Include at least one quote from each of 3 different articles

 

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Discussion 6

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 7 (Jamsa, 2013).

Chapter 7 topics:

  • Define collaboration.
  • Define and describe cloud-based collaboration.
  • The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.
  • List the questions one should consider when evaluating a cloud-based collaborative solution.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions

Question 2vDiscussion subject Topic related to “Decision Mkg/Essent Bus Comm “

question 2. 

Discussion  subject Topic related to “Decision Mkg/Essent Bus Comm “

discussion is 400 – 500 words   related to audit report (audit report means opinion on whether a company’s financial statements comply with generally accepted accounting principles)

  

Main Question 

Write a brief assessment that addresses the following questions:

What story could you tell as part of your audit report?

Where could you come up with other ideas for a story that would make your audit report more effective?

(Your story ties emotion strongly and effectively to new information or a new understanding 

for your business partnering company or organization. )  

please watch  attached link video for an idea 

Creating a Resource List

Create a resource list to use to learn about the most current security attacks. Include people, user groups, networking resources too. Suggest ways to share information within your own IT department so that the helpdesk and other IT professionals become aware of issues and concerns quickly too.

Complete a three to four-page report with APA cited references to support your work. Please submit your work using this table as an example. You may add or remove additional columns as needed.  

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments. 

procedure doc

 

Write a procedure document for CSI that documents how to change a password in a platform of your choosing.

The document should be detailed enough, and yet understandable enough, for a reasonable, non-technical, non-IT person to follow the directions and successfully change the operating system password without the need to call for support in all but the most extreme cases.  (In the real world, there will always be the the ‘outlying’ cases that defy logic and defy documentation.)

Text should be as understandable as possible and as non-technical as practical.  Remember in a previous lecture that the standard reading level for a wide audience tends to be 8th or 9th grade.  Include a glossary where needed.

Visual aids should be included.  Screen captures or photographs are very helpful to the technically challenged.

For this assignment an Adobe PDF or Microsoft Word or Microsoft PowerPoint (or equivalent application) document will be acceptable.

Tips

This is usually an easy assignment because changing the password in most operating systems is very simple. You just need to describe the steps in getting there.

Most students tend to get caught up in the editing process.  Getting a prototype document put together, including screen captures, is usually pretty fast.  Editing can be a time black hole so be mindful of that.

Ask a non-technical person to read one of your drafts.  If they understand it, and can follow it, you have succeeded.