- For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), using your own words, by addressing the following:- What did the authors investigate, and in general how did they do so?
- Identify the hypothesis or question being tested
- Summarize the overall article.
- Identify the conclusions of the authors
- Indicate whether or not you think the data support their conclusions/hypothesis
- Consider alternative explanations for the results
- Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
- The relevance or importance of the study
- The appropriateness of the experimental design
- When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.
Your paper should meet the following requirements: - Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Cloud Computing
Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
team designing
Using the Internet, each member of your team should read at least 3 academically reviewed articles on team designing. Summarize the articles in 300 words or more. Provide appropriate references.
security architecture 14 .1
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
- When should the architect begin the analysis?
- What are the activities the architect must execute?
- What is the set of knowledge domains applied to the analysis?
- What are the tips and tricks that make security architecture risk assessment easier
penetration testing
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
- What is penetration testing
- Testing Stages
- Testing Methods
- Testing, web applications and firewalls
Topic Summary
Topic –
‘Research emerging enterprise network applications and describe 3 that you think are most interesting and briefly explain why you believe this. ‘
– The summary should be 300 words with a minimum of 3 references on the topic.
– There should be no plagiarism, attach a plagiarism report with 0% similarity index
CIS 373
This assignment consists of two parts.
Part One
Your client is interested in how you will structure the website. Before you begin to write the HTML for your pages, it’s a good practice to create a storyboard that outlines your ideas for colors, font sizes, placement of images, hyperlinks, and sections on each page. Your storyboard and file structure should outline your homepage, inside pages, navigational scheme, and where you plan to add your form. This is a high-level design that you will be adjusting and changing throughout the quarter. You do not need to write this in HTML! In fact, it will save you time if you develop your storyboard in Word, PowerPoint, or Visio first, so you can make adjustments based on feedback.
Here are some online resources to help you think through the process:
- Why Website Storyboarding Is Important.
- How to Use PowerPoint to Create a Website Storyboard.
- Example Storyboard [PDF].
Part Two
Based on your storyboard, you will begin to create your file structure for your site. It is never a good practice to keep all your files in the same folder.
For example, if you are developing a site that sells clothing for men, women, and children, you might have one folder for all the pages that house men’s clothing, another for women’s clothing, and so on.
You can create this portion in Word, indicating where each of your HTML pages will be located, as shown in Section 2.4: Links in Your Text.
Requirements
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
- Create a storyboard for a website.
Discussion
1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
2. What are the privacy issues with data mining? Do you think they are substantiated?
Discussion
There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?
new tech bus leaders
What role do you feel that VR/AR will play in the future for managing products within an enterprise supply chain system?
augmented reality (AR) and virtual reality (VR)