Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

practical connection (course: Information security risk management)

 it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use proper APA 6 formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through

java Raptor

Part 1 Your finished flowchart should get an air temperature from the user for each of five days. It should then display

  • the average temperature for the five days,
  • the highest of the five,
  • and the lowest of the five.

To complete, you will need to do the following:

·         Initialize the variable in main that needs to be initialized (you don’t need to initialize the variable that will hold the user’s input). In getHigh, initialize the two variables that need to be initialized.

  •  Add a call to the subchart getHighest Test your flowchart and make sure it works.
  •  Create a subchart called getLowest, put in the proper steps and call it from main.
  • Create a subchart called getTotal, put in the proper steps and call it from main.
  • Create a subchart called getAverage and call it from main.
  • Create a subchart called displayOutput where you display the required output in a user friendly way.

See printed directions for a possible extra credit item.

Rubric on which you will be graded:

Item

Possible Points

Raptor flowchart runs without errors and produces correct output

60

Internal documentation identifies programmer and date; filename includes the programmer’s last name

5

Subcharts created where required

10

Loop used correctly

5

Selection structure used correctly

5

Output contains information required without any unnecessary information. The output contains text to explain to the user what is being displayed

EH week8 P8

 

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 3-4 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

music retrieval techniques assignment 5

Use the template for the assignment. I will send more files and example code from class that will make the assignment easier. The assignment uses python 3 and jupyter notebooks as the IDE. There are a bunch of class notes and code examples

Business Stratergy

 1) 350 words – Why is it critical for company managers to have a clear strategic vision regarding their organization? 

2) 1 reply of 150 words

Information Security Standard or Compliance Law

Decide on an Information Security Standard or Compliance Law that is applicable to your fictional organization that is just big enough to have a Chief Technology Officer. Explain to your CTO what the rule/law is and what your organization needs to do to ensure compliance. Feel free to vibrantly describe what can happen if you don’t comply. It’s okay to strike fear into the CTO by referring to examples of punishment for non-compliance, even if those are merely in the court of public opinion.

You can use any type of communication that you feel is appropriate, whether that is a letter, memo, slide deck, infographic, interpretive dance, etc.

You should assume your CTO is technical and communicate accordingly. Remember that CTOs can be either women or men and have names other than “Dear CTO” 🙂 Pretend letterhead is always a worthwhile investment of time.

COMPUTER

 

Below are some example good topics but any topic that can associate use of computers and technology is fair game to use for this final written paper.

  • Application of Artificial Intelligence
  • Application of Technology and Computers applied to a Field of Study
  • Biotechnology
  • Electronic Commerce
  • Electronic Monitoring
  • Management of Information Systems
  • Geometric Computation
  • Gaming
  • Green Computing
  • Hardware/Architecture
  • Human Computer Interaction
  • Informatics
  • Internet Systems
  • Knowledge Management
  • Machine Learning
  • Mobile Computing
  • Networks
  • Nursing Informatics
  • Robotics, Vision & Physical Modeling
  • Scientific Computing
  • Security and Privacy
  • Smart Cards
  • Social and Academic Networking
  • Social Commitment using Technology
  • Software/Operating Systems
  • Systems Reliability/Dependability

Assignment Expectations

Length: Minimum of 1500 words; thoroughly addressing research topic in a clear, concise manner.

Structure: Include a title page, abstract, and reference page in APA style. These do not count towards the minimal word amount for this assignment.

References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. Include at least three (5) scholarly sources to support your claims.

Format: Save your assignment as a Microsoft Word document (.doc or .docx).

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

Business Intelligence

 Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.