please discuss the case involving the United States of America versus Ross Ulbrecht.
Words: 500 words APA format
please discuss the case involving the United States of America versus Ross Ulbrecht.
Words: 500 words APA format
Discuss security threats that the FriendFinder(https://friendfinder.com/) faces in the industry
Resources: https://www.securitymagazine.com/articles/92201-top-10-largest-data-breaches
Need 4 pages of content with Proper API citation.
1) Read this Time article and view the video(https://time.com/5168202/russia-troll-internet-research-agency/) explaining how Russian trolls spread fake news. Discuss in 500 words whether the government should regulate Facebook more closely.
Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
2) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. Describe Digital Literacy (how to know what is real on the web).
2. None of these people exist. What does this mean to you?
3. Why is Wikipedia more reliable than a paper encyclopedia?
4. How useful are crowd sources answers?
5. What are some drawbacks to crowd sourced answers?
6. Do people generally utilize the diversity of sources on the Internet effectively?
7. How reliant are we and how reliant should we be on getting our news from social media?
8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?
9. If models are simplifications or reality, why do we rely on them?
10. Why was this model, used by Amazon for hiring, wrong?
11. Why did Skynet declare war on the human race?
3) The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question.
Your Research Project will be a presentation on some aspect of the surveillance state. Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases
Use at least five sources.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Short excerpt on the Surveillance State :
4) Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes.
Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
5) Your Research Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.
The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.( https://www.nec.edu/students-faculty-staff/library-danforth/research-help/databases-help/)
6) Do a bit of research on penetration testing techniques. Investigate and document the following
· Five network penetration testing techniques
· Advantages and disadvantages of each
· One notable social engineering test
· Possible negative implications of penetration tesing
Please write between 300 words
7) Prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation “Topic : White Hat Hacking”, Include a short paragraph describing your project and how you intend to research it.
· Week 11. Submit final project.
· Week 12. Submit a brief abstract describing your final project.
Week 13. Submit final project materials.
o 500-700 word, double spaced, written in APA format, showing sources and a bibliography
List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
List and describe budget considerations one should evaluate before moving an application to the cloud.
Overview:
In the meeting with your executives, your CEO announced that you would need to
prepare a PowerPoint presentation of your department achievements for the last quarter
and present it in front of the hospital’s board of trustees who will be visiting your hospital
by the end of the month.
Instructions:
Based on that information, your IT Director asked you to prepare a 12-15-page
PowerPoint presentation which will take a fifteen-minute time slot where you discuss the
following:
• As you have opted for Windows-based computers, what are the significant
differences between a Mac and a Windows-based computer?
• What are the main differences between the leading operating systems: Windows,
Mac OS, and Linux?
• What are the measures that you are taking to keep computers safe and to avoid
health hazards from computer use?
• Is the hospital safe and immune from online annoyances such as spam and
adware? How can you further secure your system from malware?
• The advantages of your recent implementation of VoIP?
• Describe the improvements you have implemented in the hospital’s customer
relationship management (CRM) and how are you managing your relationship
with your vendors.
• Discuss whether the adoption of a medical expert system could be beneficial to
the doctors at your Hospital.
• Describe how social media can be effectively used as part of the hospital’s web
strategies and improve its position in the market?
Requirements:
• This assignment is a PowerPoint presentation consisting of 12-15 slides, using
APA formatting and citations.
• Include four references.
• Record voice narration and include closed captioning or script saved to the notes
in PowerPoint.
o For instructions to add narration to a slideshow: https://support.office.com/enus/article/record-a-slide-show-with-narration-and-slide-timings-0b9502c6-5f6c-40aeb1e7-e47d8741161c#OfficeVersion=Office_365
minimum 2 references and 450 words
Discuss the preparation within your own organization in regards to your Emergency Operations Center. What are the pros and cons of your current preparations?
300 words
100 words overview.
What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?
Your paper should meet the following requirements:
The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.
The manager has provided the following employee descriptions:
For each employee, you must:
Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.
Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.
Read the instructions carefully. This assignment is the related work section of what has been done by other researchers on the topic, “Recent job trends in computer science”. The section should be written as a narrative and should include 8 references.