– write and submit a lab report of a minimum of 3 pages on what you learned in the lab, with screenshots and analysis of the following labs in testout. Please follow the attach instructions.
Cybersecurity Planning
Write Final Paper on “Web Application Authentication”
500 word research paper with at least 3 sources. There should be no lists. Include a meaningful title.
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Project 5: Administration Cybersecurity Policy Review
Project 5: Administration Cybersecurity Policy Review
Step 4: Project Practice – SIMTRAY Federal Cybersecurity Agency: Day 3
In this step, you should continue to explore the scenarios within SIMTRAY, “Federal Cybersecurity Agency: Find Your Way in Three Days.” If you have not already, you will most likely encounter the following topics in this exercise: classifying information types, intellectual property issues (intellectual property – cybersecurity), cybersecurity law, Common Criteria Evaluation and Validation Scheme (CCEVS), state cybersecurity law, broadband, and the TIE model. Document events that you experience in the exercise that might affect the federal policy. Think about how these issues will be affected by current or pending legislation and begin to explore how you might be able to influence Congress to pass appropriate legislation.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned and documented industry issues into a one-page report.
discussion
refer to the attached document in the uploads for details.
Python
Complete 4 questions in the attachment in Python program.
Seven Domain
Write a 3-4-page paper that clearly illustrates and fully explains the seven IT domains and details and fully explains the different risks and risk management policies that are needed to effectively mitigate risk in each domain. Address the importance of this kind of approach to the effective design of security policy. In addition, in order to clearly communicate the domains / policies to the average reader, you will use one diagram in completing the paper (no more than one page).
QUALITATIVE
QUALITATIVE Journal Submit Article Reviews Here
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
Recommending Network Technology
Assignment Content
- Research networks in the context of your project.
Write a 150-word response about which resource(s) you found to be most useful in terms of not only researching the different types of networks that exist, but which might be best for a given scenario. What criteria are you using, or thinking of using, to determine which type of network is most appropriate for your project?
Submit your assignment.
VB
Excel Basic
Robotics Industrial and consumer applications
Please read Chapter 10: Robotics – Industrial and consumer applications from the attached book and answer the following questions.
1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?
2. Watch the following two videos: https://www.youtube.com/watch?v=7Pq-S557XQU&t=6s and https://www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?
3. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes. (Read chapter 10 to answer this question)
4. Conduct research to identify the most recent developments in self-driving cars.
Answer these questions in APA 7th edition format and include atleast 4 references, including 2 scholarly references. All answers should be completed in total 4 to 5 pages. STRICTLY NO PLAGIARISM