DISCUSS THE NOTION THAT FIRMS SHOULD STOP DOING BUSINESS WITH CUSTOMERS WHO CONSTANTLY GENERATE LOSSES VERSUS THE NOTION THAT THE CUSTOMER IS ALWAYS RIGHT
DISCUSS THE NOTION THAT FIRMS SHOULD STOP DOING BUSINESS WITH CUSTOMERS WHO CONSTANTLY GENERATE LOSSES VERSUS THE NOTION THAT THE CUSTOMER IS ALWAYS RIGHT
please follow instructions now amount of words just need full details . for question 2 i have posted the 3 chapters for this week
A. Short Report
Using industry reports, whitepapers, academic articles and other reliable sources, research the issue of network security threats faced by businesses in 2021-2022. Write a short report identifying and explaining the top ten network security threats. Also, justify why you chose those specific threats in your list of top ten. Include appropriate charts and diagrams.
Note:
1. Write minimum 750 words for this short report. Although there is no rigid maximum word limit, around 1000 words maximum will be appropriate.
2. Use appropriate headings and sub-headings in your report.
3. You should provide credible references according to the Faculty guidelines. Get referencing style guides and help with referencing from Charles Sturt’s Referencing webpage.
B. Hands-on Project
inSSIDer is a popular wireless network scanner. Download the free version of this application from https://www.metageek.com/downloads/inssider-win/ . Follow the instructions to use it as explained in MetaGeek’s website. Run the application to scan Wi-Fi network.
Now, write a report including the following information.
1. List every piece of information that the inSSIDer scanner normally produces [For example, the MAC (physical) address of the network, its SSID etc.]. Briefly explain what each one of them mean.
2. Now, state and explain the information that you obtained from your ‘run’ of the application. For every piece of information, include a screenshot from your ‘run’. What are your most important observations? Why do you consider them to be important?
3. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.
4. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail.
5. Finally, search the internet for five (5) other wireless network analysers. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business.
Note:
There is not rigid word limit for this report. However, around 1000 words will be appropriate.
Analyze the impact that business continuity planning has on risk management
500 words APA format wit references needed.
I need 2 pages summarize of the direct sequence spread spectrum
Topic 1: Copyright
This week you read about copyright and some of the laws governing digital rights management.
Discussion:
Copyright protection is available for original works of authorship that are fixed in a tangible form, whether published or unpublished. The categories of works that can be protected by copyright laws include paintings, literary works, live performances, photographs, movies, and software.
Response #1:
Make an argument for or against the following statement: “Copyright is the only way for musicians, artists, and filmmakers to protect their integrity. What’s important is not profit, but protecting creative content from unfair use. Copyright should remain an important part of our law”. Justify your response with support from the reading.
Topic 2: Customer Location Data
This week you read the article “Verizon, AT&T, T-Mobile, and Sprint Suspend Selling of Customer Location Data (web page). https://www.washingtonpost.com/news/the-switch/wp/2018/06/19/verizon-will-suspend-sales-of-customer-location-data-after-a-prison-phone-company-was-caught-misusing-it/?noredirect=on
Discussion:
Verizon, AT&T, and Sprint will no longer share its customers’ location information with several third-party companies who failed to handle the data appropriately.
Question #1:
Do you agree with phone companies sharing their customers’ information with third-party companies? Why or why not? Support your answer.
Topic 3: Filter Bubbles
This week read the article” Measuring the Filter Bubble: How Google is measuring what you click” (https://spreadprivacy.com/google-filter-bubble-study/) and watched “How Filter Bubbles Isolate You” (YouTube Video)…https://www.youtube.com/watch?v=pT-k1kDIRnw
Discussion:
If you and I performed a Google Internet search on a topic, we could get totally different results. How is this possible? In attempts to provide us with user-specific content based on the data they collect on us, web companies may also be restricting us from information and “narrowing our world view.”
Question #1:
What are your thoughts on filter bubbles? Have you ever encountered a Filter Bubble? Do you think companies like Facebook and Google have a civic responsibility in this area?
Minimum Topic Response: PLEASE RESPOND IN THREE OR MORE SENTENCES PER TOPIC.
NOTE 1: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered.
NOTE 2: Please do not attach a file to the conference–enter your reply into the text area provided.
NOTE 3: After you post your response, please review it to make sure it is formatted correctly and is easy to read.
Project Part 3: Risk Mitigation Plan
Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.
Estimated length: 4–6 pages
In this Assignment, you will use Python and create the numpy portion of the exercise with the information provided. The second half of the exercise is to run the Python Pandas code and record the findings from each step.
Your uncle who owns a security company requested your presence at his office to discuss about information technology. The intention of your uncle to purchase three desktop, two laptop computers and a printer. The security firm wants to establish a local area network (LAN) for the benefit of the company and its staff.
1 Explain the factors that should be considered for your uncle to purchase the computer.
2 Explain to your uncle the security measures that must be put in place to prevent virus.
3 Why your uncle wants to establish a LNA but not other type of network.
4 List down the LAN devices and network media needed for the creation of this LAN.