discussion-3

 

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Cyber Law

 

Current laws that govern cyberspace are inadequate to handle advances in the Internet and computing technologies. In your opinion, is this an accurate statement? Support your position or answer with a few examples. 

Your submission should be:

  • 300 words
  • in-text citations and references using the APA style
  • single spaced

OR_Discussion_2

 

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

 At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.  

Discussion

 

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Explain, define, or analyze the topic in detail provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

CC W 16 D

 Select three topics of interest and note:

  • What you learned about the topic
  • Why you selected the topic
  • How you will utilize the topic in the future
  • Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved?

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.   

The 3 topics are :

 Cloud Computing

Virtualization

Cloud Governance 

Firewalls and Host and Intrusion Prevention Systems

 

  • Based on this week’s course objectives of securing resources in a network and describing Firewalls and Host and Intrusion Prevention Systems, discuss if both of these items are necessary for the network. Security networking devices have many advantages in the business environment. Moreover, what are some of these advantages, and from an Information Security perspective, what are some of the standard practices in securing these networks? Describe the significant reasons to secure the Network and protect access to the Web. Feel free to research the internet and provide resource links and APA cited references to support your comments.

unit 8

 

Directions

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Divide your student ID by 20, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for this online discussion.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

Risk Assessment

I need help with creating a risk assessment based on Equifax breach that occured in 2017. I have attached the milestone three rubric, aswell as milestone one and milestone two that was completed by me. 

bidis1

 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

week 12

 

his week’s journal articles focus on the digital retail sector and  how it is constantly growing each year. The case study/article reviews  the top four digital retail company’s financial performance. After  reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.     
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are  new in the market, note what you think they would have to do to obtain  market share based on what you’ve learned this week.     
    1. In response specifically list at least three key factors that  would influence the success of the digital retail company, please be  specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

requirnments:

 

The paper should meet the following requirements:

· 5-7 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.