Discipline: Computer science

How to Evaluate Testing Tools [WLOs: 1, 2, 3] [CLOs: 1, 3] Week 5 – Discussion ForumHow to Evaluate Testing Tools [WLOs: 1, 2, 3] [CLOs: 1, 3] Week 5 – Discussion Forum

Prior to beginning work on this discussion forum, read Chapter 7 from the course text, Software Testing Foundations. As we discussed throughout this course, software testing is not an easy task. Therefore, it is very common to use CAST tools (computer aided software testing) to help. The good news is that there are different CAST tools […]

How [a Specific Technology Application (such as ChatGPT as a specific example of AI)] Will Cause Digital Disruption of [a Specific Industry Sector or Job]How [a Specific Technology Application (such as ChatGPT as a specific example of AI)] Will Cause Digital Disruption of [a Specific Industry Sector or Job]

Instructions:  You are to write a research paper on one of the suggested topics, which  appears in the following two pages.   How [a Specific Technology Application (such as ChatGPT as a specific example of AI)] Will Cause Digital Disruption of [a Specific Industry Sector or Job]  The report should include an introduction explaining why you […]

Lesson 2 Assignment – Create a Quantitative Analysis of Organizational Cyber Risk ElementsLesson 2 Assignment – Create a Quantitative Analysis of Organizational Cyber Risk Elements

Instructions Introduction This week you learned about the process of creating a prioritized list of internal and external risks to the organization and quantifying various organizational cyber risk elements. This assignment is designed to support your application of that knowledge. Specifically, you will apply that knowledge for the development of a prioritized list and related […]

Advance Changes to Operations Needed to Improve Governance, Risk, Privacy, and ComplianceAdvance Changes to Operations Needed to Improve Governance, Risk, Privacy, and Compliance

Instructions This week you learned about the advancement of changes to operations needed to facilitate improvements to governance, risk, privacy, and compliance in the organization. This assignment is designed to support your application of that knowledge. Specifically, you will perform research into anticipated changes that will occur in the future related to governance, risk, privacy, […]

Comparing and contrasting traditional networks to Software Defined Networks (SDN)Comparing and contrasting traditional networks to Software Defined Networks (SDN)

Compare and contrast traditional networks to Software Defined Networks (SDN): * How is the underlying architecture of SDN different to traditional networks? * Does SDN need new specialised hardware? If so, how is it different than what is used with conventional network infrastructures?  * What are the associated costs of deploying conventional networks versus SDN?  […]

Ethics Paper: Ethics behind the use of private data collection practices to create algorithms that keep users engaged in social media.Ethics Paper: Ethics behind the use of private data collection practices to create algorithms that keep users engaged in social media.

Paper title: Ethics behind the use of private data collection practices to create algorithms that keep users engaged in social media. The paper must include, in this order: 1. An abstract of at most 150 words 2. The reference review you already wrote 3. A body of discussion on your topics, sufficient to inform a reader […]

Impact of Regulatory Compliance on Software Infrastructure Risk Reporting Systems in Financial Technology: A Case StudyImpact of Regulatory Compliance on Software Infrastructure Risk Reporting Systems in Financial Technology: A Case Study

Research paper for publishing: “Impact of Regulatory Compliance on Software Infrastructure Risk Reporting Systems in Financial Technology: A Case Study” This paper could investigate how regulatory requirements shape the architecture, development, and deployment of risk reporting systems in fintech, analyzing challenges, best practices, and the role of expert business leaders. Please include:– Abstract– Keywords– Introduction– […]

A variety of government, military, and university websites provide information about their practices for physically securing computer equipment.A variety of government, military, and university websites provide information about their practices for physically securing computer equipment.

A variety of government, military, and university websites provide information about their practices for physically securing computer equipment. For this assignment, complete the tasks listed below. Survey and evaluate a few websites that meet the aforementioned criteria. Select two websites, and provide your impression of the practices that the two websites utilize for physically securing […]

Your organization has formed a task force to do an audit on the security of its systems.  This can be the organization you currently work for, have worked for, or are just very familiar with.  It may also be an “imaginary” organization.Your organization has formed a task force to do an audit on the security of its systems.  This can be the organization you currently work for, have worked for, or are just very familiar with.  It may also be an “imaginary” organization.

Scenario:  Your organization has formed a task force to do an audit on the security of its systems.  This can be the organization you currently work for, have worked for, or are just very familiar with.  It may also be an “imaginary” organization.  After performing the security audit, the task force will prepare a report […]

Privacy through time, safety over privacy to recent congress meetings to regain privacyPrivacy through time, safety over privacy to recent congress meetings to regain privacy

CSCI 2150 Spring 2024 Instructions of Term Paper Assignment Paper Description Students are required to produce a term paper, building upon and complementing the materials covered in the course. Some suggested topics are listed, but the topics are not limited in the list. It is expected that students select a topic early in the course, […]