Chapter Instructional Summary

 

  1. Create a web page and save as “assign3.html” and include the following information head meta tag information:
    -Your complete name
    -Course CRN – 12345
    -Date when you completed the assignment
    -Assignment number, for example: Assignment 3

  2. Research online on the following topics from the textbook and write two paragraphs (4 sentences or more per paragraph or a total of 8 sentences or more) for each topic:
    1. History of JavaScript and what it can do. (pages 77-79)
    2. Where JavaScript code can be inserted in an HTML file or as separate files. (pages 79-81)
    3. JavaScript capabilities. (pages 81-83)
    4. Creating and testing JavaScript. (pages 84-91)

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments. 

case study

Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the success factors in the Scotiabank-Kabbage partnership?2. Under what conditions is the same model applicable?When will the Scotiabank-Kabbage model not work?3. Under what circumstances should Scotiabank seek fintech partnerships?4. Identify a sector (e.g., international payments, blockchain, lending or wealth management) and a geographic market where a fintech partnership would create value for Scotiabank, and explain why.5.Based on your answer to question 4, what recommendations would you make to Scotiabank’s executives for a three-year plan, choice of partner, reason for the partnership, and suggested procedure (i.e.,what partnership model to follow)?6. What challengers is Scotiabank facing in the blockchain sector? What are the implications for the bank’s blockchain partnership strategy?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

dis_biwk2

 Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning. 

Research paper and discussion

Part 1: Research paper (4-6 pages)

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2: Discussion (500 words) and 2 responses

 expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3: Practical connection assignment (500 words)

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.  
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Part 4 : Discussion (500 words) and 2 responses

discuss the characteristics of the three predominate anomaly detection methodologies.: Model-Based vs Model-free, Label vs Score, and Global vs. Local Perspective.  

Analyzing data

Where does data analysis begin?

The collection of data is not the onset of data analysis projects. A data analysis project begins with a purpose, problem, and research questions.

Find one scholarly research paper with an excellent example of:

  • Problem statement
  • Research questions

The example shall relate to a practical, real-world work environment in the information technology field. After finding the research, discuss the following:

  • What makes this example excellent in the topics that initiate a data analysis project?
  • What relates this example to a practical, real-world work environment in the information technology field?
  • Do the research questions meet the criteria defined in the lecture in week one?
  • What is the generalizability of this research?

Access control discussion 9

What technology can a business use to assist in the access control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.