response required project

Please readh the below project proposal post and provide two responses in 75 to 100 words

Post#1

 

Cloud computing is the service availability of the computer system, especially cloud storage, without direct active management by the user. The term is generally used to describe data centers available to users over the Internet. Cloud computing offers a variety of benefits but it has some Vulnerabilities also. There are some Possible Vulnerabilities are mentioned like: Data Breaches, Targeted Attack, Simple Human Errors, Application Vulnerabilities, Poor Security Policies, Natural Disasters, Simple Human Errors, Hard Drive Failures, Power Failures, Malware Infection, Weak Network Architecture, Insecure Network Protocol, Vulnerable Application, Vulnerable Systems and APIs, Weak API Credentials, Key Management, Operating System Bugs, Hypervisor Bugs, Unlatched Software. “Many cloud computing providers such as Google, Microsoft, Yahoo, IBM and Amazon are moving towards adoption of cloud technology leading to a considerable escalation in the usage of various cloud services” (Birje, 2017).

Data breaches are a major issue in cloud computing. Because some attackers and unauthorized web sides try to steals data without user permission. It is only because of poor services. It allows us to enter an unauthorized network in the source network and steals private data. Hackers are easily found the data in private services also. Cloud computing runs software, the software has vulnerabilities and tries to exploit those vulnerabilities. In cloud computing, Consumers have reduced visibility and control. When transitioning assets/operations to the cloud, organizations lose some visibility and control over the operations. When users are using external cloud services, then it becomes the responsibility of some of the policies.

The main issue in cloud computing is lost Stored DataData stored in the cloud can be lost for reasons other than malicious software attacks. Accidental deletion of data by the cloud service provider or a physical disaster, such as a fire or earthquake, can lead to the permanent loss of customer data. The burden of avoiding data loss does not fall on the provider’s shoulders. The employee of the organization encrypts its data before uploading it to the cloud but loses the encryption key, the data will be lost.

            Increase Cyber security Risk is due to a lack of understanding. Organizations transfer the data into the cloud often without understanding the full scope of doing so, the security measures used by the cloud computing services, and responsible to provide security measures. Employees or user decides to use cloud services without fully understanding how those services must be secured. “Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization” (Pietro & Lombardi, 2018).

Many organizations operating in the cloud in every service when already know about the cyber security risk. Cloud computing service failure, because the customers do not understand the security, depends on which points and meetings. The organization chooses cloud service as security that should be awarded by all threats also and update all the employees and users as well and should be followed all the steps for security. “With cloud computing emerging as the latest technological advancement, it also brings various unexplored threats which raise critical security questions about data security on the cloud” (Bhattacharya, 2017).

Post#2

 

Net neutrality defines the principles of the internet for the service provider companies that they must treat all types of internet communications equally. The companies must not charge for the different internet services differently which can be defined on the basis of user content, types of the types of equipment used, destination, and the source address. With the presence of net neutrality, internet service provider companies may not charge money for some specific content or service, slower down the internet connection, or intentionally block some of the internet content to charge extra for the service. When net neutrality was not present, internet service provider companies would charge the customers for various tiers of services and intentionally block some of the websites and services used by the users. “The most basic definition of net neutrality is to prohibit payments from content providers to internet service providers; this situation we refer to as a one-sided pricing model, in contrast with a two-sided pricing model in which such payments are permitted” (Greenstein, 2016).

Net neutrality applies to cloud computing also as this also a service that is provided by the service provider companies. The rules of net neutrality that applies to cloud computing are:

The service provider company provides software as a service that cannot restrict or block the access of the users to cloud computing and storage services. The service provider companies providing software as a service cannot differentiate between its customers taking the same service from the company. They cannot favor one customer in the areas such as accessibility, storage capacity, storage elasticity, responsiveness, and many other types of services provided by the companies to the users. The service provider companies cannot provide special services at selective offers to some of the specific customers who have opted for the same services at the same expense. “The interpretation is that if a cloud platform is owned by the Internet access provider, the cloud is just a part of the network and under the NN regulation” (Kantola, 2019).

Net neutrality helps in determining the efficiency of cloud technology. It helps in managing the provider’s service to be provided to customers equally worldwide when they are paying equal in every term. Net neutrality helps in maintain the clouding services and upgrades the response time for every company equally. The small businesses that are using cloud computing services to become big and compete with the big giants are treated equally in terms of clouding space and software as a service. “One of the “fathers” of the Internet, Vincent Cerf (who, with Robert Kahn, developed the TCP/IP protocols, used in the early days of ARPANET, the Internet’s precursor, and which are still used today) pointed out in his Communications of the ACM column that “the Internet has always been open,” and “what we should not and must not tolerate is the arbitrary shutting down of pathways that can link together our increasingly global societies” (Austin, 2018). Net neutrality affects clouding technology as the security of the data saved is hampered. When the company integrates cloud into their existing company, it requires a proper assessment of the resources and business needs to develop a cloud security strategy. There is also a view that the security technology is already developed in a way that net neutrality won’t affect the working in the clouding technology but it will define the guidelines of the service provider and the user of the services (Austin. 2018).

security architecture 14.2

 Topic : Technology review, reviewing some security product or control technology

Make sure to explain and backup your responses with facts and examples.

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words

Organ Leader and Decision Making

 After completing the reading this week, we reflect on a few key concepts this week:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

software antivirus

  

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?[700 words]

Cloud Computing

 

Write a paper discussing the obstacles, difficulties, and other criteria that should be considered when migrating infrastructure and data from a private data center to a public cloud provider.  

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar.

Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

There is a APA Word template in week 1 with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Week 5 project

 

Putting It All Together

This assignment has 3 parts. Be sure to check off each one so you know that you accomplished it. You will be creating a personal résumé in Microsoft Word, and a PowerPoint presentation, and then zipping these files with your Excel spreadsheet that you created for the Week 4 Project into a compressed folder (a .zip file) to upload to the Week 5 Project submission area.

Create your résumé for when you are about to graduate from your program of Psychology. Don’t limit yourself to experiences and achievements you have today; you may add experiences and achievements you expect to have by the time you graduate. Later, you can keep adding skills and experiences to your résumé as you complete classes, gain more job experience, or change jobs.

Tip: You learned about tables in Week 2. Tables are great for creating résumés. Most of the time borders are turned off on the tables after the résumé is created although sometimes a top or bottom border is turned on to separate categories. However, the easiest way to create your résumé is to use a Word résumé template.

Click on the link below, Week 5 Project Tips, for some visual aids on how to tackle this week’s project.

Week 5 Project Tips

Part I: The Resume

Create your résumé based on the following criteria in Microsoft Word and save it as W5P_Resume_LastName.docx. Remember that the program will automatically add the extension of .docx.

  1. Ensure that the résumé was logically laid out and easily understood
  2. Create categories: create distinct separation and identification of important line-item job skills and experiences using bullets or numbers with appropriate application.
  3. Have content separation: provide a distinguishing feature that separates one line or paragraph from the others.
  4. Modify text: modify default typeface in one line or section and modify the default color or style of a line or section.
  5. Modify text size: modify the default typeface size by changing the points in at least one line on the page
  6. Create an overall professional look to your résumé.
  7. Include a header with your name and include page numbers. In reality, you would only do this if your résumé was more than one page, but you are demonstrating your skills in this document.

Part II: The PowerPoint

Create a new PowerPoint presentation and save it with the file name of W5D_Presentation_LastName.pptx.

  1. Choose a slide design that suits you. On your first slide, include a title of your choosing to introduce yourself. In the subheading, include the course number, your name, and the date.
  2. Create five slides where you can share your hobbies, interesting times in your life, or just different things about you. You should not include any personal information such as your address, social security number, student ID, or anything sensitive that you would not share publicly. Make sure that whatever you share is classroom appropriate.
  3. Create one slide that will be an “invitation” to your graduation party. Identify the who, what, when, where, and why of the party details. Include appropriate graphics and text formatting to make your invitation appealing.

All slides should be formatted creatively and appropriately.

Part III: The Zip Folder

Create a new folder called W5P_LastName. Put your résumé Word file, your PowerPoint file, and your Excel file from Week 4 Project into this folder and “zip” the folder following directions below to upload one file as your Week 5 Project submission. In the Comments box, briefly share your experiences with completing this project.

This is a handy way to treat multiple files. Once uploaded, be sure to download and unzip your folder to make sure that it contains exactly what you want in it. Sometimes in a rush, students upload empty folders and lose one-fourth of their grade for the class. Don’t let this mistake happen to you!

* To zip the folder on a PC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Send To -> Compressed (zipped) Folder
  • Attach the resulting ZIP file to your response in the classroom.

* To zip the folder on a MAC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Compress.
  • Attach the resulting ZIP file to your response in the classroom.

Week 3 IT impact

This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is the Telecommunications Act of 1996?
  • How has the idea of offensive speech changed since technology has progressed?
  • Do you consider the internet an appropriate tool for children? At what age do you introduce children to the internet?
  • What is data leakage? What does the term insider threat mean?
  • What are some kinds of Web sites that should prohibit anonymity?