law enforcement

Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.[500 words 

Assignment 5:

  1. Refer back to homework assignment 2, in week 3.  Homework assignment 2 asked you to find a data set and perform some manipulations using R.  For this assignment, you can use that same dataset, or select a new one of your choosing and use Tableau to create a visualization.  The assignment requirements are:

    • Go to Tableau.com and download a free trial version of Tableau
    • Use Tableau to create an appropriate visualization for the dataset you selected for homework assignment 2, or another dataset of your choosing.
    • Provide screenshots showing your steps in Tableau (at least 3)
    • Explain how your visualization meets the criteria of being Trustworthy, Accessible, and Elegant (1-3 paragraphs)
    • Explain the story that your visualization should be telling to the viewer (1-3 paragraphs)
    • Compare and contrast your experiences using R versus Tableau.  Which one is more user friendly?  Are there limitations to one versus the other?  (1-3 paragraphs) 

Term Paper on 'Rockwell Automation – Factory Talk (SCADA)'

  It is a term paper.The topic is  ‘Rockwell Automation – Factory Talk (SCADA)’ The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:

  • No more than two (2) citations shall be from Wikipedia
  • At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
  • At least two (2) references from vendor web (html) or printed (pdf) material
  • At least two (2) references shall be from independent sources including but not limited to
    • News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
    • Industry Publications (e.g. Automation, ISSSource, Control)
    • Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
    • Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.

    The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:

  1. System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
  2. Communication protocols used by the system
  3. Industry sectors that use the system
  4. Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
  5. Potential or actual impact of the vulnerabilities discovered to the industry sectors served
  6. Cyber security measures taken by the vendor to secure the system
  7. Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)

Must have the following categories

INTRODUCTION

System Overview and Architecture

Market Analysis and Typical Use Case(s)

Major Vulnerability Disclosures

Impact Analysis

Risk Reduction Recommendations

Conclusion

Security Architecture & design discussion

Length: Minimum of 400 words

Due date: Sunday, November 22, 2020 by 4:00PM EST

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Question:
Why do good requirements go bad?  What can be done to prevent things from going bad?

Practical Connection Assignment

course name: Cryptography (ISOL-535-B05)

 

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Cyber Security: Kali Linux Lab

I have a Lab assignment that has to do with Kali Linux. 

Youll have to watch 2 walkthrough videos:

The first video is regarding setting up Kali Linux

The second video is regarding setting up WordPress.

Once you successfully watch the two videos, you will then start the lab. The procedures of the lab are in the attachment section. 

Business Strategy D-4

1) What are some of the unique strategic challenges that Christian universities face?

How has the unprecedented Covid-19 pandemic crisis impacted your life?

Has it altered your perspective on day-to-day life?  Family/Friends?  Religion?  Business?
What will be the one thing you tell your grandchildren or future generations in 30+ years?

2) 1 reply of 150 words

Discussion Post-Federal Architecture

 

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.