I have one full course for cyber security. There are 16 weeks and have to do the discussion papers and response and final week. Please do placed your bid after reading the attachment.
Computer Science
importance Information security and risk assessment.
python short project
I have this short and introductory project (python).the complete requirements are attached and the module is attached . read the full instructions to understand exactly what should be done.
membership policy
This project gives you the opportunity to review what you’ve learned throughout the semester and present a range of topics in the form of a policy that describes how participants can join your business network, and the benefits of doing so. The overall purpose of your policy should be to create interest in your business network and its applications, along with a description of the onboarding process and ongoing benefits to members.
Create a membership policy that describes the benefits and requirements of membership in your Letter of Credit business network. Your policy should be no less than 1000 words and no more than 1500 words. The document you submit should in Microsoft Word format (.doc or .docx) and be named using the following criteria:
BLCN532_SECTION_STUDENTID_LASTNAME_FIRSTNAME_Project.docx
- SECTION is the section number of your current course (2 digits)
- STUDENTID is your student ID number (with leading zeros)
- LASTNAME is your last name
- FIRSTNAME is your first name
Your policy should include the following:
- 1) Purpose statement of the Letter of Credit business network
- 2) Description of the current (base) network (participants and functionality)
- 3) Brief description of upcoming features in the next quarterly release. (Be creative, but
realistic here. Think about what the existing Letter of Credit application does, and what features you’d like to add that would increase the application’s usefulness and value. Analyzing current functionality and determining which features would best meet business needs will be a big part of assessing this assignment.)
- 4) Description of application upgrade process that may impact application availability and member business processes. (i.e. How does the business network organization plan to deploy new software features without causing substantial service interrruptions?)
- 5) List of rights and benefits for participants (how does each member benefit and what data/services are available for each member)
- 6) Membership requirements for new members (minimum security requirements, approval process, decision making rules and authorities, minimum required agreements that new members must accept and agree to)
- 7) Description of fees for participation and service access
- 8) Minimum member resource contributions to the business network
- 9) Process for ending participation in the business network
10) Process for resolving disputes, including appealing the outcome of a resolved dispute. 11) Course of action to initiate an application for membership
Background content for items 1 and 2 will come from your text. Other items will be a combination of content from your text and extrapolation based on what you’ve learned this semester. Pay careful attention to #3. That one requires that you carefully consider how enhancing the application can help it better align with member (and prospective member) business goals. The purpose of this project is to digest the material you’ve learned throughout this semester into a white paper that could be used to recruit potential business network members, as well as provide details of the rights and responsibilities of business network members.
Your policy document should present a clear and concise description of the benefits of being a business network member, why blockchain technology provides superior benefits to solutions based on other technologies, and the onboarding process and expectations once membership is approved. The overall goal is to give you an opportunity to demonstrate that you understand how this example blockchain technology use case implementation aligns with existing, and prospective, member business goals.
Your paper must be in APA format, including citations and references, but I’m not particularly concerned with the specific format you select for the paper’s body.
IOT security
Some security practitioners suggest that key IoT security steps include:
1. Make people aware that there is a threat to security;
2. Design a technical solution to reduce security vulnerabilities;
3. Align the legal and regulatory frameworks; and
4. Develop a workforce with the skills to handle IoT security.
Write 700 words in word document about following
1) Address each of the FOUR IoT security steps listed above in terms of IoT devices.
2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
bi15 discussion
Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
300 words
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Assignment
Contingency Planning
Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:
(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
information-seeking
Present and discuss your methodology regarding the information-seeking from different databases that can be used to find the information in a selected domain in Computer Science or Information Systems. Present the fixed references by indicating from which databases you have obtained them.
Support your discussion with at least five references
Discussion Communication
Throughout this week, you will learn how to respond appropriately and in a positive manner verbally, non-verbally and through listening attentively to increase the likelihood of meeting customer satisfaction and increase customer loyalty. This is important to an organization to expedite the service experience of customers (internal and external).
Before you begin, be sure to review the following resources:
- Communication Breakdowns in Customer Service
- The Important Things Customers do not Say
- Taking Time to Listen to the Customer
Discussion Topic
Communication Breakdowns in Customer Service
Video Synopsis: A distracted restaurant server encounters challenges while interacting with an external customer.
Characters: Jane (server); Brian (supervisor); Mrs. Marks (external customer); Fellow employee.
Once you have reviewed the short video draft an initial response to the questions below and then return to this discussion again later in the week to participate actively in this discussion. Discussion responses should be from the perspective of a customer service representative. Remember to use your textbook and other academic resources to justify your responses.
Discussion Questions
- From a customer service perspective what did Jane do well when dealing with her customers?
- From a customer service perspective, what could Jane have done differently when dealing with her customers?
The Important Things Customers do not Say
Video Synopsis: A distracted office worker loses customer focus when dealing with an external customer.
Characters: Joe (office worker); Mrs. Vogel (external customer).
Once you have reviewed the short video draft an initial response to the questions below and then return to this discussion again later in the week to participate actively in this discussion. Discussion responses should be from the perspective of a customer service representative. Remember to use your textbook and other academic resources to justify your responses.
Discussion Questions
- From a customer service perspective, what did Joe do well when dealing with Mrs. Vogel?
- From a customer service perspective, what could Joe have done differently when dealing with Mrs. Vogel?
Taking Time to Listen to the Customer
Video Synopsis: A food service professional interacts with a customer in a noisy restaurant.
Characters: Jane (server); Mrs. Marks (external customer).
Once you have reviewed the short video draft an initial response to the questions below and then return to this discussion again later in the week to participate actively in this discussion. Discussion responses should be from the perspective of a customer service representative. Remember to use your textbook and other academic resources to justify your responses.
Discussion Questions
- From a customer service perspective, what did Jane do well when dealing with her customers?
- From a customer service perspective, what could Jane have done differently when dealing with her customers?
need research paper
Network trends