Finish it in 24 hours, no cited needed
Physical Security
Topic: Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area or work location. Remember to get permission from security. If you wish you may approach the subject in terms of Best Practices.
Instructions: Please download the Assignment 6 LEED Certification Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.
Also review any additional files attached for more information.
411F6
check attachment
DS-1
Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.
Article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Write in essay format not in bulleted, numbered or other list format.
cos-fors-week-2
Do a bit of research on-line. Find a criminal case that involved Digital Forensics.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used in the investigation.
Corporate IT Security Audit Compliance
Describe how to establish compliance in a small health care clinic.
The clinic could have 2 physicians, 5 nurses, and serve a thousand customers annually. Patients and healthcare provides can access patient data online/remotely.
Internet Privacy
In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Privacy is a concept that is rapidly evolving in relation to the most public of mediums, the Internet, which became even more super-charged with social networking websites. In a recent California election, one ballot measure, Proposition 8, asked voters a question on marriage. Donors to the Prop 8 campaign found that their names, addresses, and amount of contribution were masked up with Google Maps and thus rendered into a format showing the world a map image of donors’ names, street addresses, and dollar contributions. All this data is public record information already, but still quite inconvenient to access. What are the side effects of this action?
I have small assignment
Choose any two question (100-300 words).
Discussion #1: How does prescriptive analytics relate to descriptive and predictive analytics?
Discussion #2: Explain the differences between static and dynamic models. How can one evolve into the other?
Discussion #4: Explain why solving problems under uncertainty some-times involves assuming that the problem is to be solved under conditions of risk.
Block Chain Technologies and Business
The theme of this research paper is Block Chain technologies. For this assignment, you must
research the theme with a focus on potential business applications of it (including yet beyond
Fintech). You must research current trends and summarize your research as a report. The
general structure of the report is as follows:
1. An introductory section about the current hype surrounding block chain technologies,
providing context for your report;
2. A description of select applications of Blockchain to business (minimum 3). Choose 1
particularly business areas (of your interest) in mind (e.g., HR, Marketing and Sales,
or Operations) and provide three applications of Block Chain int those business areas. You must also describe and analyze these technologies based on
their potential to be game changers;
3. The challenges for such applications to become widespread and beneficial to
companies;
4. A conclusion section (with your takeaway from the discussion).
requirements
Your report must adhere to APA formatting;
2. You must research at least 5 recent (i.e., less than 5 years) peer-reviewed articles.
Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,
Accenture, Deloitte, Capgemini) will be accepted;
3. Other than APA formatting, the structure for the paper is not fixed, as long as there is
a logical flow of ideas. The length of the paper is 5-6 pages
Describe two cryptographic applications and how they are used in Information System Security.
Please write 350 words essay.