this is five hours assignment
Assignment and Discussion
Week 9 – Discussion
In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.
Internet Research – Wk 9
For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.
Week 9 Discussion – The Remote Worker
In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network. How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution? Respond to two other learners by the end of the week.
Week 9 Assignment
- 9.1 Give examples of applications of IPsec.
- 9.2 What services are provided by IPsec?
- 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
- 9.4 What is the difference between transport mode and tunnel mode?
- 9.5 What is a replay attack?
- 9.6 Why does ESP include a padding field?
- 9.7 What are the basic approaches to bundling SAs?
- 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
BSWA Week 8
In 300 words,
You are the web master of a college website. You share a server with other school departments such as accounting and HR.
Create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.
Contracting & Service Level Agreements
Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
Write in essay format not in bulleted, numbered or other list format.
DATA MINING Week 12 DQ
Fuzzy logic modeling has many advantages over the conventional rule induction algorithm. For the discussion forum, you work in the admissions office of a University. There are a large number of applicants to the University. You classify them into three clusters-admitted, rejected, and those who should be admitted. For the third cluster, how would you handle this taking into consideration the fuzzy logic modeling? Would ranking be a consideration?
Remember to reply to two of your peers with quality, thought-through posts.
Thank you.
E-waste
Define the e-waste problem. What is happening and why is this an issue? What can manufacturers do to improve the situation (health, hazardous materials, recycling, refuse, etc.)?
Guidelines and notes (read this 2-3 times):
Formatting and content:
Save this APA Example Template (DOCX) to your computer and use it for your essay.
The length of the response should be 4-5 paragraphs (about 400 words or up to 1.5 pages maximum). Do not write more than 1.5 pages of text.
Use 1″ margins.
Use Times New Roman, 12 pt font.
Double line space.
Indent the first line of each new paragraph by .5″.
One space follows the closing punctuation of each sentence.
Cite a minimum of two references in the body of the essay:
When we refer to ideas or use quotes from the sources, it is necessary to cite the source. Basically, this involves providing the author last name and date at the end of the sentence. See Purdue Online Writing Lab for examples.
(Links to an external site.)
Not sure if you need to cite a source? Refer to this Plagiarism Prevention Flowchart (indstate.edu) diagram.
(Links to an external site.)
Longer quotes need to be avoided in this short 1.5-page paper. Use your words to make your points.
Strongly recommended: Before turning in your essay, double-check your paper for originality and citation infringement. Your final draft will be screened for originality and plagiarism.
Discussion
How will Blockchain increase transparency and accountability in marketing?
Need 500 words
Computer Science 302 (Business Communication and Data) Presentation
Instructions
Explain and provide example when it is possible that will cover chapter & subjects: Power Points on this chapter is uploaded below.
– Backbone Network Components
–Switches, Routers, Gateways
– Backbone Network Architectures
– The Best Practice Backbone Design
– Improving Backbone Performance
– Implications for Management
Present and discuss ONE of VLAN Management Software :
foresnisc-3
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.
Write a short paper, 200-300 words
Quantitative Research Design Prompts
Description
This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.
Instructions
After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.
The selected question to write
3B: Threats to Validity
In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.