Discussion

 

Most hackers start their careers breaking into computer systems as teenagers. 

What can we as a community of computer professionals do to reduce the temptation to become a hacker?

Knowledge creation organizational

knowledge creation, culture, and strategy.  Explain how balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization?

reflection

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course

How blockchain can be beneficiary for financial sectors 

Security Design principles

After  reading chapter 1, compare and contrast two fundamental security design  principles. Analyze how these principles and how they impact an  organizations security posture.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Page 34-37 serves as good introduction to the topic

ERM Week 2

Q1.  275 words

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper among above two was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Q2. research paper – SEPARATE Document – 5 full pages

  Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Hypothetical Situaton

  Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. 

Discussion week 3 infotech global

 

Question: Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages of this approach?  Is there another approach that might work better?

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • please cite properly in APA
  • Make an argument concerning the topic.
  • Your initial post must be at least 250 words 

No Plagirsam 

Wireless Security & Forensics

 

In this weekly discussion, you will discuss the use of a tool for manual examination of a phone:

  • Select  one of the tools mentioned in the text and describe the tools  functionality and process used in an examination of a device.
  • Using the Internet, research the web for an article related to the tool and answer the following questions:
  1. What are some of the advantages or disadvantages of the tool?
  2. Discuss the tools setup
  3. Appraise the value of the tool in gathering evidence for prosecution

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

emerging threats and counter measures wk12

 

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper 15 pages subject Enterprise risk management and need PPt of 12 slides

 
•    Here’s the approach you can take for this paper:

  • Title page (ensure team members and IDs are listed)
  • Introduction – provide a background of the selected organization.
  • Risk #1
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #2 
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #3
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Conclusion
  • References (minimum of 12 reputable sources)
  • Appendix (if any)

The paper will range from 15-to-20-pages includes title page, content, and references.

Please write in APA Style.