Software -6 Assg

 Please read chapter 15 and review reputable articles/journals and describe what is Software Reuse? Briefly explain the benefits and problems with reuse.  

CIA Triad

 Discuss the concepts used in the Confidentiality, Integrity, and Availability triad. Discuss how each part of the triad is relevant to a large university or other organization of your choice. 

Discussion and research reports for Cyber security

Need to present a Discussion with a word count of above 150+ words and each discussion need a separate reference link for sure.

1) Deep learning cyber issues(150 words)

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

3) Insider threat (150 words)

4) Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

  

1) Deep learning cyber issues – 70-110 words

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70= 140+ words)

3)Insider threat – 70-110 words  

4)Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+ words)

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY 

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 02/08/2023 11:59PM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Graduate research jan 31

Assignment Content

  1. STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both.    In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)   For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following: 
    • Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
    • Page 2 = 60 pts (breakdown below): Simply answer the following questions
    • (1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts) 
    • (2) What is the title of the research article you found? (5 pts)
    • (3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words(30 pts)
    • (4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings(20 pts)
    • Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)

Conducting and Reporting an IT Infrastructure Compliance Audit Responses

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. 

Click on ATTACHED file for the instruction and responses.