short answer

 

Please respond to the following:

  • There’s no real prominent certification in the programming industry that says to an employer that you have programming skills. What are some tips you have for your classmates on how you plan to showcase what you have learned as a programmer? How do you plan to document your education and experience to look valuable to a potential employer?

policy

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

Discussion

 

  • As WLANs become more powerful, what are the implications for networks of the future? 
  • Will wired LANS still be common or will we eliminate wired offices?

Discussion week1

Answer the following questions related to the reading assignment for the week:

1) In your own words, describe the process of “validation” (per the text).

2) What are the concerns of evidence contamination? How can you protect against this issue?

3) What consent to search requirements would you have if you were asked to provide support in an investigation of a device? Please response with whatever would be ncessary.

Your response to the DQ must be a a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Blockchain

In chapter 7, the author briefly discusses how to deploy a smart contract. You’re using Ganache in your labs, but you’ll learn in future chapters about public test blockchains and production (live) blockchains. Once you deploy a smart contract, that smart contract code is stored on the blockchain forever (remember immutability?) Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

Countermeasures used in a Crisis Response

The media loves to tell the horror stories of disasters after security breaches. I.S. professionals must pro-actively plan countermeasures and continually study and learn from past events. Select a past news story of a failure caused by one of these events to provide an analysis of the failed system using some of the countermeasures you have learned in this unit. Recommend strategies to minimize the loss of I.S. services/data in those events as if you had been on the IT team during this event. Keep in mind that the focus of this assignment is the response to a crisis – after the event (not preventing the event).

Countermeasures to consider for your responses:

  • Fix known exploitable software flaws
  • Develop and enforce operational procedures and access controls (data and system)
  • Provide encryption capability
  • Improve physical security
  • Disconnect unreliable networks

Please submit a three to four-page report with APA cited references to support your work.