Short research paper for PHD. Please read below before bidding. APA 7th edition format MUST

 The journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

Discuss Malware

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. What is malware? 
    1. Discuss at least five types, describing each.
    2. Discuss what they are and what they do.
    3. Discuss a notable instance of each type
  2. What impact can malware have on an organization
  3. How can an organization reduce risks associated with malware?  (Hint: talk about appropriate types of policies, procedures, and the use of technology)
  4. What is software piracy or license violations?
    1. What can an organization do to avoid it?
    2. What are the potential consequences of it?
    3. What relationship does it have with malware?

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

Week 7

 

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem (You may use a different application if PowerPoint is not available).

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart (You may use a different application if PowerPoint is not available)..

  • Problem 1: Create a list that contains the months of the year.
  • Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Web applications

 You are the webmaster for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. 

Discussion and Assignment

 Discussion

 In no less than 250 words, explain what is meant by an IDS and an IPS.  How are they different?  How are they connected to a network?  List a few examples of IDS/IPS tools that are currently on the market.  

Week 11 Assignment

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Discussion

 Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 

 

Internet Research – Wk 11

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs 

Regulatory Compliance

Describe in 400 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Cybersecurity

Reflect on what you have gained from taking this course.

Write a short statement of 200 words that completes and explains the following sentence.

“One of the most important Cybersecurity learnings I am taking away from this  fundamentals of Cybersecurity course is…

9 – Imoprtance of strategic IT planning

 

Discussion: Physical Security

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post. The answer should be a minimum of 250 – 300 words.