portfolio assignment

 

Portfolio Project: This week discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

The companies with cases in the text – you can’t use the same subject matter of those cases.  As such no case content within the text is to be used for this assignment. The purpose is for you to do research not to restate a case in the textbook.  As well, no content from any of your prior work is to be reused including your Residency paper.  In a nutshell, content must be new and unique as well as the business (so if you wrote on Amazon in any of your papers, you need to select a different company).  Remember that the text as well as your former papers are all in the SafeAssign data repository and will bring back a high percentage rate indicating plagiarism from your former work which is not acceptable.  SafeAssign should be below 25% and your subject matter for this assignment needs to be new.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work, one being your text.  I would expect to see approximately 4-8 in-text citations.

Info Security & Risk Mgmt

 

A vulnerability refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.

For example, when a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to both intentional and unintentional threats. However, most vulnerabilities are exploited by automated attackers and not a human typing on the other side of the network.

Testing for vulnerabilities is critical to ensuring the continued security of your systems. Identify the weak points.  Discuss at least four questions to ask when determining your security vulnerabilities.  

CSCI 457 Assignment 3 – Biography Viewer

Choose one of your favorite games, and implement an app that shows the biography of each character of the game.

Requirements:

  • Your app should show a list of characters in the main view using a table view.
  • A small icon and some brief information of each character should be displayed in the table
    view.
  • The user can scroll up and down to see the full list.
  • The user can swipe right to reveal two buttons to favorite a character or unfavorite a
    character.
  • A checkmark is displayed for each favorite character, and the checkmark is removed if the
    character is unfavored.
  • The user can touch a character to open a detail view to see the character’s large portrait and
    full biography.
  • Do not use parallel arrays. Use a class for the characters.

WEEK 9

Write a fully developed paper in which you:

  1. Assess the two distinct networking functions. 
  2. Analyze the issues Choice is likely to experience as it expands its network to full global reach. Provide a rationale for your answer. 
  3. Critique Choice implementing free high-speed Internet access for all guests in its Clarion Hotels and Comfort Suites from the security point of view. 
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Assignment

 analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.