CHECK ATTACHMENT
security architecture 13.1
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 450 words minimum
In today’s fast-paced, often “agile” software development, how can the secure design be implemented?
Finance & Blockchain
Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:
(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.
(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?
(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.
Course writing requirements:
References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
Always include a cover page and reference page with all submissions (even initial discussion posts)
Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
No abbreviations, no contractions – write formally
Write in the third person formal voice (no first or second person pronouns)
Write more than the minimum requirement of the word count assigned
As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
Indent the first line of each new paragraph five spaces
Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.
Discussion
Create a discussion thread to answer the following question:
The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device?
Cyber Foundations
Application Assignment 2 – Krebs on Security
This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.com. KrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com.
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge. The articles must have been published in the last six months. For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site. Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information. Limit your writeups to no more than one page for each of the two topics. When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base. For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic. Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found. Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.
4 Weeks / Intro to Programming Concept
Currently Unavailable to complete
Dates are:
01/05/2021-
01/30/2021
Operative Paradigm
- Develop a personal “operative paradigm” based on a review of the paradigmatic assumptions and concepts involved in each of the three basic methodological approaches in organization and management research. First, a brief review of the three basic methodological approaches in organization and management research is conducted. Second, the preferred personal “operative paradigm” is covered based on the following components: assumptions, concepts, propositions, hypotheses, variables, and operational definitions.
- The body of your paper should be 7–10 pages long, written in good APA, and with at least 10 references.
Job search 4.0
Research project manager’s positions and please post the following. Please do not copy and paste from web sites.
- Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area.
- In your opinion was any of the information that you uncovered in your search interesting or surprising?
2000 words
Technology Entrepreneurship
Read the attached case study and write analysis and answer the case study question in APA 7th edition with 2 and a half-page
Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.
Data Mining Assignment
Provide a real world example of a probability distribution based on your readings for the week. Consider the data instances that is different from uniform (i.e., equal probability).
Instructions for participation: You must post an INITIAL POST and then respond to at least ONE POST. In both postings, you MUST provide citable academic literature to defend your use case. Please do not use the same source over again, especially when most times there is absolutely no applicability from one post to the next.