Access control discussion 13

Discuss why business use cryptography?

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Benchmark – Framework Findings and Recommendations

This assignment serves to benchmark competency 2.1: Establish a risk management framework using industry standards for compliance.

Based on an executive level report, deliver the findings of the Topic 4 “Demonstrating the Gap” assignment.

Include the following in your report (add sections to the template as needed):

  1. An overview of why the report is being written
  2. A paragraph description of the system
  3. A paragraph outlining the framework governing the enterprise
  4. Major gaps that were found
  5. Remediation that is recommended
  6. A high-level diagram that represents the current state of the system
  7. An equal diagram depicting the proper end state

Refer to the “Security Assessment Report (SAR),” within the required readings. This resource provides detailed explanations of each section that should be included within the assessment report. 

APA style is not required, but solid academic writing is expected.

Refer to the “System Security Assessment Report Template” and the “Framework Findings and Recommendations Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

P13.7 and P13.8 computer science C++ coding assignment

computer science C++ coding assignment

Please see the attachments for the instruction of this assignment

Additional info:

In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.

The Center for Disease Control and Prevention (CDC) uses the social vulnerability index (SVI) to evaluate the impact of disasters on communities, weighting the damage with social factors in the states of South Dakota and Indiana (CDC, 2018a; CDC 2018b).X

Each community requires independent evaluation to identify the vulnerability of the area. Two of the contributing factors for this analysis are minority status and language limitations. The data may lack credibility due to the fear of reprisal for persons that fall into these categories. Exploring the social and physical characteristics, excluding these metrics can provide insight on the overall impact on the SVI.

Question 1: What impact does the exclusion of the metrics that represent minorities and language limited individuals have on the predictability of the CDC’s SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 2: Does the CDC’s SVI have key characteristics that impact the preclude potential exclusion without limiting the overall predictability of the SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 1: What impact does the exclusion of the metrics that represent minorities and language limited individuals have on the predictability of the CDC’s SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Question 2: Does the CDC’s SVI have key characteristics that impact the preclude potential exclusion without limiting the overall predictability of the SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?

Please refer file attached for more detail, looking for a paper of 800 words.

Discussion 4

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Artificial intelligence

 Research Paper
This paper will follow the traditional format of a college level research paper. Double spaced, APA citations. 

A traditional 5 page research paper (2000 words) 

Research Paper topic: How does artificial intelligence affect unemployment.

Thesis statement : Within the next decade, artificial intelligence will replace human employees in the workplace.  

Must use 5 quality sources. 2 must be from academic journals. 

Report Exploring Public Key Certificates

Visit 5 other sites that you normally frequent using “http” to get there, but this time use the “https” prefix instead. Complete the table in the worksheet as you go. If HTTPS is not supported, then a certificate will not be available to investigate. An answer of “Depends” should be given if the site only supports HTTPS sometimes. For example, some websites support HTTPS only when you want to actually buy something, such as hitting the “check out” button. 

Discuss what performance management is and how it influences effective teams

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what performance management is and how it influences effective teams.
  2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Expand on the topic, by adding additional thoughtful information

· Answer a question posted by another student in detail

· Share an applicable personal experience

· Provide an outside source

· Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.