Term Paper

Finish the term paper using the following outline. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote. 

Title: Penalties and adjudication for various information and technology offenses.

Thesis: Penalties and adjudication for various information and technology offenses are not playing the crucial role of securing the abolition of breaching the law, which has been set, to safely guide the key players in the platform. The law is not even ensuring that those people who temple with the originality of a given person work.

i. Introduction 

a. Thesis 

b. The role of the thesis. 

ii. Expounding on the law and some of the changes needs to make it better.

a. Background of the law

b. Some of the recommendation that has been pointed out concerning the law by different stakeholders.

c. The effects of the law on today’s information and technology industry.

iii. The main objectives of the law.

a. The success and the future of IT in the country

b. The goals of addressing the topic 

c. The significance of the law and the setbacks  

d. The significance of implement the law to the grass root.

iv. The benefit of law to the industry 

a. The key traits of  for success  

b. The goal of the law 

c. Efforts to introduce new laws and ensuring they have been followed.

i. Significance of changing some articles  in the law

ii. Incorporating of organs to ensure that the effectiveness of the law

d. Making sure that the law meets the national and international standards 

v. Recommendation from the writer’s view.

a. Some of the things that can make a difference in the information and technology sector.

vi. Conclusion 

a. Summarizing the arguments and efforts made 

Reference

Bottoms, A. (2001). Compliance and community penalties. Community penalties: Change and challenges, 87-116.

Roth, M. P. (2010). Crime and punishment: A history of the criminal justice system. Nelson Education.

Research paper – Data visualization using R

  

•Project: Research Paper

–Topic based on dataset assigned

–Describe the dataset fields

–Summary of the data in the dataset

–Research content (at least 1000 words and 6 references – 3 must be scholarly peer-reviewed articles)

–Create visualizations using R Language as applicable, discuss findings

•Project: PowerPoint Presentation

–Summarize research (not copied) and data visualizations

  

–**Must be APA formatted** **College Level Writing****No grammar issues and no spelling issues**

•Title Page – Include Group number and names of all contributors from the group

•No abstract is to be included

•Document body with citations (rewrite all information used from sources)

•Reference Page

Wk 2 – Apply: Configuring and Deploying a Private Cloud with System Center 2012

 

he director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Submit your assignment.

HTML Programming

 

HTML programming

Create a Design Document, outlining a website with at least 5 pages demonstrating the content from this course, relating to an interest or hobby the student has. 

Include:

· Brief Description of the following pages, including a layout mockup and a color palette 

o 1 text/terms 

o 1 images 

o 1 multimedia page 

o 1 links page 

o 1 user designed 

Emerging threats – Discussion

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

bsp w6

In 250 words
 

Do a bit of research on JSON and AJAX.

How do they relate to the Same-Origin policy?

Assignment

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the composition choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) project composition, and 2) chart composition
  2. How suitable are the choices and deployment of these composition properties? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential composition approaches, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-10

Assignment Requirements: At least 500 words in length

References: At least two peer-reviewed, scholarly journal references.

Information Assurance.

I have two assignments, need 1000 – 1200 words for each assignment, at least three references in “APA” format for each assignment. Summary and conclusion should be must in the paper. 

Topics:

Topic 1: Information Assurance – Securing Information Systems (Access Controls)

Topic 2: Information Assurance – Auditing, Testing, and Monitoring

Attached power point presentations for the above specified topics for reference. 

Note: Don’t copy paste matter from the PPT’s.

Data Visualization Project

Read the project research below. Discuss possible project/research ideas identifying the different angles.

Prerequisite:

The case study in chapter 4. The case study introduces the process of completing a data visualization project. 

Project:

You’re responsible for creating a Data Visualization project plan and implementation. You have to plan the process and the implementation of the project. You should identify a data visualization problem and a corresponding data set. You’re responsible for building a project plan for a company. The project should include a graph/chart of the final product. You should provide a detailed project plan and a PowerPoint presentation.

Further details are in attached “Research.docx”