Cyber Law – Discussion 3

 A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

Post should be 500 words and add references in APA format.

Application Security or Penetration testing methodology

  1. Research 14-1 – Application security or penetration testing methodology.   APA formatting is expected.  Research various application security testing or penetration testing methodologies.  Compare and contrast the pros and cons of each methodology and recommend your preferred approach. 
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

emerging threats and counter measures

 

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cloud Computing in Education – Paper – 13 hrs

The topic of the paper is “Cloud Computing in Education”. Paper should consist of following sections and I have listed the section by resources to.

1. Abstract (1/2 page)

2. Introduction ( 1/2 page)

3. (2 pages)

a. Cloud Computing in Higher Education

b. The Challenges of Cloud Computing in Higher Education

– https://www.librarystudentjournal.org/index-php/lsj/article/view/289/321/#need?CSRF_TOKEN=1451c54f7aa59da7d6999c2281cefc17892a7939

4. Proposed Architecture for HE institutes (3 page)

– section 7 in paper- https://www.sciencedirect.com/science/article/pii/S221256711400224X

5. Advantages of using e-learning in the cloud (1/2 page)

– section 4 in paper- https://www.orizonturi.ucdc.ro/arhiva/2014_khe_6_pdf/khe_vol_6_iss_2_100to103.pdf

6. Conclusion (1/2 page)

Abstract, introduction and conclusion can be grabbed from below links(latest paper is the preference)

https://d1wqtxts1xzle7.cloudfront.net/44685282/IJIRSTV2I10084.pdf?1460530711=&response-content-disposition=inline%3B+filename%3DCloud_Computing_in_Education_Sector.pdf&Expires=1602376924&Signature=Bt2TMamjaN5OrthY7dGqyvrJ4LQ3CgctpRpaZTN~n6PA-dtKcjGjU5Mt3SeKQGTHW-t3IvWgomad29U9ZNWKWJKAAl68XvJtOloYi6VlhAQqttNrb52YNLr-yRPiR7kf5JFBtr1pMJk5KIdrXqMq08~iUGCpK0tjFrIJV~2t-cVjoDwQ12O44Y8ii8~HOB1QJ6zTZRcIHbhzlxFzrPSlJplCgssG0NF7FYIjbB5wnLABeo4ldCrbzyVhmg0YPQ9FzTrYpC0~DuMmSAg5AUM3dyfBOPcHRNexKROg7bZDPR5-FXlBrL5hv1vS~rvzOiQ58cptnRMV4NT4JVrylcJuYA__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

https://link.springer.com/chapter/10.1007/978-1-4614-3329-3_2

http://www.ijcte.org/papers/511-G1346.pdf

Discussion 4 Info tech import strat plan

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

bitcoin economics research paper

 Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

5 pages , APA format, 3 scholar references

Discussion

  

Discussion:

1. Explain the relationship among data mining, text min-ing, and sentiment analysis.

2. In your own words, define text mining, and discuss its most popular applications.

3. What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

4. What is the role of NLP in text mining? Discuss the capa-bilities and limitations of NLP in the context of text mining.

DATABASE security

  

Do a bit of research into File Inclusion Vulnerability.

What is it? Why is dangerous? What is the difference between low and remote inclusion?

What methods can be employed to prevent a security breach?

What programming languages are vulnerable to this type of attack?

Post between 150-300. Use your own words. Do not copy the work of another student.