Need help with Ph.D. Questionnaire

 

1. Provide a brief introduction focusing on your education, career, and decision to apply to University of the Cumberland’s.

2. In relation to your doctoral program application, what area of recent research in the field would you want to study, and why?

3. How does your current vocation relate to your application to the doctoral program?

4. How will your experiences and personal skills help you to be successful in your program?

5. What long-term goals do you have for applying your learning from your doctoral program?
will provide the all information required. Will be please help me?
============================*****************====================================
Main Goal: To get admit in Ph.D. Program.

MYSELF: ZZYYXX

As I’m pursuing my Master’s in Information System Security, University of Cumberland’s Kentucky 2021 class, I’m requesting to change program application to Ph.D. IT (if I get admitted will choose Cybersecurity as Specialization). I have to get admit to Ph.D.

My Education:
(i). Currently pursuing Master’s in Information System Security, University of Cumberland’s Kentucky (2020 -2021 class)

Program: Executive Masters of science in Information System Security

(ii)Master’s in computers & Information Science, Southern Arkansas University, Arkansas, 2015 – 2016Bachelor’s in

(iii)Computer Science & Engineering, Jawaharlal Nehru Technological University Hyderabad India 2007 – 2011.

PROFESSION experience:

I have been working in the field of Information Technology for the past 7 years.

Currently working as a Splunk Developer/Admin/Architect as well as a SIEM Engineer.

OR_Discussion_2

 

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

 At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.  

cloud_computing_week8

 Discussion Topic: Define the advantages and disadvantages of securing cloud-based solutions. 

Paper:

Write a paper on securing the cloud. The following are the items to discuss in the paper:

  • Define and discuss the data wiping process.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss hyperjacking attacks.
  • Define and discuss guest-hopping attacks.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Information Technology 1700

 

1 .Do you think there are security issues with hardware too, or software-based security (anti-malware, monitoring, etc.) is enough?

2. Have you have instanced where your USB flash drive works well with some systems but does not work with other systems (Windows, Linux, car MP3 player, IoT devices. etc)?

3. Another frequent situation is that you cannot copy a big file (say 6GB) onto some disks even though you have plenty of free space on the disk. 

If you never had such experience, many of us have. If you have, please, describe it. What may cause such situations? What could be a way to resolve each of those situations? What may be a tradeoff that comes with your solution?

Aspect Oriented programming project

 

I need assistance on this Aspect Oriented Programming project. The first requirement for this project is that the programming must use AspectJ on Eclipse java IDE.

The project details description in attached.

This program must run please.

You only need to turn in the actual software by exporting the project from Eclipse. You do not need to turn in any type of design document.

To export a project in Eclipse, follow these steps.

1. Right click on the project and select Export

2. In the General folder select Archive File

3. Click the Browse button

4. Give is a file name with a .zip extension

5. Click the Save button

6. Click the Use Zip button

7. Click the Finish button

Please, this program must run on Eclipse Java IDE.

Application and Identity Design Considerations

 1 page

  • This week we covered the Application and Identity Design Considerations.  Identify and define at least two types of Application Design Considerations and explain in detail how they are carried out.  Identify and define Device and User Identity concepts.  Identify the associated benefits and weaknesses with the application of each approach.  Feel free to research the internet and other resources to support your comments and cite references in APA format.

need help in homework

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.