Proof reading

Very urgent!

I have done writing this paper which is a scholarly paper, but I want to add more relevant content to the paper from the topics inside it, so the paper can be longer. It’s IEEE style. I want you to add about two more pages ( 4 columns ). 

First, read the paper, then add the relevant content and information.

Penetration Testing

 

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words

ITM capstone – Week 4 Graded Assignment

 From Chapter 12, page 379 WEB-BASED CASE STUDY, THE FUTURE OF LIFE INSTITUTE.  Read the case and answer all questions (20 points).

Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What other concerns should the public bear in mind as the technological revolution advances?

Sources:  Future of Life Institute.  http://futureoflife.org

Ethical Hacking week 1

 

Wk 1 Research Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.Click on the LINK above to submit your WORD document for this week’s assignment. 

 

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

The Use of Enterprise Resource Planning (ERP) in a Manufacturing Company

Overview:

SAP is an enterprise resource planning (ERP) manufacturing software that offers

industry-specific functionalities designed to help midsize companies boost operational

efficiency, strengthen customer relationships and enhance business agility. The use of

ERP encourages an integrated view of business processes to better manage financials,

inventory, human resources, product development, sales, and marketing.

Instructions:

Imagine a manufacturing company that is using a centralized system based on ERP, for

example, SAP. Based on what you know from your own company or from the materials,

write a short paper focusing on the following points:

• The advantages of a centralized system.

• The supply chain management (SCM) and its interaction with the strategic

information system (SIS).

• The company’s customer relationship management (CRM) and how they are

managing their relationship with their vendors.

Requirements:

• This assignment is a paper consisting of 2-3-pages, using APA formatting and

citations.

• Include at least two resources.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

I am currently unable to do more than what I am offering. If you can not do it I understand. Please do not ask for more than what I can currently afford. 

Thank You!

End search 2

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

2000 words

5s week 3 assignment BS

in 300 

 

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Include references, No copy paste strictly.

Single sign-on (SSO)

Single sign-on (SSO), security, and authentication are common terms in enterprise technology.  Research SSO and prepare a comprehensive paper that explores the pros and cons of the SSO system.  Discuss the benefits and detriments of SSO to the security protocol in an enterprise.  Finally, assert your opinion on whether SSO is a benefit or detriment to security.

3 pages