Discipline: Computer science

Testing Types and Levels [WLOs: 1, 2, 3] [CLOs: 1, 2, 3] Testing Types and Levels [WLOs: 1, 2, 3] [CLOs: 1, 2, 3]Testing Types and Levels [WLOs: 1, 2, 3] [CLOs: 1, 2, 3] Testing Types and Levels [WLOs: 1, 2, 3] [CLOs: 1, 2, 3]

Prior to beginning work on this learning activity, read Chapter 3 from the course text, Software Testing Foundations. Over the next four weeks, you will build concept maps using a software such as PowerPoint or Draw.ioLinks to an external site.. Although these concept maps are separate assignments, they will prepare you for your final project in Week […]

Excel 2A Tree Inventory (requires textbook) (PC and Mac) and Word 3A Quantitative Technology (requires textbook) (PC and Mac)Excel 2A Tree Inventory (requires textbook) (PC and Mac) and Word 3A Quantitative Technology (requires textbook) (PC and Mac)

                                           Part 1 of the Assignsment    Excel_2A_Tree_Inventory Project Description: In the following activities, you will edit a worksheet for Holeman Hill, President, detailing the current inventory of trees at the Pasadena nursery. Steps to […]

Week 2 – Assignment UML Models and Testing Levels [WLOs: 1, 2, 3, 4] [CLOs: 1, 2, 3, 4]Week 2 – Assignment UML Models and Testing Levels [WLOs: 1, 2, 3, 4] [CLOs: 1, 2, 3, 4]

Prior to beginning work on this assignment, read Chapter 3 and 4 from the course text, Software Testing Foundations. In addition, review the final project in Week 5. This assignment is Part 2 of your final project. You will need the software requirements specification (SRS) document you developed in Week 1 to complete this assignment. In […]

Week 1 – Assignment Software Requirements Specifications [WLOs: 2, 3] [CLOs: 1, 2]Week 1 – Assignment Software Requirements Specifications [WLOs: 2, 3] [CLOs: 1, 2]

Prior to beginning work on this assignment, review Chapters 1, 2, and Appendix A from the course text, Software Testing Foundations. In addition, review the final project in Week 5, especially The eCommerce Problem StatementLinks to an external site.. This assignment is Part 1 of your final project. In your paper, Review the Software Requirements Specification for Links […]

Aligning an IT security assessment – Risks, Threat and Vulnerability – To achieveAligning an IT security assessment – Risks, Threat and Vulnerability – To achieve

Introduction: RISKS OCCUR when threats can exploit vulnerabilities. With this in mind, it becomes very important to identify and analyze threats and vulnerabilities. You can do so with threat assessments, vulnerability assessments, and exploit assessments, which are part of IT security assessments. That being said, IT security assessments are more technical, more focused, and, in the […]

Defining a Process for Gathering Information Pertaining to a GLBA Compliance AuditDefining a Process for Gathering Information Pertaining to a GLBA Compliance Audit

Introduction A financial institution is like any other business in that it aims to maintain or raise its profits.  It is safe to assume that some financial institutions—faced with the choice between safeguarding an individual’s information and safeguarding the institution’s overhead costs—would lean toward lowering costs. Once the Gramm-Leach-Bliley Act (GLBA) was enacted in 1999, such […]

Aligning an IT Security Assessment—Risks, Threats, and Vulnerability— to Achieve ComplianceAligning an IT Security Assessment—Risks, Threats, and Vulnerability— to Achieve Compliance

Introduction  In general, security assessments are more technical, more focused, and, in the case of penetration testing, more targeted than an audit. Comparatively speaking, the auditor takes the broader, holistic view. Nevertheless, an auditor still needs to gather reliable and relevant evidence to measure compliance. What happens when the auditor lacks the technical skills to gather […]

Defining a Process for Gathering Information Pertaining to a HIPAA Compliance AuditDefining a Process for Gathering Information Pertaining to a HIPAA Compliance Audit

Introduction It’s important for health care companies to understand the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its privacy and security rules. The act applies not only to doctors and hospitals but to all health care providers and researchers who are able to share patient information that’s classified as private. HIPAA was […]

research paper deliverable 4 – Primary Study Selection based on Abstract Readingresearch paper deliverable 4 – Primary Study Selection based on Abstract Reading

At this point, you already have your search queries and the four databases where you will execute your searches. You can find this information in your submission for the following assignment: CSIT 590: Research Paper Deliverable 2 – Search Queries and Databases   For this deliverable (i.e., Deliverable 3), you will now submit the results of your […]