WRITING

 

Writing Assignment:

From the Technical Communication textbook, under “Projects” (p. 14) at the end of Chapter 1, Item #1 under the ‘General’ category: “Write a memo to your boss, justifying reimbursement for this course. Explain how the course will help you become more effective on the job. (See Chapter 15 for memo elements and format.)”

In addition, request reimbursement for all the courses in the BS-CSIA Program, up to whatever dollar limit might be set by your employer (if there is such a limit). Be sure to provide a brief summary of each of the courses and how completion of the overall program will make you a better asset for the company.

If you are not currently employed (or in the military), or you do not want to use your real employer as the target audience, just write the assignment using a fictitious, medium-sized company where they have you and a few other cybersecurity staff and you are addressing the memo to the InfoSec supervisor/manager.

Strictly for identification purposes of this assignment, use the following information in the heading of the memo:

  • From – Your Name
  • To – Professor _________ (don’t write the memo ‘to’ the professor, your audience is your boss)
  • Date – Use the date of the assignment
  • Subject – Enter something appropriate for the topic
  • REF: – “CYB320 Week One Writing Assignment”

Other criteria:

  • Margins all 1 inch
  • Use 12pt font size only
  • Use a standard font style (e.g., Times Roman, Arial, Calibri)
  • Use 1.5 line spacing
  • Written memo should be 1.5 to 2 pages (no more than 2 pages)
  • CYB320 Week 1 Writing Assignment – Grading Rubric – PDF Document (138 KB)

Discussion paragraphs on Topic : Secure Internet of Things

You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3
  •                                                              References
  • Azka & Revathi, S. (2017). Protocols for secure internet of things. Journal of Education and Engineering, 7(2), 20. https://doi.org/10.5815/ijeme.2017.02.03
  • Poulter, A. J., Ossont, S. J., & Cox, S. J. (2020). Enabling the secure use of dynamic identity for the internet of things—Using the secure remote update protocol (SRUP). Future Internet, 12(8), 138. https://doi.org/10.3390/fi12080138
  • Prasad, G. S., Lal Chhagan, Sharma, L., Sharma, D. P., Gupta, D., Saucedo, J. A. M., & Kose, U. (2020). Reliable and secure data transfer in IoT networks. Wireless Networks, 26(8), 5689-5702.https://doi.org/10.1007/s11276-019-02036-0

Problem ransomware

 

Refer to the “Contemporary Issues in Science and Technology Research Guide,” located in the Course Materials, for complete instructions……………(PROBLEM:   RANSOMWARE).

Section 3: Possible Feasible Solutions

Now that you have clearly defined the problem and gathered data that validates it, it is time to propose the solution.

In a Microsoft Word document that is 500–750 words, include the following:

  1. Outline the possible/feasible solutions.
  2. Provide a justification for the chosen solution and
  3. Describe the process that was used to choose the solution. This should include what ethical, social, and economic considerations were made in choosing your solution. Specifically explain how a moral and ethical decision was made. Provide Biblical citations to support the decision and explain the relevance. 
  4. Explain what guidance the professional organizations in your field offered. How did this impact the solution choice?

NOTE- MAKE EACH QUESTION A HEADING AND MAKE USE OF THE ATTACHMENT TO DO THE ASSIGNMENT. 

IT470 week 9

Week 9 – Discussion 9

Security threats and best practices:

In 350 words please explain the security implications For each of the following terms:  Of the cloud, Software definition network (SDN) , Internet of things(IoT),  and NFV.  Please explain the security threats and best practices for each term and provide examples and good supporting rationale.

Make sure to respond to other classmates with a minimum of two posts. Also remember to load your word file to the Uni check folder under week nine. Maximize your efforts for this DQ as it will feed into your presentation for week 10.

Reach out if you have any question

thank you

Discussion 1- Planning Project

Assigned Readings:Chapter 1: Project Management: Past and PresentChapter 2: Project Management OverviewChapter 3: The Project Life Cycle (Phases)Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. How does the application of a phased approach to project management vary in different industries? Do you think that the phases work the same in construction as they do in event management or software development?
  2. In what ways can the following activities be seen as projects? In what ways do they resemble ongoing, routine business activities? Feel free to add assumptions and details to describe how the activity might be a project in one context and routine in another. 
    1. Reading the chapter before attending a university lecture.
    2. Taking the bus to work each day.
    3. Piloting an aircraft between Vancouver and Fiji.
    4. Teaching a course for the first time; teaching the same course every semester.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

Discussion 4

Read classmates post and respond with 50 words;

Radiology guidelines fall under the following:  professional, technical, and global.  Professional relates to the services of the physician which includes the supervision of the taking of the x-rays well as the interpretation and report of said x-ray films.  Technical relates to the services of the technologist as well as the use of the equipment, film and other supplies.  Global combines both of the professional and technical guidelines component.  These guidelines provide the template for those who work in the radiology field when documenting the services and for those who code the services provided for billing purposes.

Reference

Carol J. Buck, Saunders (2022) Step by Step Coding.  Carol J. Buck, Saunders

Data science&Data Analyst

 Discuss the differences between a data scientist and a data analyst. Review several job descriptions at indeed.com and other cites to determine some of the most important skills necessary for each of them.