802.11x phones with a cellular system

 

The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.

Overview detailing the following:

  1. Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
  2. Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
  3. Changes to existing networking infrastructure.
  4. Implementation of mobile protocols, logical channels, and encryption standards.
  5. Using mobile-unique identifiers and location-based services to track device and data input validation.

Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.

Sheets

Sub Sheets needs to be done as following
# 4&5 Adjusting Entries
# 6 Adjusted TB
#7 Financial Statements

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

Ethical Hacking_Week8

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more). briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

disucssion-7

 You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation. 

paper

  

Introduction: As we approach the end of semester, it is time to start making connections, and applying your knowledge, to demonstrate your understanding of what it means to be an MIS in an organization. To do this, you will write a paper in three parts that will discuss and analyze the ways COVID-19 has changed business processes. 

This paper should be written in APA format and must be between 750-1000 words, which is between 3 and 4 double-spaced pages (your cover page and reference pages do not count). You will also need to reference a minimum of 5 different book chapters and two outside sources in ways that directly support your discussion and analysis. 

Paper Structure: (Keep in mind that the three sections below do not represent paragraphs. Your paper should be composed of several paragraphs)

First, you will find a business process from an industry that has been directly affected by COVID-19 (health industry, food industry, entertainment industry, etc.) and identify and explain how that industry used to conduct business pre-COVID. Make sure the industry and the business process you choose is related to Information Systems and that it has a clear business process you can identify and break down in steps. For this part of your paper, be sure to include:

  • What is the      industry and what is the business process you will explain?
  • What were      the pre-COVID steps to complete the busines process?
  • What was the      ultimate goal of the activity (of the process)?
  • What      was/were the transaction(s) that occurred during the business process?

Second, revisit that same activity but under the current COVID situation and share:

  • How has the      activity/process changed?
  • What are the      steps now?
  • What has      been the most significant change in the process?
  • Why are      these changes to the process necessary under COVID conditions?
  • Do you still      achieve the same goal in the end?

Finally, wrap up your paper by discussing the implications of the change. Be specific and use examples. Address the following:

  • Will there      be more changes to the process post-COVID?
  • Will the      process evolve, remain, or return to pre-COVID status? why or why not?
  • Do you      foresee a full new process altogether? Yes, no, why?
  • What should      informed users know about these changes and how should they think of them      moving forward? 

Requirements:

ü 750-1000 words 

ü APA format and citation 

ü Five references to different chapters in our book

ü Two outside sources

ü Follow this prompt closely

Here is a list of useful resources to help you with the research of the industry processes, and 

Resources

COVID-19: Implications for business

https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-for-business 

The impact of COVID-19 on small business outcomes and expectations

https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-for-business 

Coronavirus: Business and Economy

https://www.businessinsider.com/coronavirus-business-impact 

Effects of COVID: Industry

https://www.eidebailly.com/effects-of-covid-19#industry 

How the COVID-19 pandemic will change the way we live

https://www.discovermagazine.com/health/how-the-covid-19-pandemic-will-change-the-way-we-live 

How will coronavirus change the way we live?

https://www.bbc.com/news/explainers-52356136 

cloud computing

Discuss Shared technology vulnerabilities in the cloud?

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.