Policy and legal_8

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Discussion And Reflections(Essary)- W8

Discussion 

How will VEEM impact payment systems and global commerce?

500 words

APA with proper citation

Introduction

Body

Conclusion

Due date – tomorrow Oct 12th, 2020. 

Reflection which is an essay with 5-page paper (APA style)

Submit a 5-page paper (APA style) and accompanying presentation with recorded audio (PowerPoint) that addresses how VEEM and Blockchain will transform global marketing.

Final Project is an essay assignment. 

Final Project is due by Tuesday before Oct 13th 2020 11:59 PM EST.

Reflection Two (R2) is an essay assignment. 

1- Introduction

2- All the body part with proper, I mean point wise

3- Conclusion 

4- References with proper citation. 

Read:

Watch:

Research paper Summary

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below point for a  total of 300 words 

1. Read four (4) academically reviewed articles on Cyber Security and Risk Management. 

2. Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste

3. Base on your article review and the assigned reading, discuss the relationship between cybersecurity and risk management.

4. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Assignment – 5

 

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team. Please note the pros and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

reflection paper-Cloud computing

Provide a reflection of at least 300 words that summarizes what you feel are the most important or interesting concepts you have learned so far in this cloud computing course. would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had

(syllabus till now: understanding cloud comp types, cloud services models, saas, paas, iaas.

Requirements: 

Provide a (1 page with in next 3 hours)

APA format.

you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.

  you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Homework Discussion

If your boss asked you to create a database that integrated logical design best practices, what are the three most important features you would integrate in your end solution? Remember to not only just state them, but explain why and show examples. Don’t repeat the same examples of others. That constitutes cheating. 

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Wroting parposal

Create a 1-2 page single-spaced Analysis of Research abstract published scholarly articles related to your mock dissertation topic/research question. 
Brevity and being concise are important as this analysis is intended to be a brief summation of the research.
Each abstract must therefore consist of the following in this order:
1. Bibliographic Citation – use the correctly formatted APA style citation for the work as the title of your abstract, displaying the full citation in bold font.
2. Author Qualifications – name and qualification of each author conducting the research
3. Research Concern – one paragraph summary of the reason for the overall research topic