Policy Legal Ethics

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. what do each of these terms refer to: copyright, patent, trademark, trade secret?

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century?

4. What is the Fair Use doctrine?

5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

7. What was the 1984 Sony Supreme Court case about?

8. Was Napster responsible for the actions of its users?

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

3/3 Discussion

  1. Read Chapters 9–13 in your textbook.
  2. Using the discussion link below, respond to the following prompts and questions:
    1. Identify the security components necessary to protect the information systems infrastructure. What key hardware components should be implemented?
    2. Why are authentication methods important in assuring that only authorized users are accessing the system? Classify the levels of access controls.
    3. Explain the use of an intrusion detection system (IDSs). How does such a system identify an intrusion? Differentiate between network level and host-based IDSs.
  3. Your initial post should be at least 300 words and supported with at least three references.

“The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

 1 Page

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss

 1) the data that matters to the executives in that industry, 

2) who, within that industry, needs that data, and

 3) some methods for ensuring that the critical data gets into the users’ hands.

Linux Forensic

 Assignment Requirements
You are an experienced digital forensics specialist for DigiFirm Investigation Company. DigiFirm is involved in an investigation of a large corporation accused of unauthorized access of a competitor’s database to obtain customer information. The DigiFirm team will be responsible for the forensic investigation of the seized computers that are running Linux.Chris, your team leader, has asked you to research information and tools that the team can use during the investigations.For this assignment:

  1. Research websites that provide information or tools for Linux forensic investigations.
  2. Write a report that describes three of the most promising websites in detail and discusses why these resources might be helpful in a forensic examination.

Required Resources

  • Course textbook
  • Internet access

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
 

Database essay 10

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.   

Do not copy without providing proper attribution. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles

Write an assembly program

  

Write an assembly program that will read in a person’s name and then print it in lastname, firstname [middle name] order. The notation [middle name] means zero or more middle names. For example, using an input of: John James Smith.

You will print Smith, John James You will need to write a procedure that will read in characters until the enter key is pressed. Store the characters in an array of characters defined in your data segment. As you read the characters you will need to count the number of characters entered by the user, this may also be stored in a data segment variable. The maximum length of a name will be 80 characters.You will then need to start at the right end of the name and search backwards for a blank. At this point you can now print out the last name a comma and go back to the beginning of the array and print the rest of the name.Make sure to properly test your program before submitting it. You should test single names such as Rihanna, no name (hit enter key immediately), names with no middle name, and also multiple middle names.

Journal Article review- Week 6- Monitoring

Choose a journal article related to project status reporting, budgeting, or risk analysis (do not re-use a journal from a prior course).   Write a 2-3 page review of your chosen journal article.  Please choose a peer reviewed journal, and an article that has been published in the past five (5) years.

The review should contain the journal article title, author’s name and year of publication. 

Your paper should contain the following headings:

  •      Introduction
  •      Summary of the article
  •      Relevant points made by the author
  •      Critique of the article
  •      Application of the concepts in the article

You are going to review a single journal article, therefore your reference page should only contain the information from the article you reviewed.  There is no need to introduce other journals into this paper. 

Text-

A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Seventh Edition and The Standard for Project Management (RUSSIAN) 

ISBN: 9781628257007 

Authors: Project Management Institute Project Management Institute 

Publisher: Project Management Institute 

Publication Date: 2021-08-01

unit 6 db#2

 Initial post + 2 responses.

Think of some ways that a hacker might be able to obtain an account password. How would you prevent the password attack you mention? Support your response and be sure to cite your sources.