To explore a semiconductor company’s journey towards digitalization and servitization by adopting online and AR technologies to provide business continuity during the COVID-19 lockdowns and to develop a guideline towards digitalization and servitization for other companies to implement while avoiding the service paradox:Discuss?

To explore a semiconductor company’s journey towards digitalization and servitization by adopting online and AR technologies to provide business continuity during the COVID-19 lockdowns and to develop a guideline towards digitalization and servitization for other companies to implement while avoiding the service paradox:Discuss?

Is this following code segment safe? Explain why or why not?

Buffer Overflow
Question 1:

Draw and explain a function stack . Be sure to communicate what is happening and what will happen when the strcpy occurs. Use the following C code to depict the stack/heap like the slides 15 in the buffer overflow teaching materials. [20 point]

Question 2:

Is this following code segment safe? Explain why or why not? [10 points]

What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?

Determine the implications involved in the design of an internet of things (IoT) software application

How would you explain what each IoT device does to someone who has little to no experience with the internet of things or cloud computing?

What features does each IoT device offer?

How are the IoT devices installed and configured?

How could this IoT device be used in schools and classrooms?

Explain how cloud computing is inexorably linked to IoT, explain how IoT data is stored, and describe the vulnerabilities, risks, and issues with such devices.

How are cloud computing and the internet of things connected?

How is data from the IoT devices collected and stored?

What are the vulnerabilities, risks, and other issues involved?

What are the layers of an IoT architecture?

Are there any privacy errors in the architectural design?

Are there errors that reduce the accuracy, consistency, or trustworthiness of the data collected and stored on any of the devices?

What are the system uptime, software updates, connection with the internet, or maintenance requirements based on the devices? How can internet providers affect systems?

How do your solutions improve user privacy?

How do your solutions improve the integrity of the data?

How do your solutions affect the availability of the system? Do they change the maintenance times?

What are ethical stances that both IT and educational professionals would need to consider if they integrate YODAE’s IoT devices into schools?

What seems right or wrong about these devices, and why?

Is there a specific IoT device that seems problematic for the context that it will be implemented in?

Just because these products are on the market, should you promote them and encourage the use of them?

 

 Explain the fundamentals of cloud computing and related security issues because your company is migrating to the cloud.

Cloud Computing: Cloud Presentation

As organizations increasingly move toward cloud technology, a cybersecurity professional should be familiar with the effect(s) it has on security.

Explain the fundamentals of cloud computing and related security issues because your company is migrating to the cloud.

Describe each type of service/model of cloud computing.( see attachment as a reference)

Compare and contrast: local resource requirements, local control, network requirements, and security (attacks, mitigations, overall vulnerability).

Additionally, ensure you cover the following topics in the report:

1. Virtualization platforms

2. Cloud services (SaaS, PaaS, DaaS, IaaS)

3. Service-oriented architectures

4. Deployment models (private, public, community, hybrid)

5. Security, storage, legal/privacy issues

Support the report with a minimum of three scholarly resources.