There has two website: Learn Cs 008 (https://learncs8.com/index.php)and the other one called AWS. Follow instructions with LearnCs008 Lab 3 resume and do it on AWs.
Create a conference room scheduler PHP web application.
Requirements:
- Allow users to login to the site
- Allow users to register to the site
- Users should be able to reserve rooms for a specified date and time range
- Validate user input
- Display error messages when appropriate.
- List conference room reservations sorted in date and start time order
- Allow two display options:
- All-display all conference room reservation schedules; past and future
- Future-display conference room reservations that are scheduled in the future only
* Do not allow reservations outside of business hours or during the weekends
Attached is my code that you will build off of and the SQL for the database I am using
PLEC Week 10
Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?
2. are we working more and earning less?
3. Would you want a telecommuting job? Why or why not?
4. Does the gig economy appeal to you? Why or why not?
5. How is an employee differentiated from a contracter under US law?
6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?
7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?
8. How much monitoring of employee activities at work is appropriate?
9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?
10. What is the relationship betwee BYOD (bring your own device) and shadow IT.
11. What is cyberloafing?
Internet of things Article – Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things:
For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 2 to 3 pages (600 words), using your own words, by addressing the following:
- What did the authors investigate, and in general how did they do so?
- Identify the hypothesis or question being tested
- Summarize the overall article.
- Identify the conclusions of the authors
- Indicate whether or not you think the data support their conclusions/hypothesis
- Consider alternative explanations for the results
- Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
- The relevance or importance of the study
- The appropriateness of the experimental design
When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.
Your paper should meet the following requirements:
- Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Enterprise Risk Management
Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
Querries
1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).
2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence? Why or why not? (300 Word)
Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose.
Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information:
- Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
- Step-by-step description you used to gather data for analysis
- Report on the information that was obtainable from the device
- Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
Cloud computing
According to Gartner (Links to an external site.), most organizations today have some type of hybrid cloud infrastructure in place. While Hybrid clouds provide many benefits, they also present a number of unique and complex security challenges. For this week’s assignment, research and address the following topics below around the Hybrid Cloud model. In your response, you may include specific use cases and/or general considerations around accessing resources and data between public cloud and on-premise environments. Your assignment should be 2-3 pages in length, with two or more references in APA Format cited in your response.
- Access Control
- Monitoring
- Costs
- Backup / Disaster Recovery
Research Current Legal Rulings
Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.
In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action.
For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.
- Go to: the Federal Register. https://www.federalregister.gov/.
- Use the Search bar to find rulings related to your topic.
- Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
- Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization.
- Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).
Possible topics for your search:
- Anti-malware
- compliance/auditing
- forensics
- ID management
- Intellectual property
- Managed security service providers (MSSPs)
- Messaging safeguards
- Patch management
- Perimeter defenses
- Security information management (SIM)
- Security event management (SEM)
- Incident response
- Transaction security
- Wireless security
Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the following chart format for your summary.
HUMA Final
Master Paper and Final