- What is multifactor authentication and what are some examples?
- Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim. Explain how multifactor authentication works.
- List 5 reasons to turn on multifactor authentication?
- Provide at least two additional links to articles related to multifactor authentication.
Physical Security
Topic: Based on your text, the attached additional material and any research you have done, discuss the salient points of a Vulnerability Assessment(300 words) and Make sure you talk about Risk Management and Physical Protection Systems (PPS).
Cloud Computing – Research Paper
For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
- Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
- Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
- Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
- Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.
Due: 10/16/2020
Analyzing and Visualizing Data
According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work. Checkout Chapter 3 “Formulating Your Brief” from the attachment.
Answer Needed in APA 7 format with in-text citations and References with 500 + Words.
Question to Answer is:
Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?
Disaster Recovery – From Chapter 1, page 37, Real World Exercise 1.1 -350 words
Exercise 1-1
Using a Web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter. Are there sections missing? If so, which ones?
Essay
Essay Assignment :A Telephone Call Analytical Essay,
Source : https://www.classicshorts.com/stories/teleycal.html
The literary research essay is just a long analytical essay with more research.
This essay is ANALYTICAL. IT IS NOT A SUMMARY. Don’t retell the story; assume your reader has read it. Check your calendar for the due date! Your essay should have the following components:
Your essay must have these components: (1) an introduction, (2) body, (3) conclusion, (4) thesis statement, (5) good development, (6) topic sentences, and (7) transition words. Your paper must be double-spaced, four full pages (about 1200 words), and written in 12 point font. You must cite your main source (primary source), incorporate and cite 4 secondary sources from the library databases, and adhere to MLA style formatting.
ME d-2
For this Discussion Question, complete the following (350 words)
1. Read the two articles below that discuss why fuel prices fluctuate. Research two of these types further.
Article 1: https://www.forbes.com/sites/eco-nomics/2012/03/05/five-reasons-gas-prices-rise/#6f9a838d1e02
Article 2: https://www.csmonitor.com/Environment/2014/1031/Why-do-gas-prices-rise-and-fall-5-driving-factors/Oil-A-volatile-commodity
2. Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.
3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.
2) Replies 2 each 150 words
Urgant(ASAP)
5-7 page paper on a conflict that he or she experienced in an organizational setting. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point
Intro to programming responses
Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
An if-then script simply takes an argument from a variable and checks to see if it is true. If it is true, then it executes the parameter. If it is false, then it executes a different parameter which can be another defined variable or an exit condition. Loops repeats the processed if-then program as many times as indicated within the set parameters until an exit condition is reached. The loop needs an exit condition that can be met or it can become an endless loop, or infinite loop. An infinite loop can accidentally use up 100% of your CPU usage that will lock up your device or cause it to crash. Ways to avoid an endless loop is to always make sure to set an exit condition that can be met, or makes sense to the language you are programming in. There may be a “continue” statement with another variable that could be out of place preventing the code to move on and continuously loop. Another way to prevent infinite loops is to set timeout conditions in your code. Also, if you are working with complex loops that have the potential to be endless, you may consider testing your code first through a walk-through program, such as the Python Tutor we will be using in this class and others such as Google Chrome Dev Tools. This will allow you to step through and visualize what your program is doing.
Endless loops can create a denial of service (DOS). You may accidentally DOS yourself! In fact, you can set up a simple script that throws specific types of packets to a single router or switch interface (IP and port range) over and over again causing a denial of service effect. You can also overwhelm firewalls by doing this, especially if they are doing deep packet inspections. There are several quirky vulnerabilities out there listed in the MITRE CVE that has exploits like this already written and tested. Building a virtual range to test these out is a lot of fun and you learn networking quickly.
RESPONSE 2:
This week we learned about variables along with creating loops and if-then scripts. Our textbook, Microsoft WSH and VBScript Programming for the Absolute Beginner, 4th Ed. by Jerry L. Ford, defines a variable as “an individual piece of data such as a name, number, or date that is stored in memory” (2014, p. 85). Variables are the numbers, dates or names in which you are looking for or defining in your scripts. For example, in this week’s practice scripts, fnum, snum, and total were the variables that were being defined. Once we defined are variables, we were able to look more into loops and if-then scripts.
Loops are “collection of statements repeatedly executed to facilitate the processing of large amounts of data” (Ford, 2014, p. 144). Loops could be used to repeat a certain function until the end condition is met. For example, in this week’s practice loop script, we set a up a loop where the program would produce numbers between the first variable, fnum, to the second variable, snum. Once the computer reached snum, the condition was met and the loop ended. The if-then script we learned included a loop, however, the loop would only run if the second number we typed was greater than the first number we chose. If the first number was larger than the second number, the loop would not run. In order to run the loop, the condition must be met prior to the program running the script. The whole purpose of the if-then script is to determine if the argument depicted in the script is accurate based off the variables provided. If the variables make the script accurate then it runs; if not, then it doesn’t run the script.
When creating loops, individuals might incorrectly type an “exit function” or create an improper condition to stop the loop. If this happens, an endless loop could be created. Based off initial research, endless loops are not necessarily dangerous, but rather annoying. Most people can exit an endless loop by doing a hard-exit of the program, or even shutting down their computer. However, some individuals might create an endless loop in order to create a DoS (Denial of Service) attack. DoS attacks are meant to prevent a person from using a certain program, and if someone was stuck in an endless loop, they would not be able to use that program until they manage to exit or stop the loop.
procedure doc
Write a procedure document for CSI that documents how to change a password in a platform of your choosing.
The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases. (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)
Text should be as understandable as possible and as non-technical as practical. Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade. Include a glossary where needed.
Visual aids should be included. Screen captures or photographs are very helpful to the technically challenged.
For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.
Tips
This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.
Most students tend to get caught up in the editing process. Getting a prototype document put together, including screen captures, is usually pretty fast. Editing can be a time black hole so be mindful of that.
Ask a non-technical person to read one of your drafts. If they understand it, and can follow it, you have succeeded.