Discussion – Information Governance(Reflection Activity)

Note: Please write as per the attached course syllabus and textbook.

 

In the last week of class, we are going to complete a reflection activity.

This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book.

Items to include in your initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

3 Discussions and 2 case studies….

Discussion 2.2

Due: Initial Post due Friday, Replies due Sunday

Explain what is the “Nuclear NonProliferation” treaty?

Discussion 3.1

Due: Initial Post due Wednesday, Replies due Sunday

Who or what are non-state hackers? Provide a brief explanation of a non-state hacker. 

Discussion 3.2

Due: Initial Post due Friday, Replies due Sunday

Who do you think is more of a threat to world peace and why?

Case Study 2.1

Due: Sunday, End of Module by 11:55 p.m. EST

The Intelligence Operations Process.  

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced

Case Study 3.1

Due: Sunday, End of Module by 11:55 p.m. EST

Describe the following:: zero-day attacks, advanced malware, social engineering and phishing, and strategic Web compromises. Provide a clear explanation of each. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)

3-4 pages APA Paper for 1Q, 2Q, 3Q.

1Q. The type(s) of WiFi access points needed for the business layout

2Q. The use of the 2.4 GHz and/or the 5GHz bands

3Q. How you may overcome obstacles in the office or building environments for WiFi access point placement 

with summary. 

blkchn devlopment

   choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes.   

Community of practice in IT

This week we focus on some additional terms for IT users.  This week let’s discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?

Your response should be 250-300 words.  

Week 3 project paper Outline

Instructions

Week 3 Project Paper Outline:

Write an outline for your paper addressing a course-related topic, such as operating system security issue, such as hardening, malware removal, establishing proper policies and permissions, protection against network threats, etc.

The outline should:

1. Be 1-2 pages or about 500 words

2. Include a title page

3. Include an introduction paragraph

4. Include paragraph headers and subheaders – write a paragraph for each header/subheader explaining what you will plan in writing in the particular header/subheader

5.Include a references page

6. All in APA format

HTML/CSS responsive design

 

  • A new website of at least three HTML pages with images, text, and hyperlinks (4 points)
  • Media queries on each page and three different style sheets associated with the media queries (3 points)
  • HTML structure (div, section, header, etc.) tags added to logical sections of the HTML on all pages (1 point)
  • The CSS flex property used to position div sections next to other sections (1 point)
  • Smartphone layout should be optimized for narrow browser widths; tablet and desktop layouts should be optimized for wider browsers (1 point)

Continuously working on the files.

Cmgt555

Look at attachments for questions need all complete some questions have a 2 part