write 500 letters about this please i need it in 20 hours from now
802.11x phones with a cellular system
The CEO of your selected industry has asked you to explore the possibility of replacing the wireless 802.11x phones with a cellular system. Explain the security program described, the differences in core architecture between different generations of cellular and mobile network technologies, the end-to-end delivery of a packet and/or signal, and what happens with the hand-off at each step along the communications path to the CEO.
Overview detailing the following:
- Various smartphone generations and technologies (e.g., GSM, WCDMA, CDMA2000, LTE).
- Recommendation for embedded smartphone operating systems (e.g., iOS, Android).
- Changes to existing networking infrastructure.
- Implementation of mobile protocols, logical channels, and encryption standards.
- Using mobile-unique identifiers and location-based services to track device and data input validation.
Your recommendations should cover the feasibility of using cellular systems to enter secure data into proposed databases.
Sheets
Week 9 Assignment
Do a bit of research on File Inclusion Vulnerability and answer below questions.
- 1. What is it?
- 2. Why is is dangerous?
- 3. What is the difference of low and remote inclusion?
- 4. What methods can me employed to prevent a security breach?
- 5. What programming languages are vulnerable to this type of attack.
Note: Answer to each of these above questions should be around 75 words.
Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.
Ethical Hacking_Week8
Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more). briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.
Questions – File attached
Need 2 to 3 lines of answers for the questions in the file attached
disucssion-7
You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.
paper
Introduction: As we approach the end of semester, it is time to start making connections, and applying your knowledge, to demonstrate your understanding of what it means to be an MIS in an organization. To do this, you will write a paper in three parts that will discuss and analyze the ways COVID-19 has changed business processes.
This paper should be written in APA format and must be between 750-1000 words, which is between 3 and 4 double-spaced pages (your cover page and reference pages do not count). You will also need to reference a minimum of 5 different book chapters and two outside sources in ways that directly support your discussion and analysis.
Paper Structure: (Keep in mind that the three sections below do not represent paragraphs. Your paper should be composed of several paragraphs)
First, you will find a business process from an industry that has been directly affected by COVID-19 (health industry, food industry, entertainment industry, etc.) and identify and explain how that industry used to conduct business pre-COVID. Make sure the industry and the business process you choose is related to Information Systems and that it has a clear business process you can identify and break down in steps. For this part of your paper, be sure to include:
- What is the industry and what is the business process you will explain?
- What were the pre-COVID steps to complete the busines process?
- What was the ultimate goal of the activity (of the process)?
- What was/were the transaction(s) that occurred during the business process?
Second, revisit that same activity but under the current COVID situation and share:
- How has the activity/process changed?
- What are the steps now?
- What has been the most significant change in the process?
- Why are these changes to the process necessary under COVID conditions?
- Do you still achieve the same goal in the end?
Finally, wrap up your paper by discussing the implications of the change. Be specific and use examples. Address the following:
- Will there be more changes to the process post-COVID?
- Will the process evolve, remain, or return to pre-COVID status? why or why not?
- Do you foresee a full new process altogether? Yes, no, why?
- What should informed users know about these changes and how should they think of them moving forward?
Requirements:
ü 750-1000 words
ü APA format and citation
ü Five references to different chapters in our book
ü Two outside sources
ü Follow this prompt closely
Here is a list of useful resources to help you with the research of the industry processes, and
Resources
COVID-19: Implications for business
https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-for-business
The impact of COVID-19 on small business outcomes and expectations
https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-for-business
Coronavirus: Business and Economy
https://www.businessinsider.com/coronavirus-business-impact
Effects of COVID: Industry
https://www.eidebailly.com/effects-of-covid-19#industry
How the COVID-19 pandemic will change the way we live
https://www.discovermagazine.com/health/how-the-covid-19-pandemic-will-change-the-way-we-live
How will coronavirus change the way we live?
Assignment 500 words
Finish it in 24 hours, no cited needed
cloud computing
Discuss Shared technology vulnerabilities in the cloud?
Propose and defend a topic for your final project. Write 500 words or more explaining why this topic is important for your peers to understand. Be focused and specific.
Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.