Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Assignment

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

CC W 15 D

 Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

Heap insertion time Data Structures and Algorithams project

 When looking for data structure projects, you want to encounter distinct problems being solved with creative approaches. One such unique research question concerns the average case insertion time for binary heap data structures. According to some online sources, it is constant time, while others imply that it is log(n) time. But Bollobas and Simon give a numerically-backed answer in their paper entitled, “Repeated random insertion into a priority queue.” First, they assume a scenario where you want to insert n elements into an empty heap. There can be ‘n!’ possible orders for the same. Then, they adopt the average cost approach to prove that the insertion time is bound by a constant of 1.7645. 5. Optimal treaps with priority-chang

Urgant(ASAP)

5-7 page paper on a conflict that he or she experienced in an organizational setting. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point 

main paper

 

Define “Anything-as-a-Service (AaaS) and discuss in detail at least one example AaaS category or implementation. For examples see  https://timesofcloud.com/cloud-tutorial/xaas/.

Apply APA Edition 6 formatting. You do not need an abstract or Table of Contents but include an introduction and summary.

Use at least three properly documented references (do NOT use wikis). Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar. Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

Your paper should be at least 500 words in length.

There is a Word template in week 1 with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)