Discussion and research reports on cyber security with no plagiarism found

Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.

1) Code signing (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed

2) The Amnesic incognito Livesystem ( TAILS)  = (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

3) Garlic routing=  120 words  Need link reference as well

4)Rendezvous protocol =  (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)

5) The Onion router = 120 words  Need link reference as well

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

1) Best practices for beginning programmers  – ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

2) Python weaknesses = 70+ words Need link reference as well

3)Penetration testing methods = 70+ words) Need link reference as well

4)Vishing =  70+ words Need link reference as well 

5)SPIT ( Spam over IP Technology) ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

6) Evaluating your web browsers security settings =  70+ words Need link reference as well 

7) Code signing =  ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words) 

8)  The Amnesic incognito Livesystem ( TAILS)  = ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

9) Garlic routing = 70+ words Need link reference as well 

10) Rendezvous protocol ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)

11) The onion router(TOR)  = 70+ words Need link reference as well 

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY  and do not use AI to get the copy paste information lik Chatgpt

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 03/26/2023 11:59PAM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Cybersecurity

 How strong are your passwords? Various online tools can provide information on password strength, but not all feedback is the same. First, assign the numbers 1 through 3 to three of the passwords you are currently using, and write down the number (not the password) on a piece of paper. Then, enter those passwords into these three online password testing services:

Record next to each number the strength of that password as indicated by these three online tools. Then use each online password tester to modify the password by adding more random numbers or letters to increase its strength. How secure are your passwords? Would any of these tools encourage someone to create a stronger password? Which provided the best information?Then visit the website Passwords Requirements Shaming, which is a list of password requirements for different websites that are considered weak. Read through several of the submissions. Select three that you consider the most egregious. Why are they the worst? Next, indicate what you would suggest to make the requirement stronger, but a requirement that most users could meet. Write at least a one-page paper that includes your findings on both the password strength and password requirements. 
 

Deer Creek ski resort was for many years

  

Deer Creek ski resort was for many years a small, family-owned resort serving day skiers from nearby towns. Deer Creek was recently acquired by Mountain Associates, a major ski resort operator with destination resorts in several western states. The new owners have plans to upgrade the resort into a destination resort for vacationers staying for a week or more. As part of this plan, the new owners would like to make major improvements in the Lynx Lair Lodge, the resort’s on-the-hill fast-food restaurant. The menu at the Lodge is very limited—hamburgers, hot dogs, chili, tuna fish sandwiches, French fries, and packaged snacks. The previous owners of the resort had felt no urgency to upgrade the food service at the Lodge since there is little competition. If skiers want lunch on the mountain, the only alternatives are the Lynx Lair Lodge or a brown bag lunch brought from home.
As part of the deal when acquiring Deer Creek, Mountain Associates agreed to retain all of the current employees of the resort. The manager of the Lodge, while hardworking and enthusiastic, has very little experience in the restaurant business. The manager is responsible for selecting the menu, finding and training employees, and overseeing daily operations. The kitchen staff prepares food and washes dishes. The dining room staff takes orders, serves as cashiers, and cleans the dining room area.
Shortly after taking over Deer Creek, management of Mountain Associates held a day-long meeting with all of the employees of the Lynx Lair Lodge to discuss the future of the ski resort and management’s plans for the Lodge. At the end of this meeting, top management and Lodge employees created a balanced scorecard for the Lodge that would help guide operations for the coming ski season.
Almost everyone who participated in the meeting seemed to be enthusiastic about the scorecard and management’s plans for the Lodge.
The following performance measures were included on the balanced scorecard for the Lynx Lair Lodge:
• Customer satisfaction with service, as measured by customer surveys.
• Total Lynx Lair Lodge profit.
• Dining area cleanliness, as rated by a representative from Mountain Associates management.
• Average time to prepare an order.
• Customer satisfaction with menu choices, as measured by surveys.
• Average time to take an order.
• Percentage of kitchen staff completing institutional cooking course at the local community college.
• Sales.
• Percentage of dining room staff completing hospitality course at the local community college.
• Number of menu items.
Mountain Associates will pay for the costs of staff attending courses at the local community college.
 

Required:
1. Using the above performance measures, construct a balanced scorecard for the Lynx Lair Lodge. Use Exhibit 10–12 as a guide. Use arrows to show causal links and indicate with a + or – whether the performance measure should increase or decrease.
2. What hypotheses are built into the balanced scorecard for the Lynx Lair Lodge? Which of these hypotheses do you believe are most questionable? Why?
3. How will management know if one of the hypotheses underlying the balanced scorecard is false?

Apply: Risk Register

 

Wk 4 – Apply: Risk Register [due Day 7]         

          

Assignment Content

  1.     Tony and his project team identified some risks during the first month of the Recreation and Wellness Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Tony decided to be more proactive in managing risks and want to address positive risks as well as negative risks.

    Complete the following tasks:

    1. Create a risk register for the project. Identify 6 potential risks, including risks related to the problems described in the previous paragraph. Include negative and positive risks.
    2. Develop a 45- to 90-word response strategy for each risk. Enter the information in the risk register.
    3. Write a separate 175-word paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy.
    4. Submit your risk register with the response strategy and explanation.

      Note: A Risk Register template is available, but it is not required that you use it. 

Assignment

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Home work: Types of Memories

Question 1Application of Amdahl’s Law:Answer the following two questions and show your work:

  1. What is the overall speedup if you make 15% of a program 85 times faster?
  2. What is the overall speedup if you make 85% of a program 15 times faster 

Question 2Consider a dynamic RAM that must be given a refresh cycle 64 times per ms. Each refresh operation requires 150 ns; a memory cycle requires 250 ns. What percentage of the memory’s total operating time must be given to refreshes? Explain your answer and show your calculations.Question 3List and briefly define three newer nonvolatile solid-state memory technologies.Question 4What is the difference between DRAM and SRAM in terms of application? What is the difference between DRAM and SRAM in terms of characteristics such as speed, size, and cost?