4s week 15 assignment EH Final Project

in 750 words, + 10 PowerPoint presentation Slides

Please find the attachments below.

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Include references.

No copy-paste strictly, plagiarism results in course termination. 

Physical Security -Reflection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Note :Please write based on the attached Textbook

D10

What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

250-300 words with a minimum of 2-3 references in APA format

CIS 500 WEEK 5

Customers use mobile devices for a wide range of shopping and commercial activities. Mobile devices are becoming an attractive way to pay for products or conduct banking. Select an organization with which you regularly do business, but not one you have used in a previous discussion. Do not repeat an example that has been posted by another student.

Describe the benefits this organization provides through its mobile computing options.

  • What risks most concern you in using this app?
  • How would you mitigate these risks?

Essay On Browser Cookies

 Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

  • www.allaboutcookies.org/
  • www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.Safe Assign is software that verifies the originality of your work against on-line sources and other students.Note your Safe Assign score. Submit references separately (or add as text) otherwise they cause the Safe Assign score to increase. 

wireless communication

Topic: modern day attacks against wireless networks

Prepare a report on your  topic from Week 2 with a minimum of 2000 words, 

References (10 minimum). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted).

Activity Diagram

Create an activity diagram of the Request For Proposal (RFP)/Proposal interaction between a potential customer and Acme Electric, LLC (Acme).

You are an analyst tasked to create an activity diagram in the analysis phase of an object-oriented analysis and design project. What follows is the interaction between a potential customer and Acme. The activity starts when the potential customer creates and sends an RFP. This activity ends when the potential customer either accepts or rejects Acme’s Proposal and possibly informs Acme of the decision.

You are NOT documenting a system, you are creating an activity diagram for a business process. The business process that you will model using an activity diagram is as follows:

A potential customer (Customer) creates and sends to the owner of Acme (Owner) a Request For Proposal (RFP) which includes an Electrical Drawing (ED) for the proposed work. An ED is an architecture blueprint which only includes the electrical portion of the work.

Owner studies the ED and RFP for the following:

  • Amount and types of electrical materials required
  • Amount and types of special equipment that may be required
  • Amount of labor that may be required
  • Specific dates Customer may have asked for the project to occur
  • Any other information that Customer may have included in the RFP

Owner sends to his supply person (Supply) a:

  • Bill of Materials (BOM)
  • special equipment list

For both lists, Supply enters the wholesale price and availability of each item. The gathering of data for each list is not dependent on the other for completion and return. Supply obtains the information for the BOM either from stock on-hand or electrical supply vendors, completes the form, and returns the BOM to the Owner. Supply obtains the special equipment information from equipment vendors, completes the form, and returns the special equipment list to Owner.

Owner checks his crews’ calendars for availability during the time period that the customer has requested.

After Owner has gathered all the information, Owner decides on a proposal price. Owner prepares a proposal and sends it to Customer.

If Customer likes the proposal, they sign it and return it to Owner. If Customer does not like the proposal, they either ignore it or inform the owner of the decision.

– UML state/activity