assignment Urgant

6pages and Format APA

Based on your previous work in the previous week,createa 700-word entry in yourDatabase Management Plan.

wireless security

 

rom Case Project 8-6: Lake Point Security Consulting:

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in
their final year of the security degree program at the local college.

Pomodoro Fresco is a regional Italian pizza chain that provides free open wireless access to its customers and secure wireless access for its staff. However, Pomodoro Fresco is concerned about the security of the WLAN. They have asked LPCS to make a presentation about wireless attacks and their options for security. LPCS has asked you to help them in the presentation.

You will create a PowerPoint presentation for a fictitious company regarding wireless security. Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to Tech Republic Article about Powerpoint (Links to an external site.) for proper use of developing presentations in PowerPoint.  I expect to see:

  • a few bulleted items on at least one slide
  • at least one applicable graphics (charts, graphs, clipart) to make the presentation interesting
  • you should have an introduction slide
  • presentation about wireless attacks and their options for security
  • a conclusion slide
  • a slide for the list of your sources
  • total of 10 to 15 slides (includes Introduction slide, Conclusion slide and Sources slide)

Discussion 2 HRM

You are responsible for planning and conducting diversity training for your organization. List and explain a minimum of three topics that you would include in the training and explain your rationale.

APA format 300 words and intent citations and at-least 2 peer reviewed articles as references.

Digital Forensics Tools and Tech

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

300 words APA format

paper

 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)

Please use APA formatting and include the following information:

 

QUANTITATIVE Journal Article Review – SUBMIT HERE

You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)

Please use APA formatting and include the following information:

  • Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results: What were the major findings from the study? Were there any limitations?
  • Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  • References
  • Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results: What were the major findings from the study? Were there any limitations?
  • Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  • References

2019 Georgia cyber attack

2019 Georgia Cyberattacks

You are assigned with the task of writing a 1500-2000 word critical analysis academic paper on the incident response and disaster recovery of a specific cybersecurity incident. You will find your assigned cyberattack/breach in the list below. Your paper must analyze how the targeted/victim organization detected, responded to, and recovered from the attack. Your paper must include the following:

1. It must be 1500-2000 words not including the references (you will lose marks if you exceed or fail to meet the wordcount by). 

2. It must be an original work of your own research and writing skills, free of plagiarism. 

3. It must be in the ieee format with correct citations and references. 

4. It must be written in professional academic language free of colloquialisms but also written so that a reader with an unknown level of knowledge (such as a C level executive, a board member, or manager) can understand your meaning, argument, and purpose. 

5. You must use reliable sources. i.e. Trusted verifiable web resources (i.e. legitimate websites, news resources, white papers, peer reviewed works such as books, conference papers, reports journal articles, etc) NOT Wikipedia or personal blogs. 

6. Your paper must have an introduction with a clearly stated thesis (an argument statement that tells the reader the point you will make. For example, XYZ company’s response to the ABC cyberattack was poorly managed due to a lack of communication or 123 Corp prevented severe financial losses due to their incident response handling). The introduction is the roadmap/outline to your paper. Following the introduction there must be a body containing the history of the attack/breach and an analysis of the incident that supports and proves your thesis. Lastly, you must write a conclusion that states how you have proven your argument and why it matters to Contingency Planning (IRP, BCP, DRP). The written part of the paper must be followed by a properly formatted list of references.