cloud myths

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format.

Enterprise Risk Management – Research Paper

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

computer science

if you know about computer science and programming and python text me I need someone good can help me with my class and you should know English please 

Information Security and Risk Managment

  

Task 1

1. Define BIA (Business Impact Analysis)

2. Define BCP (Business Continuity planning)

3. Explain how BIA fits within BCP 

Goal and Purpose of BIA:  

The Main Goal and purpose of BIA are to analyze mission-critical services and business functions. Moreover, it helps to find and prioritize System resources/ Components by mutual relating them to the Critical processes or Services and identify the impact on those services if the System becomes unavailable.

BIA is used to find out impact to quantitative and qualitative process. organization determine five short and long RTO categories. As per there criticality processes and systems are kept in appropriate categories. BIA determines the time frame to restore each process or system to avoid serious organizational impact. for example, data backup should happen as frequently as possible. Recovery point objective should always be determined before any kind of data lost happens. Data restoration and time needed for it should always be considered as function of recovery time objective. 

Task 2 

1. Why do you believe (or don’t believe) reviewing a risk assessment plan is important.

2. What are risk elements; what process/s is/are used to find these risk elements; what role does a cost-benefit analyzes play in evaluating these risk elements?

3. Explain your understanding of a risk mitigation plan. As you recall, this was already partially discussed in week 10. However, for this week, go into the specifics of the plan, to include a narrative on the best practices used.

4. What role those a business impact analysis play in the overall risk management process? Include a discussion on the steps and critical elements a business impact analysis will provide.

5. Discuss your understanding of the benefits that can be derived from a business impact analysis, to include best practices to follow.

Policy and legal_10

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

 

Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

700 word discussion: Leadership

1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 

2. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.

3. Review table 8.1  note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

ns-12-p

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

ET WK10 Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • 4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.