5s week 7 assignment BS

In 300 words,

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

Use your own words and supply references.

Include references, no copy-paste.

Case Scenario

An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. (Attached) 

Remember to use a professional writing style and support your statements with logical evidence. 

Include APA citations within your paper as well as an APA formatted references list.

Cloud Computing – Research Paper

  

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The      section should include the company name, the industry they are in and a      general overview of the organization.
  • Challenges: Discuss the      challenges the organization had that limited their profitability and/or      competitiveness and how they planned to leverage Cloud Computing to      overcome their challenges.
  • Solution: Describe the      organization’s Cloud Computing implementation and the benefits they      realized from the implementation. What was the result of implementing      Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the      most important ideas from the paper and also make recommendations or how      they might have achieved even greater success.

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

Due: 10/16/2020

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams

 

Required Reading:

Read (2016). Empowering Leadership and Effective Collaboration in Geographically Dispersed Teams. Personnel Psychology, 69(1), 159–198. https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

BI- project

Portfolio Project: Please approach this assignment as a Consultant writing a Business Portfolio on the use of a technology discussed in our book for an industry of your choice; it could be your place of employment. Discuss the industry’s current business processes, and explain how their business processes can be improved by utilizing concepts surrounding analytics, data science, or artificial intelligence. Be specific about the type of technology, for example:

  • New Technology – Smart Automation  
  • Specific Technology – Light-Dimming Technology
  • Industry – Energy Saving Industries

Describe the current business situation and how your selected technology can improve their business. Identify the pros and cons of your research paper, in addition to the benefits. Also, identify the various business factors that should be considered before deploying the new technology.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work.  

DQ

links:

https://www.youtube.com/watch?v=l8XNRTfPgZI&ab_channel=Boxmining

http://www.jbonneau.com/doc/BMCNKF15-IEEESP-bitcoin.pdf

software security

Length: Minimum of 600 words 

Create a portfolio related to work experience in IT. Submit a file that outlines any projects you have worked on as a student or professional that may influence a hiring manager or company to hire you.

Discussion 5 – Info tech import strat plan

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

cloud computing

Discuss Shared technology vulnerabilities in the cloud?

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.