess and treat IT security risks.
You would prefer to produce a more detailed document, so you will produce a comprehensive report for fully functional secure system which will include identified risks and method to mitigate those risks. Your manager would like a separate report on your assessment of the effectiveness of the design in relation to user and system requirements.
Part: 2
Once the assessment of the risks and proposal for its remedy has been made you need to describe IT security solution for the organization such as VPNs, firewall, DMZ with a suitable implementation example. You need to:
1. Identify the potential impact to IT security using firewall and VPNs and make aware of the repercussion of incorrect configuration of firewall policies and third party VPNs.
2. Show through an example in simulated environment, how implementing a DMZ, Static IP ad NAT in a network can improve Network Security.
3. Discuss how network monitoring systems can benefit the security of IT of the organization. You need present at least three advantages.
4. Finally investigate how a ‘trusted network’ may be the part of an IT security solution.
Part: 3
Once you have identified IT risks and viable security solutions, you need to review the mechanisms to control organizational security. Consider various aspects of network change management, audit controls, disaster recovery plans, Data Protection Acts, Computer Misuse Act, ISO 3001 standards, etc. You need to: Managing Security for Sunrise Bank Paper
1. Discuss risk assessment procedures and explain data protection processes and regulations as applicable to the organization.
2. Summarize the ISO 31000 risk management methodology and its application in IT security and then discuss possible impacts to organizational security resulting from an IT security audit.
3. Explain considering how IT security can be aligned with organizational policy, detailing the security impact of any misalignment.
Part: 4
Lastly you will produce technical and user documentation which will be given to the company for the management of organizational security. You have to design and implement a security policy for the bank which will
1. List out the main components of an organizational disaster recovery plan, justifying the reasons for inclusion.
2. Discuss the roles of stakeholders in the organization to implement security audit recommendations.
3. And an evaluation of the suitability of the tools used in an organizational policy. Managing Security for Sunrise Bank Paper

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Data Analytics and Visualization Assignment

Data Analytics and Visualization Assignment

  • Scenario
    A business scenario will be given whereby you are to investigate various data sources. The data could exist in various forms from CSV to actual data with a particular database. You will be expected to identify at least one suitable data source which would lead to one or more data products and
    visualizations. This needs to be a result of identifying a business reporting gap or need so you will need to make sure there is a reason for the choices made. Data Analytics and Visualization Assignment
  • Analysis
    The select data source is to be analyzed for its properties in regards to Variety, Volume, Velocity, and Validity. You will are to determine the statistical significance of the chosen data source by using one or more statistical significance testing instruments such as p-values. You will be expected to rationalize and justify the use of the instrument as well as comment on it.

    ORDER A PLAGIARISM-FREE PAPER HERE

    https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5665734/

  • Reporting
    Write a report based on information drawn from the Scenario and Analysis along with relevant high-quality research and industry literature covering an in-depth discussion on how the data can lead to a Data product.
  • Scenario
    A business scenario will be given whereby you are to investigate various data sources. The data could exist in various forms from CSV to actual data with a particular database. You will be expected to identify at least one suitable data source which would lead to one or more data products and Data Analytics and Visualization Assignment
    visualizations. This needs to be a result of identifying a business reporting gap or need so you will need to make sure there is a reason for the choices made.
  • Analysis
    The select data source is to be analyzed for its properties in regards to Variety, Volume, Velocity, and Validity. You will are to determine the statistical significance of the chosen data source by using one or more statistical significance testing instruments such as p-values. You will be expected to rationalize and justify the use of the instrument as well as comment on it.
    https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5665734/
  • Reporting
    Write a report based on information drawn from the Scenario and Analysis along with relevant high-quality research and industry literature covering an in-depth discussion on how the data can lead to a Data product.

Data Analytics and Visualization Assignment
 

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Cloud Computing Risk Securities Essay

Cloud Computing Risk Securities Essay
Enhance my paper from 22 pages to 45 pages in total
1. Introduction currently 8 pages, enhance it to 14 pages
2. Literature review currently 14 pages, enhance it to 31 pages
3. Currently 38 references, enhance it to 70 references in total
Topic: “The effects of Cloud Computing Risk, on the security and future directions on Data Migration to deliver a service over a network.”
Chapter 1 – Outline
Chapter 2 – Literature Review. Cloud Computing Risk Securities Essay
Chapter 1 – Outline
Abstract
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on demand. As much as cloud computing has numerous benefits to users, its structure and mode of operation have been found to place data and networks at risk and in general expose organizations to numerous security risks.
To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations. There are six main security risks associated with cloud computing.
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing more so the migration challenges. organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must also have in place measures to ensure that security when using cloud services is guaranteed. Cloud Computing Risk Securities Essay
Introduction
Cloud computing is simply an on-demand service that makes it possible for users and enterprises to access computer system resources more so data storage and computing capabilities without the direct active administration by the users or institutions. Cloud computing is only possible through internet connections. Due to the nature of cloud computing, the technology has been found to place data and networks at risk. To understand the risks associated with cloud computing it is advisable to study the features of cloud computing, the benefits of cloud computing as well as the migration process. By conducting such a study, security experts can formulate the best way to implement a cloud solution without compromising their data and operations.
Cloud computing is considered to transform how information technology tends to be managed as well as consumed. Cloud computing has been identified to offer several benefits. Some of the benefits are helping organizations and users cut on their costs, acceleration innovation through data and information sharing, improving marketing speeds, and increasing operation capabilities by scaling applications that are on-demand (Tchernykh et al., 2019). Nevertheless, as cloud computing shape is emerging as a reliable technology as well as developing drastically both within reality as well as conceptually, privacy in addition to security matters still poses challenges that are considered to be significant. Cloud Computing Risk Securities Essay
The security risks in cloud computing
For organizations and users to access cloud computing services, they employ the services of cloud service providers. There are several cloud service providers such as Amazon and Microsoft. For one to effectively use the services offered through cloud computing, they must reveal their data and even trade secrets to the service providers (De Carvalho et al., 2017). The providers then integrate the data provided and the systems provided to their cloud infrastructure. Through the integration, users can effectively carry out their functions and transactions online regardless of the location there are in. All that is needed is a secure and reliable internet connection. Majority of the security risks associated with cloud computing stem from the fact that users have to share their data with cloud service providers to access cloud computing capabilities (Rashid &Chaturvedi, 2019).

  1. Reduced visibility and control of data and other assets

There are six main security risks associated with cloud computing. The first risk is that users have reduced visibility and control of their data and specific assets. When institutions and users opt to employ the services of external cloud services, the responsibility for some infrastructure and policies inevitably move to the cloud service provider. Consequentially, there is a paradigm shift as regards security logging and monitoring.Cloud Computing Risk Securities Essay
The majority of the time, organizations adopt cloud computing they have to perform the monitoring as well as the analysis of information about data, services, applications, and users without the use of network-based monitoring which can only be done on on-premise IT resources. In most cases, organizations have to be content that their cloud service providers will implement security measures that will secure their data as well as other assets. In some cases, cloud service providers do not offer security that effectively secures the assets of their clients.

  1. The use of on-demand self-services supports shadow IT

Cloud service providers normally make it easy for personnel of an organization to provision new services without IT consent. Consequentially, software that is supported by an organization’s IT department is introduced to an organization’s operations leading to shadow IT. Shadow IT is known to expose organizations to many unwelcomed risks. According to Chaudhry (2017), shadow IT leads to the easy introduction of malware into an organization’s network. Malware can compromise operations through ransomware, Trojans, and related viruses. Also, the use of shadow IT is known to decrease an organization’s control of its data and network.

  1. There is a possibility of a compromise of internet-accessible management application programming interfaces (API)

Due to the excessive reliance on the internet in cloud computing, cloud service providers can expose application programming interfaces that organizations use to interact with cloud services. Organizations use application programming interfaces to manage and monitor their assets and users. Unlike application programming interface management in on-premise computing, cloud service providers application programming interfaces are accessible via the internet and for that reason are exposed to potential exploitation. The interfaces can be turned into successful attacks that can compromise an organization’s assets and operations.

  1. Data deletion is never guaranteed

Organizations share their data with their cloud service providers to support operations via cloud services. Once organizations and users terminate their contracts with cloud service providers regardless of the reasons they can never be sure that their cloud service providers do not abuse their data. Organizations might dictate cloud service providers to delete data concerning the organizations but malicious cloud service providers might not fully comply. The lack of full compliance has the potential to lead to the leaking of trade secrets. Also, the undeleted data can be used for ransom purposes as well as compromise the operations of organizations.Cloud Computing Risk Securities Essay

  1. Leaking or loss of credentials

In the majority of cases, cloud service providers offer their services to several clients and in some cases, the clients can be competitors. Due to access to many customers’ data, cloud service providers are highly targeted by cybercriminals (Alex & Kishore, 2017). Cybercriminals are aware that if they compromise the administrative function of a cloud service provider they will be better placed to access the data of the cloud service providers’ customers. By accessing, the administrative functions of cloud service providers, cybercriminals have access to also the provider’s network, data, systems, and applications. Consequentially, cybercriminals can hack cloud service providers to compromise the data and credentials of clients.

  1. High likelihood of insiders abusing authorized access

Insiders such as administrators and staff for both cloud service providers and organizations contracting cloud services who abuse their access to the networks, systems, and data are uniquely positioned to cause harm or exfiltration information. Due to there being many stakeholders, the probability of identifying insider culprits is difficult yet the damage caused by insiders can be too much. Insiders can use their authorized access to access and leak trade secrets as well as create backdoors for cybercriminals to access the networks in use. Through the backdoors created by insiders, cybercriminals can cause severe damages to the cloud service provides or to the organizations that have contracted cloud service providers. Cybercriminals can introduce ransomware as well as steal valuable data.
Data migration for cloud computing
There are several security risks involved in data migration for cloud computing. Top on the list is that a user might not be in a position to fully control their given data as well as control the performance of their applications once they are migrated to a cloud service provider for integration. Also, users may not have the capability of auditing or changing their data policies as well as the processes under which they are supposed to work. Furthermore, during migration, some segments of an application might be misarranged and this has the potential to harm a specific application’s performance (Patrignani, et.al, 2016).Cloud Computing Risk Securities Essay
The other main issue as regards security risks during data migration is meeting all data regulations. Trying to comply with regulations at times might be complicated more so if it concerns issues on cross-border. Organizations must consider all possible regulation restraints that may affect their data migration. For example, some countries do not support cloud computing as they consider cloud computing to be highly vulnerable. In such countries, data migration is prohibited. Some countries prohibit the migration or transfer of customers’ data without the consent of customers. Countries like the United States have many rules that cover the distribution of data as well as the transfer and share of personal data.

ORDER A PLAGIARISM- FREE PAPER NOW

            The other main risk is the possibility of cloud consumers losing their general data by having the data locked into proprietary formats. Consequentially, organizations can lose control over their given data. The main reason for this is because the monitoring tools on the one using the data or who can view the data tend not to be offered to the consumers of cloud computing. As a result, the loss of data is considered to be a possible risk after data has been migrated (Sharma, et.al, 2017).
The fourth risk is that it might not be easy to have service level agreements that are tailor-made concerning the particular necessities of an enterprise. The compensation provided because of downtime might be inadequate. Also, the service level agreements have high probabilities of not covering the concomitant damages.  It is considered to be making sense in balancing the expense of guaranteeing uptime which is internal against the benefits of choosing the cloud. There is also the risk of malware infections – this is mainly because of data that is in massive volumes being stored on the cloud. It also needs an internet connection in storing the data therefore anyone who is utilizing cloud services is at risk of encountering cyber-attacks (Tchernykh, et.al, 2019).Cloud Computing Risk Securities Essay
There is also the security issue of making sure that there is the availability of data integrity which involves its storage, transfer as well as retrieval which indicates that it gets to change only when responding to transactions that are authorized. The challenge is that there is no standard in place to ensure the integrity of data during migration. Cloud migration is considered to be among the top issues discussed when cloud managers are discussing the adoption of cloud computing services (Elzamly, et.al, 2019).
Cloud tends to behave the same as an interface via which companies are capable of accessing data within a virtual environment. Therefore, the smooth functioning of the cloud relies on how appropriately groomed as well as knowledgeable the providers of the cloud are within this region. Additionally, if migration of data is not carried out systematically as well as appropriately, it is capable of causing problems concerning data as well as cloud security of the assets of an organization. Bearing the above in mind, it is necessary to hire cloud providers who have experience which is sound concerning the field so that cloud service management can be done efficiently as well as effectively (Zelenkov, 2016).Cloud Computing Risk Securities Essay
 
Conclusion
Data migration is an essential component of cloud computing. The effectiveness of cloud computing is highly dependent on data migration and system integrations. Organizations that safely migrate their data to cloud platforms are better placed to leverage the benefits of cloud computing in comparison to those that do not safely migrate their data. In the migration process, two main things must be considered. The first thing is the type of data being migrated. Trade secret and proprietary data ought to be migrated in phases to ensure that it is not compromised or that it is not altered during migration. Secondly, customers or organizations must consider the volume of data being moved in the migration process. Large data volumes must be moved in blocks or phases to ensure that all data is moved in the migration process. The failure to segment large data volumes has the potential to lead to data loss in the migration process.
As much as migration is the center of focus during cloud computing, organizations and users must consider the security risks associated with cloud computing before adopting the technology. Cloud computing offers numerous benefits to users such as easy access to data and systems from any location of the world given that there is internet access. Due to the easy access, organizations and users can streamline operations. For organizations to ensure that they leverage the benefits of cloud computing they must deal with the security issues associated with cloud computing. For example, organizations or users must have in place measures to prevent or counter shadow IT and insider dealings. Also, organizations and users must have in place measures to ensure that security when using cloud services is guaranteed.Cloud Computing Risk Securities Essay
 
 
Chapter 2 – Literature Review
Abstract
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. Adoption of cloud computing in various industries has been on the rise in the recent past. This has enticed organization yearning to go digital get interested with the technology. Adoption of cloud computing requires migration of data and information from the existing servers to cloud servers, a process known as data migration. The purpose of the process is making information available for use over the network. Data migration is vulnerable to several cloud computing risks, as revealed in this paper.
Keywords- Security; Cloud Computing; Data Migration
 
 
Introduction
Cloud computing is a novel paradigm capable of combining multiple computing technologies and concepts of the internet to come up with an agile and cost-effective business platform and information technology infrastructure. In the recent past, the adoption of cloud computing in various industries has been on the rise. This has positively impacted the maturity of the markets associated (Hammami et al., 2017). Despite the increasing popularity of cloud computing services like Amazon EC2, a good number of people are still unclear on the path to take because of the associated security issues. Some people lack a solid understanding of what cloud computing is. Cloud Computing Risk Securities Essay

 
"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"