discussion

 

Microsoft adheres to a defense-in-depth principle to ensure protection of its cloud services, such as Microsoft Office 365. Built-in security features include threat protection to reduce malware infections, phishing attacks, distributed denial of service (DDoS) attacks, and other types of security threats.

Answer the following question(s):

  1. Would an organization need to apply security controls to allow safe use of those applications? Why or why not?

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.

requirement: 

4 paragraphs 

apa format

Assignment #012

1. Describe the importance of databases and database management systems in managing organizational data and information
2. provide the types and some examples of database management systems
3. address the advantages and disadvantages of using a DBMS.
1 page needed

Information System for Business

 

Chapter 2 – Study Questions 1-10, Exercise 2, Lab 2 (Information Systems for Business and Beyond) Submit the above homework in one document. 

5

Homework

Chapter 2 Paper: Discuss why the IT organizational structure is an important concept to understand.  Also, discuss the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be one page in length and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**  

Please find the below link for textbook reference: 

Chapter 2: Hardware

Access Control

Discuss the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

BI_Discussion_1

Discussion (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Response should be 250-300 words and with references

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

block chain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Assignment

 analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.