bswa week14 p14

Hello,

i need this paper by 4/28 afternoon 12am.

Strictly No plagiarism please use your own words.

Research the Dark Web.

Write a brief paper on the following topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

Write 300 words.  

Use your own words.

 https://www.youtube.com/watch?v=BN1NU0ivzj8

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

PHYSICAL CYBER SECURITY

LO1: Develop a systematic understanding and critical awareness of the security threats affecting Cyber Physical Systems and the mechanisms to prevent, detect and mitigate attacks.

• LO2: Identify and evaluate appropriate solutions for building secure Cyber Physical Systems; apply advanced techniques and tools to deal with cross-cutting security concerns in different domains.

• LO3: Demonstrate advanced skills in research, problem solving and communication; be a self-directed, independent learner showing initiative and personal responsibility.

Create an ArrayList of strings and call it parks. Read in the names of national parks from the user until the user enters done (or DONE, or dOnE, .. ) Keep in mind, that the names of some national parks consist of more than one word, for example, Mesa V

 

  • Create an ArrayList of strings and call it parks.
  • Read in the names of national parks from the user until the user enters done (or DONE,
    or dOnE, .. )  Keep in mind, that the names of some national parks consist of more than one word, for example, Mesa Verde.
    As you read in the national parks, add them to the list.
  • Next, we are going to build a string based on the elements in the list parks. Since the text keeps changing as we add one park at a time, we use class StringBuilder for this task.  
  • Use a StringBuilder  called sb to create the string  nationalParks  .
  • Loop through all the elements of the list  parks and add them one at a time.
    The resulting string should have the following format:
    Favorite National Parks: {park1} | {park2} | . . . | {parkN}
    The parks are separated by a space, a vertical bar, and another space. However, there is no vertical bar after the last element. {park1}, {park2}, {parkN} are the various list elements with updated spelling.
  • Create a private method to update the spelling.
    We can’t control whether the user enters the park names in uppercase or lowercase letters. However, we can change the names to a spelling where all letters are lowercase except for the first letters of each individual word. In order to make those changes, create a private method called updateSpelling. It has the following method header:
    private static String updateSpelling(String text)
    E.g.: When you pass the string “MESA VERDE” the method returns “Mesa Verde”
    E.g.: When you pass  “yEllOwstOnE” it returns “Yellowstone”
    E.g.: Passing “black canyon of the gunnison” returns “Black Canyon Of The Gunnison”
    E.g.: Passing  “Denali” returns “Denali”

Week 6 Python

 You are going to enhance the prior assignment by doing the following1) Use list to create a menu2) Create a function the will return the results of the four operations in a dictionary allInOne(n1,n2)Sample output

1) Add two numbers

2) Mult two number

3) Divide

4) Scalc

5) all in one ..

6) …

res=allInOne(5,2)

The results will be return in this format;

res is dictionary {“add”:7, “sub”:3, “mult”:10, “div”:2.5)

from res, you are going to print

5 + 2 = 7

5 – 2 = 3

5 * 2 = 10

5 / 2 = 2.5

Info Security & Risk Mgmt

identify one U.S. compliance law and describe its impact. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.

250 to 300 words

Discussions and Portfolio Project: ITS-833: Information Governance

Discussion1: Information Governance for E-Mail

Word count: 300

We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation? Support with references.

Remember to cite your sources and critically respond to two other learners.* Share an applicable personal experience
* Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post.

Discussion 2: Forum: The Role of Blockchain in Information Governance

Word count: 300

While blockchain is successful with cryptocurrencies, it is also beneficial for information governance in businesses. After reading this article  (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.

Remember to cite your sources and critically respond to two other learners.* Share an applicable personal experience
* Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
*  At least one scholarly source should be used in the discussion. Be sure to use information from your readings. Use proper citations and references in your post.

Project:


1.
Portfolio Project: Milestone 1: Introduction – COMPLETED: https://www.homeworkmarket.com/questions/discussion-and-portfolio-project-its-833-information-governance

2. Portfolio Project: Milestone 2: Annotated Bibliography & Literature Review

Word count: 4 pages (Annotated Bibliography- 2 pages, Literature Review- 2 pages)

This is the second milestone of the portfolio project.

For milestone 2, you will develop an annotated bibliography and write the literature review for the final project. The entire milestone should be a minimum of 4 pages (excluding title and reference page) with 10 peer-reviewed scholarly articles.   

You must include at least one figure or table. These must be of your own creation. Do not copy from other sources.

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted.  

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department. The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business, or customers. The company also desires to leverage the marketing power of social media but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective. The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Reading Resources: 

Chapter 13 – Information Governance for Social Media
Chapter 14:  Information Governance for Mobile Devices

Ahmed, J., Yildirim, S., Nowostaki, M., Ramachandra, R., Elezaj, O., & Abomohara, M. (2020). GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach. 2020 3rd International Conference on Information and Computer Technologies (ICICT), Information and Computer Technologies (ICICT), 2020 3rd International Conference on, ICICT, 307–312.  https://ieeexplore.ieee.org/document/9092226

Elsayed, M., Abdelwahab, A., & Ahdelkader, H. (2019). A Proposed Framework for Improving Analysis of Big Unstructured Data in Social Media. 2019 14th International Conference on Computer Engineering and Systems (ICCES), Computer Engineering and Systems (ICCES), 2019 14th International Conference On, 61–65. https://ieeexplore.ieee.org/document/9068154

Jackson, O. (2018). GDPR: companies at risk over unstructured data. International Financial Law Review, N.PAG.

Limantara, N., Kosala, R., Ranti, B., & Supangkat, S. H. (2019). Human and Technology Factors in the Readiness to Use Smart Mobile Devices in Learning Activities. 2019 International Conference on ICT for Smart Society (ICISS), ICT for Smart Society (ICISS), 2019 International Conference On, 7, 1–5. https://ieeexplore.ieee.org/document/8969827

Rothstein, M. A., Wilbanks, J. T., Beskow, L. M., Brelsford, K. M., Brothers, K. B., Doerr, M., Evans, B. J., Hammack-Aviran, C. M., McGowan, M. L., & Tovino, S. A. (2020). Unregulated Health Research Using Mobile Devices: Ethical Considerations and Policy Recommendations. Journal of Law, Medicine & Ethics, 48, 196–226. https://doi.org/10.1177/1073110520917047

Shankar, A., & Kumari, P. (2019). A Study of Factors Affecting Mobile Governance (mGov) Adoption Intention in India using an Extension of the Technology Acceptance Model (TAM). South Asian Journal of Management, 26(4), 71–94.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 3 assignments. Please provide answers in separate documents.