Discussion

With the advent of ML/AI, what effect do you think this will have on the future of firewalls? What kinds of new implementation techniques do you think will emerge because of ML/AI?

Data Security Assignment

 

Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf

https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get/

move their IT to the cloud

 

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

web programming related

 

Now is the time to make your project look good and as professional as possible.

By now you should have created your MySQL database and PHP scripts that can be used to query, insert, and delete data.  The objective of Phase 3 is to make it look nice. For example, you can use HTML in your PHP scripts to put the queried data into a table.  You might also choose to create a style sheet to control colors, fonts, etc.

You must have a home page which links to other pages you have created to manipulate your database.  Be sure that all pages have a button to link back to the home page and possibly buttons to link to other pages as necessary.  If you only create one page and display everything on that page you will have not met the minimum requirement for this class.  I will be looking to see if you put some real work into this final project.

When you have finished with your project, create a text file in which to turn in a hyperlink to your home page and if you wish hyperlinks to your PHP scripts.  Include your name in this file and any other comments you choose to include about your project.  Upload the file to the appropriate submission box.

wk3_632

 

  1. Provide the title of your term paper (note: you may change the wording in the official title in the final version however, you cannot change the topic once you select one)
  2. Include an introduction on the topic
  3. A minimum of 3-5 references in proper APA format

Disaster Recovery Best Practices

Link : https://www.youtube.com/watch?v=V4ae8cqtZHc 

1. Review the above video and write a two page review plus cover page and reference page.  

2. The first page of the paper should be a summary of the video.

3. The second page is an opinion page covering how an IT company does or should use these best practices.

4. A total of 3 different references have to be there in the opinion page

Computer science

1.Define Entity, Entity type, and Entity set.
2.Define a Weak Entity set.
3.Explain the terms ‘Attribute’ and ‘Relations’
4.What are VDL and SDL?
5.Define Cursor and its types.

Cloud Computing

Project : Shared Technology Vulnerabilities

A 750 word summary of your findings. This must be appropriate graduate level work. Please, do not double space your submission.