Week 5 – Research Paper – Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

EH Week15 DB

 

Hello,

i need this paper by 12/16 afternoon.

Strictly No plagiarism please use your own words.

300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

InfoTech in a Global Economy 2.1

 Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

 Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.  

Python Requests Library( Module)

Needed description of Requests Library Functions.( 1 or 2 pages)

Important point i needed, Examples for about Requests Library Functions.  In that examples if you use name one of them supposed to be BURAK. 

i needed those examples on WORD PAGE AND ORIGINAL CODING FILES.

A security Incident

Your friend just referred you to his Uncle Harry to help him with a security incident and to conduct an investigation.  

Write a 2 – 3 page report for Uncle Harry that includes the following:

  1. A description of Uncle Harry’s security incident (“make up” your own incident)
  2. Create an incident response plan to address the incident
  3. Describe how incidents should be handled in the future by Uncle Harry 
  4. Detail the steps necessary in the investigation process.

Information Technology

https://www.cnet.com/news/lenovo-laptop-deals-get-a-thinkpad-t14-for-900-x1-yoga-for-1266-and-more/

 

Explore CNET

https://www.cnet.com/

Right click the link above and open it in a new tab or window. You may also right click and copy the hyperlink and paste it into the address like of Chrome or Firefox.

CNET is a great website for technology news and review. Their About Us page states, “CNET tells you what’s new in tech, culture and science, why it matters, how it works and what you need. Our global team works 24/7 to explore and explain the changing world around us. You can depend on CNET for news, commentary, analysis, features, FAQs, advice, hands-on reviews, buying guides, amazing photography and fun and informative videos.”

We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly.

Post this summary to the Hardware Assignment discussion board. Read at least one other student’s summary on hardware and provide a peer review. A peer review is an evaluation of another student’s academic work. This could include but is not limited to taking a stand on the topic and providing evidence for/against it; providing additional information on the other student’s topic; posing questions about the topic and possible answers; demonstrating your understanding or application of the topic with examples. You may need to cite a source in your reply. Remember that if the information does not come out of your own head, you need to cite it

Intro to CyberSecurity homework

 

1. (a)  In an environment in which several users share access to a single  database, can one user ever block another’s access for an unlimited  period of time? (This situation is called indefinite postponement.) (b)  Describe a scenario in which two users could cause the indefinite  postponement of each other. (c) Describe a scenario in which a single  user could cause the indefinite postponement of all users.

2. Using  the two-step commit presented in the beginning of this chapter,  describe how to avoid assigning one seat to two people, as in the  airline example. That is, list precisely which steps the database  manager should follow in assigning passengers to seats.

3. Suppose  a database manager were to allow nesting of one transaction inside  another. That is, after having updated part of one record, the DBMS  would allow you to select another record, update it, and then perform  further updates on the first record. What effect would nesting have on  the integrity of a database? Suggest a mechanism by which nesting could  be allowed.

4. Can a database contain two identical records without a negative effect on the integrity of the database? Why or why not?

5. Some  operating systems perform buffered I/O. In this scheme, an output  request is accepted from a user and the user is informed of the normal  I/O completion. However, the actual physical write operation is  performed later, at a time convenient to the operating system. Discuss  the effect of buffered I/O on integrity in a DBMS.

6. A  database transaction implements the command “set STATUS to ‘CURRENT’ in  all records where BALANCE-OWED = 0.” (a) Describe how that transaction  would be performed with the two-step commit described in this chapter.  (b) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS)  and (CUSTOMER-ID,BALANCE-OWED). How would the transaction be performed?  (c) Suppose the relations from which that command was formed are  (CUSTOMER-ID,STATUS), (CREDIT-ID,CUSTOMER-ID), (CREDIT-ID,  BALANCE-OWED). How would the transaction be performed?

7. Show  that if longitudinal parity is used as an error detection code, values  in a database can still be modified without detection. (Longitudinal  parity is computed for the nth  bit of each byte; that is, one parity bit is computed and retained for  all bits in the 0th position, another parity bit for all bits in the 1st  position, etc.)

8. Suppose query Q1 obtains the median ml of a set S1 of values, and query Q2 obtains the median m2 of a subset S2 of S1. If m1 < m2, what can be inferred about S1, S2, and the elements of S1 not in S2?

9. One  approach suggested to ensure privacy is the small result rejection, in  which the system rejects (returns no result from) any query, the result  of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records.

10. Cite a situation in which the sensitivity of an aggregate is greater than that of its constituent values. Cite a situation in which the sensitivity of an aggregate is less than that of its constituent values. 

WK 5 Rough Draft

 

Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as a business field that would benefit from technical writing.

1) 10 pages (double-spaced).

2) Choose any technical topic to write your report about.

3) Identify the purpose and audience of your report.

4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).

5) In addition to the required number of pages for the assignment, you must also include a reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!

6) Use your approved topic.

7) Use your approved outline.

8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).

9) Arial 11 or 12-point font or Times New Roman styles.

10) Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations

11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!

I attached an outline of what to write about.