wanted someone to complete the discussion along with two separate replies for the discussion

Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected.

Discuss the weaknesses in these systems and how to improve them.

Discussion Question requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional during the week (Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

QUANTITATIVE Journal Article

Need a Quantitative Journal, The topic is up to you as long as you choose a peer-reviewed, academic research piece. 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Web Development Adobe Dreamweaver, Creative Cloud, and XD one page paragraph.

 You should be REPORTING EVIDENCE and EXAMPLES from what you read. 

Find, Read, and Share – THREE related sources of information

Report – Three things about the topic that you want to remember forever

  1. Identify the topic for this week. The title of this discussion board thread lists topics as well as you should reflect on what was covered during class.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Forensics

1.Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable. (300 words) 

Chapter 7 ppt 

2. Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. (300 words)

Chapter 8 ppt

discussion

 

federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

data structure and algorithm

You are requested to implement a simple IoT device management system. IoT devices

can be categorized into three main groups: consumer, enterprise, and industrial.

“Consumer connected devices include smart TVs, smart speakers, toys, wearables and

smart appliances. Smart meters, commercial security systems and smart city technologies

— such as those used to monitor traffic and weather conditions — are examples of industrial

and enterprise IoT devices. Other technologies, including smart air conditioning, smart

thermostats, smart lighting and smart security, span home, enterprise and industrial

uses.”1 An IoT device can be identified by many fields including category, Identifier, …

1- (2.5 mark) Describe the IoT data type, IoTdevice, using Java classes. Make sure

to use Java inheritance, an interface, and an abstract class.

2- (5 marks: 1mark/method) We want to implement a simple application that

manages the IoT devices. You are asked to develop a Java application that uses

an array to store all information regarding the IoT devices installed in a building and

using the newly created data type IoTdevice defined in 1). You should provide a

menu with the following options:

———————————————————————-

IoT Device Management System (CSC301, Fall2020)

———————————————————————-

1- Add a new IoT device

2- Delete all existing IoT devices given a category

3- List all existing IoT devices from one category

4- Check if an IoT devices exists based on its ID

5- Sort all IoT devices based on two criteria of your choice

0- Quit

———————————————————————-

Your choice? __

———————————————————————-

Please use the partial Java code provided with this assignment which prints the

menu. You MUST do this lab in groups of maximum two students. This Lab

counts for 7.5 marks. You should upload your work via the course website on time

before September 29th, 23:59. Any late submission will be penalized (-0.25 / day).

Evaluation: You will be evaluated based on a demo during which you will be asked

individually various questions.

EH week13 p13

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Please reference and follow the attachments and needed 2 pages words. Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

Discussion: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the attached text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.