dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

cryptography and Network Security

I need the solutions for the 2 problems of this uploaded file. like;

 For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why. 

 Services: 

 C – Confidentiality, 

 AS – Authentication of the Sender, 

 AR – Authentication of the Receiver, 

 NS – Non-repudiation of the Sender, and 

 NR – Non-repudiation of the Receiver. 

The file uploaded has the whole 2 problem Questions

CYS-13-D

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 300 words

Practical Connection Assignment

  

Assignment:
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Information Systems Business and Beyond

Complete the following assignment in the Information Technology and Organizational Learning textbook:

  • Chapter 9 – Review the section on Establishing a Security Culture.  Review the methods to reduce the chances of a cyber threat noted in the textbook.  Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
  • Chapter 10 – Review the section on the IT leader in the digital transformation era.  Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate.  What are some methods or resources leaders can utilize to enhance their change attitude?

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Identify your answers by its chapter # to help the reader find your answers to specific items. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least two pages in length (one page per chapter). The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

PLEC Week 6

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer. 

1. what do each of these terms refer to: copyright, patent, trademark, trade secret? 

2. Why is intellectual property entitled to legal protection? 

3. Why did copyright laws become stricter and more punishing in the late 20th century? 

4. What is the Fair Use doctrine?

 5. Make an argument for legalizing the copying of music or software. 

6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?

 7. What was the 1984 Sony Supreme Court case about? 

8. Was Napster responsible for the actions of its users? 

9. Why did the court find in favor of Diamond in the Rio case? 

10. What is Digital Rights Management?

Information Security and Risk Managment

  

Task 1

1. Define BIA (Business Impact Analysis)

2. Define BCP (Business Continuity planning)

3. Explain how BIA fits within BCP 

Goal and Purpose of BIA:  

The Main Goal and purpose of BIA are to analyze mission-critical services and business functions. Moreover, it helps to find and prioritize System resources/ Components by mutual relating them to the Critical processes or Services and identify the impact on those services if the System becomes unavailable.

BIA is used to find out impact to quantitative and qualitative process. organization determine five short and long RTO categories. As per there criticality processes and systems are kept in appropriate categories. BIA determines the time frame to restore each process or system to avoid serious organizational impact. for example, data backup should happen as frequently as possible. Recovery point objective should always be determined before any kind of data lost happens. Data restoration and time needed for it should always be considered as function of recovery time objective. 

Task 2 

1. Why do you believe (or don’t believe) reviewing a risk assessment plan is important.

2. What are risk elements; what process/s is/are used to find these risk elements; what role does a cost-benefit analyzes play in evaluating these risk elements?

3. Explain your understanding of a risk mitigation plan. As you recall, this was already partially discussed in week 10. However, for this week, go into the specifics of the plan, to include a narrative on the best practices used.

4. What role those a business impact analysis play in the overall risk management process? Include a discussion on the steps and critical elements a business impact analysis will provide.

5. Discuss your understanding of the benefits that can be derived from a business impact analysis, to include best practices to follow.

Easy Computer Assignment

 

  1. Download the attached data file Snow19.accdb and then save it as SnowRemoval19.

*Make sure you know the location where you are placing your saved file before you continue with step 2.

  1. Use the Form Wizard to create a Form based on the Clients table. Select all fields for the form, use the Columnar layout, and specify the title ClientContactInfo for the Form.
  2. Display the Form in Layout view, and then apply the Organic theme to the ClientContactInfo Form only.
  3. Switch to Form View, and use the Client Contact Info Form to update the Client’s table as follows:Use the Report Wizard to create a Report based on the primary ServiceAgreements table and the related Invoices table. Select all fields from the ServiceAgreements table, and select the InvNum, InvDate, InvAmt, and Paid fields from the Invoices table. Do not specify any additional grouping levels and sort the detail records by the Paid field in descending order. Choose the Outline layout and Landscape orientation. Specify the title InvoicesByAgreement for the report.
    1. Use the Find command to search for pony anywhere in the Company field to display the record for the Pony Grill (Client ID 21). Change the Street field value in this record to 8930 Saddle Brook Way.
    2. Add a new record with your first and last names in the First Name and Last Name fields.
  4. Display the report in Layout view. Change the report title text to Invoices by Agreement.
  5. Apply the Organic theme to the InvoicesByAgreement report only.
  6. Resize the Service Type label so it is about half the width it used to be and resize the Amount field value box so the value in it is right-aligned with the values in the ClientID and DateSigned field value boxes.
  • In case you need help with any step, contact me immediately please.
  • In the event you turn your assignment improperly completed, you need to write a note and explain what step/s you did not properly complete and what you were doing that did not work. You need to be specific and as clear as possible. I need to understand your approach in order to be able to help you better.
  • The last opportunity to turn this assignment and get a chance to resubmit it in case you need to do it to ensure a better grade is Thursday, in that case you will have until Saturday to resubmit your assignment one more time with the necessary corrections to secure a great grade.