Analysis the given pdf.


  • Analysis (analysis of the materials that may be included in the case appendix)
  • Provide only a summary of your analysis in this main part of the document.  Include any detailed findings, calculations, tables, etc. in your appendices. 

discussion board

Mike Reynolds in his Beer Can house, 1975

1. The concern over deforestation has created a demand for greener construction materials and novel approaches to sustainable architectural design. Green architects, such as Mike Reynolds, use materials such as tires, cans & bottles, rammed earth, and straw bales to build homes.  What problems or benefits do you think may arise from Reynold’s approach to domestic architecture?  Should ecological concerns be important to homeowners & architects?  Why or why not?

Net Defense

 2pages and 3 refs

A new vulnerability in Linux was recently reported, dubbed Dirty Pipe. CVE-2022-0847


What is Dirty Pipe? 

What does it allow you to do? What versions of Linux are affected?

 How was it discovered?

 Are there other related or similar issues (the website mentions Dirty Cow, so answers to the same questions are relevant)?


The goal of this assessment is to give learners the opportunity to demonstrate their ability to produce a risk assessment for a Fintech company based on a given scenario.


Your client is a growing, Dublin-based, Fintech business with 60 staff, 40 of these employees have been recruited in 6 months. 90% of the staff are currently working from home using a mix of company and personal IT devices. The company handles sensitive databases and records as part of its typical business practice. The company is also involved with software development. The IT department handles the day-to-day data security. This will be the first formal risk assessment undertaken at the company. 

The CEO has a good understanding of cybersecurity and is eager to comply with regulations and protect the company from cyber-risks. 

As a reference point, the following website is a company similar to the one we are working with: 

What factors would need to be examined in a risk assessment process?
Have we documented and assessed the assets which need to be protected?
Which risk mitigation actions need to be considered?
Are there data policy documents that need to be in place?
What factors would benefit the overall cybersecurity posture of the company? 

Your Task: Provide a risk assessment report focused on identifying and mitigating risks within the organization.