Week 5 Assignment

 

Please select a topic from the below list and create a one-page essay answering the question noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

1. List and briefly describe the process you would take to conduct test the security of a firewall?

2. How does the management of network security affect its implementation? What components are needed to ensure proper network security management of an environment?

3. Name two VPN deployment model and architecture? What is the best model/architecture for an on-perm environment, cloud environment, and hybrid environment (on-perm/cloud)?

** Do NOT write an introduction, rather just answer the question noted above **

Note: The essay should be one-page at most (double spaced) and should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

Assignment 1 cryptography

  Question: Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at the reasons why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

 –The writing assignment requires a minimum of two written pages to evaluate history.

  -You must use a minimum of three scholarly articles to complete the assignment.

– The assignment must be properly APA formatted with a separate title and reference page. 

 – No Plagiarism 

BI Week 15 Assignment

Complete the following assignment in one MS word document:

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted eferences (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion 1. Compare the IoT with regular Internet.

Discussion 2. Discuss the potential impact of autonomous vehicles on our lives.

Discussion 3. Why must a truly smart home have a bot?

Discussion 4. Why is the IoT considered a disruptive technology?

Exercise 3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

Exercise 4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

Exercise 6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

Writing Assignment 2

  

Discuss the difference between VBA and VB.Net. What are the differences and use scenarios for each?

· Prepare a quality, substantive journal post that addresses the objectives of the 

assignment and the expectations set forth in the grading rubric. 

· 300 words minimum is required. 

Use APA format  

Malicious Activities 2.0

The three major types of malicious activities that organizations’ information systems face include:

  1. Hostile or malicious insider activity.
  2. Theft of private, proprietary, or sensitive data, by insiders or external attackers.
  3. Large scale DoS (denial-of-service) attacks.

Based on your research:

  • Describe a present-day example of your selected type of malicious activity and its impact on the organization.
  • Specify the countermeasures the organization took to address the malicious activity.

mad discussion

 From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

FTK imager lite & Autopsy

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

· No Plagiarism 

· APA Format required

· Each Answer Should be 350 words without References.

!!! NEED 2 ANSWERS FOR ABOVE QUESTIONS WITH 0% PLAGIARISM!!!!

!!! One Answer using FTK IMAGER LITE Tool !!! 

!!! Second Answer using Autopsy Tool !!! 

End search 2

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

2000 words