stayer cis 513 week 7 case study 2 security in bluetooth and other mobile devices new,stayer cis 513 week 6,cis 513 week 6,stayer cis 513 week 6 tutorial,stayer cis 513 week 6 assignment,stayer cis 513 week 6 help
stayer cis 513 week 7 case study 2 security in bluetooth and other mobile devices new,stayer cis 513 week 6,cis 513 week 6,stayer cis 513 week 6 tutorial,stayer cis 513 week 6 assignment,stayer cis 513 week 6 help
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Cybersecurity - Needs and Barriers of SMEsCyber Watching
Samuel Fricker (Ph.D., Professor of requirements engineering at FHNW University of Applied Sciences and assistant professor at Blekinge Institute of Technology) will talk about the results of a research report developed under the SMESEC project focusing on SME needs when it comes to cybersecurity. He would also talked about SMESEC project, which aims to support SMEs in the area of cybersecurity in two different ways. On the one hand, by providing a framework with different tools and mechanisms for identification, protection, detection and response of systems and, on the other hand, cybersecurity training and awareness
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Brad Andrews, CEO, RBA Communications
Gaining Your STRIDE – Applying S.T.R.I.D.E. to a system
This session is a continuation of Part 1 and will briefly look at the components of the STRIDE model often used as a part of threat modeling. These are Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege. We will then seek to work to find out what threats Amazon.com might face using the diagram we developed in the previous session. This session will expect those present to be involved in raising potential risks. Other systems may also be covered if we have time remaining in the session.
Use of Amazon.com is the only likely experience of most participants, but even that is not required. The goal is to work with something everyone can relate to, not to expose insider information for a specific company.
stayer cis 513 week 7 case study 2 security in bluetooth and other mobile devices new,stayer cis 513 week 6,cis 513 week 6,stayer cis 513 week 6 tutorial,stayer cis 513 week 6 assignment,stayer cis 513 week 6 help
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Cybersecurity - Needs and Barriers of SMEsCyber Watching
Samuel Fricker (Ph.D., Professor of requirements engineering at FHNW University of Applied Sciences and assistant professor at Blekinge Institute of Technology) will talk about the results of a research report developed under the SMESEC project focusing on SME needs when it comes to cybersecurity. He would also talked about SMESEC project, which aims to support SMEs in the area of cybersecurity in two different ways. On the one hand, by providing a framework with different tools and mechanisms for identification, protection, detection and response of systems and, on the other hand, cybersecurity training and awareness
International Journal of Software Engineering & Applications (IJSEA)ijfcst journal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Brad Andrews, CEO, RBA Communications
Gaining Your STRIDE – Applying S.T.R.I.D.E. to a system
This session is a continuation of Part 1 and will briefly look at the components of the STRIDE model often used as a part of threat modeling. These are Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege. We will then seek to work to find out what threats Amazon.com might face using the diagram we developed in the previous session. This session will expect those present to be involved in raising potential risks. Other systems may also be covered if we have time remaining in the session.
Use of Amazon.com is the only likely experience of most participants, but even that is not required. The goal is to work with something everyone can relate to, not to expose insider information for a specific company.
Brad Andrews, CEO, RBA Communications
Evaluating DREAD – Applying D.R.E.A.D. to the results of STRIDE.
This session is a continuation of Parts 1 and 2 and will apply the DREAD model to the threats we found in the previous session. We will start by discussing the elements of the DREAD model that is often used to evaluate risks to systems that are identified in threat modeling. These are Damage, Reproducibility, Exploitability, Affected Users, Discoverability. We will then work through the threats found in the previous session. This will continue the focus on Amazon.com and go to other systems if time is available. This session will expect those present to be involved in finding and suggesting values for each of the DREAD elements as they apply to the covered risks.
ECSA an advanced ethical hacking Training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking.
PASTA allows organizations to understand an attacker’s perspective on applications and infrastructure, thus developing threat management processes and policies. Let’s learn more about PASTA threat modeling in this slideshare. To know more about threat modeling, click here: https://www.eccouncil.org/threat-modeling/
Security is the first concerning criteria in software development. Here, we will know about the role of developer and information security staff. The Secure Software development model (S-SDLC) is also described here.
Do you know what the steps of threat modeling and various models are? Take a look at these slides to learn.
To learn more about threat modeling, visit https://www.eccouncil.org/threat-modeling/
A Review paper on Securing PHP based websites From Web Application Vulnerabil...Editor IJMTER
In today’s Era, Web applications are one of the most part ubiquitous platforms for
information sharing and services over Internet which play significant role in individual life as well
as in any country’s growth. Web applications have gone through a very rapid Growth As they are
increasingly used for the financial organization, government, hospitality and many critical services.
Web applications become a popular and precious target for security attacks. at the present time,
billions of transactions are done online through net banking, online shopping, online billing and
many more. Even though these applications are used by lots of people modern web applications
often implements the complex structure requires for user to carry out actions in given order, in
many cases the security level is too low, which makes them vulnerable to get compromised. Even
though a large number of techniques have been developed to build up web applications and
mitigate the attacks toward web applications, there is little effort constant to drawing relations
among these techniques and building a big picture of web application security(WAS) research. In
this paper, we present a survey on various types of web application vulnerabilities(WAV).
AJS 572 Effective Communication - tutorialrank.comBartholomew6
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 3 Times, Rating: A+
AJS 572 Week 1 Individual Assignment Overview of Information Systems and Technology Paper
AJS 572 Week 2 Individual Assignment Trends in Cybercrime Paper
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
Question 1
Which attack is prevented by using IPSec in AH mode?
• Question 2
Why is the default implementation of ISS 6.0 more stable than previous versions?
• Question 3
Which authentication option for IPSec is most appropriate when computers are not in the same Active Directory forest?
• Question 4
Brad Andrews, CEO, RBA Communications
Evaluating DREAD – Applying D.R.E.A.D. to the results of STRIDE.
This session is a continuation of Parts 1 and 2 and will apply the DREAD model to the threats we found in the previous session. We will start by discussing the elements of the DREAD model that is often used to evaluate risks to systems that are identified in threat modeling. These are Damage, Reproducibility, Exploitability, Affected Users, Discoverability. We will then work through the threats found in the previous session. This will continue the focus on Amazon.com and go to other systems if time is available. This session will expect those present to be involved in finding and suggesting values for each of the DREAD elements as they apply to the covered risks.
ECSA an advanced ethical hacking Training certification that complements the Certified Ethical Hacker, CEH certification by exploring the analytical phase of ethical hacking.
PASTA allows organizations to understand an attacker’s perspective on applications and infrastructure, thus developing threat management processes and policies. Let’s learn more about PASTA threat modeling in this slideshare. To know more about threat modeling, click here: https://www.eccouncil.org/threat-modeling/
Security is the first concerning criteria in software development. Here, we will know about the role of developer and information security staff. The Secure Software development model (S-SDLC) is also described here.
Do you know what the steps of threat modeling and various models are? Take a look at these slides to learn.
To learn more about threat modeling, visit https://www.eccouncil.org/threat-modeling/
A Review paper on Securing PHP based websites From Web Application Vulnerabil...Editor IJMTER
In today’s Era, Web applications are one of the most part ubiquitous platforms for
information sharing and services over Internet which play significant role in individual life as well
as in any country’s growth. Web applications have gone through a very rapid Growth As they are
increasingly used for the financial organization, government, hospitality and many critical services.
Web applications become a popular and precious target for security attacks. at the present time,
billions of transactions are done online through net banking, online shopping, online billing and
many more. Even though these applications are used by lots of people modern web applications
often implements the complex structure requires for user to carry out actions in given order, in
many cases the security level is too low, which makes them vulnerable to get compromised. Even
though a large number of techniques have been developed to build up web applications and
mitigate the attacks toward web applications, there is little effort constant to drawing relations
among these techniques and building a big picture of web application security(WAS) research. In
this paper, we present a survey on various types of web application vulnerabilities(WAV).
AJS 572 Effective Communication - tutorialrank.comBartholomew6
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 3 Times, Rating: A+
AJS 572 Week 1 Individual Assignment Overview of Information Systems and Technology Paper
AJS 572 Week 2 Individual Assignment Trends in Cybercrime Paper
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
Question 1
Which attack is prevented by using IPSec in AH mode?
• Question 2
Why is the default implementation of ISS 6.0 more stable than previous versions?
• Question 3
Which authentication option for IPSec is most appropriate when computers are not in the same Active Directory forest?
• Question 4
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on
For more classes visit
www.snaptutorial.com
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
Case Study: The Ethical Hacker
Due Week 3 and worth 70 points
Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network
Assignment 2 Implementing Network and Personnel Security Meas.docxannrodgerson
Assignment 2: Implementing Network and Personnel Security Measures
Due Week 8 and worth 100 points
The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.
Write a four to five (4-5) page paper in which you:
1. Create an information flow diagram, using Visio or Dia, which:
a. Illustrates how remote users will securely connect to the government agency’s network.
b. Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to
server.
Note: The graphically depicted solution is not included in the required page length.
2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:
a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.
b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.
3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:
a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
b. Indicate specific activities, personnel / resources required, and frequency of execution.
4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic assets.
5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
recommendations with your response.
6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security ...
STRAYER BUS 375 Final Exam Part 1 (2 Set) NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/bus-375-strayer/bus-375-final-exam-part-1-2-set-new
For more classes visit
http://www.assignmentcloud.com
• Question 1 Most of the scheduling methods available today require the project manager to classify the project as either _______ constrained or ______ constrained.
• Question 2 In reviewing the status of her project with top management, Shirley was told that there are only two programmers that she can use for her project. Her project is classified as __________ constrained.
• Question 3 Gene is trying to order the concrete needed to continue his project. However, the supplier will not be able to deliver it until next week. This is an example of what kind of resource constraint?
ash edu 673 week 2 assignment setting the stage for success new,edu 673 week 2 dq 1 new,ash edu 673 week 2,ash edu 673,edu 673 assignment setting,ash edu 673 week 2 tutorial,ash edu 673 week 2 assignment,ash edu 673 week 2 help
V grand canyon university nrs 429 v week 5 assignment clc newaaronabrahhaam
nrs 429v week 5 discussion 1 how can health education enhance health promotion for this family? new,nrs 429v week 5 discussion 2 determine if a family is dysfunctional or not? new,nrs 429v week 5 assignment clc new,grand canyon university nrs 429v,nrs 429v,grand canyon university nrs 429v week 5 tutorial,nrs 429v week 5 assignment,grand canyon university nrs 429v week 5 help
V grand canyon university nrs 429 v week 2 assignment health promotion among ...aaronabrahhaam
nrs 429v week 2 discussion 1 health disparity and structural violence new,nrs 429v week 2 discussion 2 diversity among individuals new,nrs 429v week 2 assignment health promotion among diverse populations american indian and alaskan native health status new,grand canyon university nrs 429v,nrs 429v,grand canyon university nrs 429v week 2 tutorial,nrs 429v week 2 assignment,grand canyon university nrs 429v week 2 help
V grand canyon university nrs 440 v week 3 reflection paper newaaronabrahhaam
nrs 440 v week 3 reflection paper new 2 papers, grand canyon university nrs 440v,nrs 440v,grand canyon university nrs 440v week 3 tutorial,nrs 440v week 3 assignment,grand canyon university nrs 440v week 3 help
Chamberlain college of nursing nr 602 week 1 case study discussion initial vi...aaronabrahhaam
nr 602,chamberlain college of nursing nr 602,nr 602 entire course,chamberlain college of nursing nr 602 week 1,chamberlain college of nursing nr 602 week 2,chamberlain college of nursing nr 602 week 3,chamberlain college of nursing nr 602 week 4,chamberlain college of nursing nr 602 week 5,chamberlain college of nursing nr 602 week 6,chamberlain college of nursing nr 602 week 8,nr 602 tutorials,nr 602 assignments,nr 602 help
Strayer pad 505 assignment 3 presenting the budget newaaronabrahhaam
pad 505,strayer pad 505,pad 505 entire course new,strayer pad 505 assignment 1,strayer pad 505 assignment 2,strayer pad 505 assignment 3,strayer pad 505 assignment 4,strayer pad 505 assignment 5,strayer pad 505 tutorials,strayer pad 505 assignments,pad 505 help
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Stayer cis 513 week 7 case study 2 security in bluetooth and other mobile devices new
1. STAYER CIS 513 Week 7 Case Study 2 Security in Bluetooth and
other Mobile Devices NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-513-stayer/cis-513-week-7-case-
study-2-security-in-bluetooth-and-other-mobile-devices-new
For more classes visit
http://www.assignmentcloud.com
CIS 513 Week 7 Case Study 2
Case Study 2: Security in Bluetooth and other Mobile Devices
Before supporting mobile and wireless devices, organizations need to ensure that they have analyzed the potential security and implementation issues associated with
those devices. Additionally, they need to ensure that they have taken the proper precautions and implemented the proper security controls to mitigate vulnerabilities.
Read the NIST Draft SP 800-164, Guidelines on Hardware-Rooted Security in Mobile Devices, located at http://csrc.nist.gov/publications/drafts/800-
164/sp800_164_draft.pdf.
Write a four to five (4-5) page paper in which you:
Based on what you read in the NIST SP 800-164 publication, select an industry (such as Banking, Finance, Education, or Healthcare) and assess the security risks and
vulnerabilities associated with mobile devices in this environment. Describe the security controls that this industry needs to implement to mitigate wireless
vulnerabilities.
Assess the strategic implications of deciding to implement wireless and mobile technologies into the selected industry environment.
Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.
Establishing multiple layers of defense is important in security. Describe why and how the different types of security controls are necessary to mitigate potential security
issues. Describe how the types of radio signals and structure of wireless and cellular networks impact the security of wireless networks.
Create a Network Architecture diagram depicting the layers of security controls to mitigate security threats in a large corporate environment through the use of graphical
tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page
are not included in the required assignment page length.