web master

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 300 words.

Portfolio project

  • The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  
    The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.
    Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  
    There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.
    Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 
    The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
    Your paper should meet the following requirements:

    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

rp

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately five pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Web application using ReactJS

 

You are a graduating software engineer who is looking to apply to a few software engineering positions at various Fortune 500 companies. You decide to make a personal portfolio website that showcases some of your work so that you stand apart from the other applicants.

Using React, create a web application that has the following:

  1. A home page with a short description of yourself, what you are looking for in a position, and one project that you’ve worked on.
  2. A contact page with a text box and a submit button that shows a success message when the user submits a query.
  3. A navigation bar and footer.

You must use client side routing to handle page navigation.

Wk 2 – Apply: Challenges for Fixing Vulnerabilities

Assignment Content

  1. Review the “Challenges for Fixing Vulnerabilities” Team activity.

    Create a table comparing 10 of the vulnerabilities, threats, and risks for the real-world security incident discussed by the class (Verizon DBR) , along with related vulnerabilities that may have contributed to the security incident.
    Include the following as at least 3 of the comparisons used in the table:

    • How was the vulnerability detected?
    • What protocol was attacked?
    • What steps were taken to resolve the vulnerability?
    • Write a 1- to 2-page narrative explaining trends shown from the table.

      ** Waring this assignment has two parts **

      Part 1 – Table 
      Part 2 – Narrative 

      Narrative checklist:

    1. The reflection must be 350 – 700 words (about 1-2 pages but I will be looking at word count) 
    2. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    3. Include at least one references that are properly cited 
    4. Any images must have a caption and referenced in the paper. 
    5. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points   
    6. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 

Assignment Seven

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 12

1. HHS and the FTC recently launched an investigation into a major pharmacy chain for its information disposal practices. The regulators claimed that the pharmacy chain failed to protect customers’ sensitive financial and medical information by disposing prescriptions and labeled pill bottles in dumpsters that were accessible by the public. Based on the HIPAA (Health Insurance Portability and Accountability Act of 1996), what consequences should a company face for failing to properly dispose of customer information? For HIPAA act, you may check the website.

Chapter 13

2. Trust is an important part of the continued growth and development of the Internet. This is particularly the case with respect to social networking. Media reports of disturbing stories and case law alike have shown some of the consequences that can arise when individuals create false social networking profiles. In a case in California, and individual established a fake MySpace profile of his former church pastor. On the profile, he posted content that suggested that the pastor used drugs and was homosexual. Can criminal charges be brought against the party that created the fake profile?

3. Read the Family Educational Rights and Privacy Act of 1974 (FERPA) at ED, discuss who has access to your educational record at APUS. Furthermore, what is the roles and responsibilities for APUS instructors and students to comply with FERPA

 

Select one network scanning software tool and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

 Select one network scanning software tool (there is a list in your required reading slides, you can find the slides in attachments. ) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Please write 350 words essay.

cs

 

Purpose

This discussion activity gives you the opportunity to solve a real world scenario. In doing so, you will learn the concepts of a software development cycle.

Directions

Part I: Complete Your Original Response to the Main Topic

You are a software developer for a Retail Point of Sale System Company. A client has made a request to upgrade the current system from command line interface to a graphic user interface. The client concerns on an effect to the current system with the change. The client does not want to lose any current data on the system. Provide recommendations and the change plan including the below requirements to the customer.

Requirements:

  • Create a requirement plan (what need to be done to support this upgrade)
  • Create a development plan (how to implement this upgrade with programming details explanation including technical details on this document)
  • Create testing plan (how to ensure that the new upgrade works without affecting current system and no data lost.)

Posting your recommendations and the change plan

Once you have completed your recommendations and plan. Post it in the discussion forum by clicking the Reply link below.

  • In the first line of your post, your should add your plan title and name.
  • Your posting must include recommendations, a requirement plan, a development plan, and a testing plan.  

PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism