Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.
Write a short paper, 200-300 words
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.
Write a short paper, 200-300 words
Description
This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.
Instructions
After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.
The selected question to write
3B: Threats to Validity
In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.
You work as an administrative assistant for the President of Bass University which employs around 300 faculty and staff.Your immediate supervisor, the President, has just informed you …
Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.
For this task, take a close look at the data representation choices:
Assignment Link: http://book.visualisingdata.com/chapter/chapter-6
Assignment Requirements: At least 500 words in length
References: At least three peer-reviewed, scholarly journal references.
Three references with 450 words
1. Calculate the timing of password-guessing attacks:
(a) If passwords are three uppercase alphabetic characters long, how much time would it take to determine a particular password, assuming that testing an individual password requires 5 seconds? How much time if testing requires 0.001 seconds?
(b) Argue for a particular amount of time as the starting point for “secure.” That is, suppose an attacker plans to use a brute-force attack to determine a password. For what value of x (the total amount of time to try as many passwords as necessary) would the attacker find this attack prohibitively long?
(c) If the cutoff between “insecure” and “secure” were x amount of time, how long would a secure password have to be? State and justify your assumptions regarding the character set from which the password is selected and the amount of time required to test a single password.
2. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access.
• per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access)
• per-object access control list (that is, one list for each object tells all the subjects who have access to that object)
• access control matrix
• capability
3. Design a protocol by which two mutually suspicious parties can authenticate each other. Your protocol should be usable the first time these parties try to authenticate each other.
4. List three reasons people might be reluctant to use biometrics for authentication. Can you think of ways to counter those objections?
5. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.
6. Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.
7. Suggest a source of some very long unpredictable numbers. Your source must be something that both the sender and receiver can readily access but that is not obvious to outsiders and not transmitted directly from sender to receiver.
8. Humans are said to be the weakest link in any security system. Give an example for each of the following:
(a) a situation in which human failure could lead to a compromise of encrypted data
(b) a situation in which human failure could lead to a compromise of identification and authentication
(c) a situation in which human failure could lead to a compromise of access control.
9. Explain why hash collisions occur. That is, why must there always be two different plaintexts that have the same hash value?
10. What property of a hash function means that collisions are not a security problem? That is, why can an attacker not capitalize on collisions and change the underlying plaintext to another form whose value collides with the hash value of the original plaintext?
EXAM REQUIREMENTS
• Submit your answers as a single Word or PDF file, called “ISM 6316 Mid Term –
• Follow APA Style (double-spaced, 12-point font, 1-inch margins).
• This is an individual assignment. It is not a collaborative effort, not a team effort. You are not
allowed to discuss this exam with anyone, classmates or others. If you have any questions or
doubts, contact me by email.
• Submit your answers by the deadline. Each 24 hour period that you miss the deadline, it costs
10 points.
Question 1. (40 points; max 2 pages)
Transitioning an organization from running development projects with the Waterfall approach to
Agile/SCRUM is not an easy undertaking. Reflect on what you think are the biggest challenges that
have to be overcome and how you would approach this transition.
a. Describe four different challenges that organizations face when they want to transition to
SCRUM. For each challenge explain what the challenge is and why this is a critical challenge in
your opinion.
b. Describe for each challenge that you identified above what strategies you would use to
overcome the challenge.
Question 2. (30 points; max 2 pages)
SCRUM was originally intended as a project management approach for software development
projects. However, one may argue that SCRUM can be used as a generic project management
approach that can be applied in the context of any type of project, covering different focus areas
in a company (e.g. marketing, finance, or HR). Reflect on this position. To what extent do you
agree that SCRUM can be used as a generic project management approach? To what extent do you
disagree? Where lay the limits of the applicability of SCRUM to the management of complex
projects?
Question 3. (30 points; max 3 pages)
Visit: https://michaelochurch.wordpress.com/2015/06/06/why-agile-and-especially-scrum-are-terrible/
(A pdf of the blog will be available on CANVAS as well).
As you can tell, not everyone is convinced about the value of SCRUM. Critically reflect on the
opinions presented in the blog. (Please note that you do not have to read/consider the hundreds of
responses to this blog).
a. To what extent do you agree with the author’s point of view? On what issues do you disagree?
b. Based on your experience/understanding of SCRUM, what kinds of adjustments to SCRUM and its
practices or what other initiatives would you explore to address some of the issues that the
author raises?
Title: Wireless Network Design
Paper type Other (Not listed)
Paper format APA
Course level Undergraduate
Subject Area Other (Not listed)
# pages 2 ( or 600 words Minimum)
Spacing Double Spacing
# sources 4
Paper Details
Preparation
Before you begin this assessment, please complete the practice labs as they will be helpful to you.
Then use the Internet and the Capella library to research the assessment topic. You will need at least three recent, relevant, and professional resources to support your work.
Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Assessment 1 Resources for more information.
Instructions
For this assessment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs). The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network.
Start with the network diagram you created in the Assessment 2. You may want to make some changes depending on the feedback you received from your instructor. Using this diagram, complete the following:
•Add a wireless infrastructure to your network diagram. ◦Include your IP addresses. Calculate and add your IP ranges and subnets into your diagram.
•Explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions.
•Explain your IP addressing strategy.
•Describe at least three wireless standards that influenced your network structure.
The assessment you submit should be approximately 3–4 pages in length, including the diagram you create. Be sure your document is professionally written, free of errors, and that your citations and references follow APA guidelines.
Additional Requirements
•Include a title page and references page.
•At least three recent, relevant, and professional resources.
•Times New Roman, 12-point font, double spaced.
Describe the overall process of developing new software. Please also note the differences between software development and methods.
1 page in APA format with atleast two references
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses:
· Financial (Bank, brokerage, Insurer, etc.)
· Hospital/Medical Services
· Pharmaceutical/Chemical
· Social Media Company
· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.)
· Manufacturer (Automobile, Computer, Consumer Electronics, etc.)
Respond to the following:
· Identify the business type you have selected for your paper.
· Provide a brief overview of the business
· Provide the goals and approach to the project
· Architectural diagrams and annotations
Submission
Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer.
Check your work and correct any spelling or grammatical errors.
Include at least two APA most recent references.