7

Spoofing email is a common occurrence these days.  Have you received a spoofed email?  Briefly, describe the email and how did you notice it was not legit?  Anything else that was odd concerning the spoofed email? 

Cloud computing

Define and describe business continuity.
Define and describe disaster recovery.
Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both

2-3 pages at least and no plagiarism.

Virtual Communication

Respond to both prompts:

In recent days, most communication (business interactions, coursework, spiritual communities. etc.) has become computer-mediated  How has this changed your daily life? How might relationships be affected over time? How might our culture change? Advantages? Disadvantages?

View “5 Tips for Delivering Zoom Presentations Like a Pro” How can you apply these suggestions to your presentations in class and at work?

HomeWork Paper

Discuss how information is classified and how it can be used in a competitive situation.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the attached APA template to get started.

SyncSession Assignment

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • Why and how are employers increasingly using workplace monitoring?
  • What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise?

Cloud Computing Reflection

 

Write an essay of atleast 500 words on what you would like to learn for future study in this course.

Write in essay format, not outline or bulleted.

Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.

cc-13

 Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework. 

Discussion

Please search the internet for an answer to the following question.

  • Why did Cisco Systems transition from standalone access control systems to IP networked systems?
  • What challenges did Cisco face in order to solve the physical security problems?