Identify the target audience, the context, and the goal of the communication. Balance original content with supporting sources. Produce grammatically correct material in standard academic English that supports the communication.

Vulnerability Memo

Your task this week is to check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.

Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices.

For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product.

Use this Memo Template to record your work.

How Will My Work Be Evaluated?

In writing a clear and concise memo to inform management about potential vulnerabilities, you are demonstrating communication skills, technical expertise, and responsiveness to stakeholder needs and concerns.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.2.1: Identify the target audience, the context, and the goal of the communication.
1.3.4: Balance original content with supporting sources.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
2.1.1: Identify the issue or problem under consideration.
10.1.1: Identify the problem to be solved.
10.1.3: Define the specifications of required technologies.
12.1.1: Determine business needs that require policies, processes, and procedures.
12.3.1: Select controls.
12.3.2: Describe the implementation of controls.

This is the CVE website- https://cve.mitre.org/cve/

What are your career goals and plans for the future? Why do you want to pursue graduate school? Specifically address the question why you want to pursue the degree (MS or PhD) that you are applying for.

Statement of Purpose

Academia Goals

What are your career goals and plans for the future? Why do you want to pursue graduate school? Specifically address the question why you want to pursue the degree (MS or PhD) that you are applying for.

Prior experiences

Describe any recent relevant research or work experiences beyond regular curricular activities, including duration, level of independence, methods employed and outcomes, such as papers or theses. How has your prior experience prepared you for graduate studies in ECE? We are not interested in class projects or labs, school projects, or anecdotes from childhood unless they are specifically related to your desire for graduate studies.

Personal background

Provide any relevant context and personal background. What resources were available to you and how have you made the most of them to develop your career? If resources were lacking, how have you overcome that challenge? Consider resources broadly to include access to opportunities, facilities, and professional connections.

Broader contribution

Did you contribute to the broader impacts of electrical and computer engineering outside of academic or professional activities? For example, broadening the participation of underrepresented groups or dissemination of science to the public. How do you see yourself serving the profession and community in your future?

Academic interest

What are your academic and research interests going forward? What current topics in ECE research at UT Austin excite you? How do you envision contributing to research at UT ECE?

Explain to the client the security issues that are present on the Linux system. Discuss critical vulnerabilities that need to be addressed and the measures that may need to be taken to deal with the underlying security issues (additional staff, equipment, billable hours, etc.).

The System Scan Report.

Your report should include the following:

Introduction
Target System
Zenmap Scan
OpenVAS Scan
Open Socket Connection
Recommendations
References

How Will My Work Be Evaluated?

1.2.1: Identify the target audience, the context, and the goal of the communication.

Provide a brief introduction explaining the services performed and a summary at the end with the important findings of the scan. Validate your recommendations using industry-standard techniques. Include at least two to three references in IEEE format.

1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.

Make sure the report to the client contains grammatically correct language without any spelling or typographical errors. Explain industry acronyms when they are introduced since they may be unfamiliar to the client.

10.1.2: Gather project requirements to meet stakeholder needs.

The client has asked for a Zenmap scan, an OpenVAS vulnerability scan, and to use other accepted industry practices for the systems scan. You will need to include screenshots and note the application versions that are listed and displayed in the scan results.

12.2.1: Identify systems for the risk assessment.

During any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are scanning. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the test.

12.2.2: Perform a risk analysis.

Explain to the client the security issues that are present on the Linux system. Discuss critical vulnerabilities that need to be addressed and the measures that may need to be taken to deal with the underlying security issues (additional staff, equipment, billable hours, etc.).

13.1.1: Create documentation appropriate to the stakeholder.

In this section, recommend that you and your contractors perform a full penetration test on the target system. Mention the implications (ransomware, exfiltration, credential harvesting, etc.) that might occur if the security issues are not addressed.

Describe in detail your proposed Python System and the goal of your application.

Python application Proposal

Work on a proposal that you would do of an application/system you would like to develop as we move along. Submit your proposal to the instructor using the format below.

2. Describe in detail your proposed Python System and the goal of your application.

What types of sensors does it use? What are their limitations? What algorithms does it use? How does it work? What is the current state of the art of this technology? What are its current limitations?

Research Essay

Your work as a computer scientist mainly focuses on building or technically analyzing software and computer systems. In this project, and throughout the class, you will consider such systems within the context of larger political and social questions. As such, much of your work will be to analyze how technical decisions can have broad, rippling effects in our society. The first part of analyzing a sociotechnical system is to understand and explain it. A computer science education provides you a unique technical background to understand such systems, but also poses difficulties in reaching a non-technical audience.

1. Proposal (1 page)

Select a research subject. If you’re stuck, consider the following examples (do not use them, of course):

  • “EU’s Right to Explanation”
  • “Twelve Million Phones, One Dataset, Zero Privacy”
  • “The Dystopian Path to Bicycle Safety”
  • “On the Perils of Automated Face Recognition”
  • “Algorithms aren’t racist. Your skin is just too dark.”

Then, research it, keeping track of your sources along the way. You must include five citations (as embedded links in the text or in a bibliography) in your proposal.

Explain to a general audience how your chosen system works.
You may assume the audience is college educated, but be sure to carefully explain any jargon. Feel free to include diagrams if they help your explanation.

Consider questions such as:
What’s the conceptual or theoretical background on which this technology or system is based?
What data does the system require as inputs? What are its outputs?
(if it’s a cyber-physical system) How does it interact with the physical world?
What types of sensors does it use? What are their limitations?
What algorithms does it use? How does it work?
What is the current state of the art of this technology? What are its current limitations?
Articulate a sequence of events that brought it into existence in its current form.

For example, one cannot consider early American analog and electronic computers without also considering their role in the Manhattan Project.
Your proposal MUST contain 5 embedded live links directly relevant to you topic. You will get 0 points for not having them.
Do not use chatGPT to generate the proposal, We will run your paper through a tool that recognizes text generated via GPT 3. You will get 0 points if your paper is identified as such.

Do you believe that Domino’s multichannel digital ordering is an example of an IT-dependent strategic initiative? Explain.

Digital Value Creation

Read the Digital Value Creation at Dominoes Download Digital Value Creation at Dominoesmini-case. Answer and submit the discussion questions.

Discussion Questions
1.
Do you believe that Domino’s multichannel digital ordering is an example of an IT-dependent strategic initiative? Explain.
2.
Do you believe that the multichannel digital ordering initiative has the potential to create added value? Substantiate your answer.
3.
What would you do next if you were put in charge of the initiative?
4.
How do you judge Domino’s decision not to join food delivery aggregators?

 

Issues raised in the mini-case to be discussed in class and are to supplement future online discussions.

Do your work independently … Turnit it is activated. Submissions with similarity score greater than 20% will not be accepted. Full details on Academic Integrity are found in the Course Outline and the SFC Cord (online).

What factors must you take into in arriving at a decision on which laptop to buy. Produce a 300 word report on the specifications of the laptop explaining their key parameters.

Laptop

You are required to acquire a new laptop for your studies. What factors must you take into in arriving at a decision on which laptop to buy. Produce a 300 word report on the specifications of the laptop explaining their key parameters. Your report must include a comparison of 3 brands in terms of key requirements as well as cost.

Explain which approach offers the best security model for file-level security, and include a discussion of the use-cases. Support your opinion and defend your position using credible sources in APA format.

DISCUSSION ESSAY

  • Both Linux, like UNIX and Microsoft Windows operating system, is POSIX compliant EAL-4+ certified. Both have every file owned by a user and a group user. Most of the time in Linux, read, write and execute access is controlled solely on if you are the owner, a member of the owner group, or neither (aka others or the world). In contrast, most of the time on Microsoft Windows, extensive use is made of per files Access Control List to grant fine-grain control to files.
    • Explain which approach offers the best security model for file-level security, and include a discussion of the use-cases.
    • Support your opinion and defend your position using credible sources in APA format.
  • What disadvantages do you perceive with File Modules to automate Linux common management tasks?

 

 

 

Describe the technological innovation you selected. What role does it play in the revenue cycle process? Outline the process prior to the innovation.

Technology and the Revenue Cycle Process

Innovations in technology have impacted every aspect of health care, from the way in which patients seek their providers, to how organizations market themselves, to how claims are submitted to insurance companies for payment. Many of the nonclinical innovations focus on data collection and using the data for meaningful purposes, including billing and revenue cycle.

For your initial post, identify a technological innovation, such as electronic health record, billing software, or estimator tool. In your response, address the following:

  • Describe the technological innovation you selected.
  • What role does it play in the revenue cycle process?
  • Outline the process prior to the innovation.
  • What are the implications for reimbursement for organizations not utilizing the innovation? Examples include delayed reimbursements, improper coding, reduced reimbursements, and others

 

Choose one of the following nanotechnology areas and assess the benefits and drawbacks of this particular technology as it relates to national defense:

Nanotechnology in Defense

Write a two (2) page APA style paper with a minimum of two (2) sources.

Choose one of the following nanotechnology areas and assess the benefits and drawbacks of this particular technology as it relates to national defense:

Fabrics and materials such as armor or clothing intended to withstand extreme conditions
Nano-robotics
Nanotechnology in weapons
Nanotechnology in vehicles such as in passenger protection,
Fuel economy or operations