Week 6 Experience Portfolio

 

Hello,

i need this paper by 12/10 4pm.

Strictly No plagiarism please use your own words.

Length: Minimum of 600 words Create a portfolio related to work experience Network security and proxy related in IT. Submit a file that outlines any projects you have worked on as a student or professional that may influence a hiring manager or company to hire you.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

Discuss Howell and Mendez’s three perspectives on followership. Note how these behaviors influence work productivity.

 

Week 15 Discussion

After completing the reading this week, we reflect on a few key concepts this week:

Discuss Howell and Mendez’s three perspectives on follower-ship. Note how these behaviors influence work productivity.

What is the big five personality model?

What is the Myers-Briggs test? How is it similar to the Big five model? How is it different than the Big five model?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Expand on the topic, by adding additional thoughtful information

Answer a question posted by another student in detail

Share an applicable personal experience

Provide an outside source

Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.

Network Assignment

 

Assignment Details

Part 1

For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.

Complete the following in a minimum 1-page response:

  1. Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
  2. Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
  3. Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?

Part 2

As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.

Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.

  1. Identify the opposing perspective you have chosen.
  2. Explain the ethical implications that are inherent with both sides of the issue.
  3. Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
  4. Provide your perspective on how you might apply the issue in a work situation.

web programming related

 

Now is the time to make your project look good and as professional as possible.

By now you should have created your MySQL database and PHP scripts that can be used to query, insert, and delete data.  The objective of Phase 3 is to make it look nice. For example, you can use HTML in your PHP scripts to put the queried data into a table.  You might also choose to create a style sheet to control colors, fonts, etc.

You must have a home page which links to other pages you have created to manipulate your database.  Be sure that all pages have a button to link back to the home page and possibly buttons to link to other pages as necessary.  If you only create one page and display everything on that page you will have not met the minimum requirement for this class.  I will be looking to see if you put some real work into this final project.

When you have finished with your project, create a text file in which to turn in a hyperlink to your home page and if you wish hyperlinks to your PHP scripts.  Include your name in this file and any other comments you choose to include about your project.  Upload the file to the appropriate submission box.

Digital Forensics

1/2.  

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.
Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

2/2.

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case? 

MIN 300 WORDS FOR EACH QUESTION (1&2). PLEASE MAKE SURE NO PLAGIARISM.

risk assessment on Acme Enterprise

You are going to conduct a risk assessment on Acme Enterprise using the risk assessment

concepts we have learned about thus far. Each of the areas of the infrastructure mentioned

above is where you will concentrate your assessments. After you have completed your risk

assessment, you will then provide recommendations for each area that you assessed to

reduce risk, exposure, and threat. Also, as part of your final submission demonstrate

through a redesign where your mitigations will take place within the architecture. You can

use the image below as guide for your risk analysis of each area.

Strategic Integration and Information technology roles and responsibility

Essay Assignment 1: Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Essay Assignment 2: Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above assignment should be two pages in length (one page for each question) and adhere to APA formatting standards.

5s week 5 assignment BS

In 300 words

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case, and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old PASSWORD before creating a new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Include references.

Investment Firm cybercrime risk assesment

 

  • As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Risk Assessment.  The overall cybercrime risk assessment can be outlined with a minimum of two to three sentence descriptions of what the outline will cover under each section.
  • Ensure that you provide information for three specific risks for each section. For example, three High, three Medium, and three Low.
  • You will want to take into consideration that HU Financial Firm is a legal firm. 
  • Items to think about would be the possibility of a natural disaster occurring or a cybercrime attack. 
  • You will want to rank the possibility of an incident happening from high to low as identified in the sample template in this section, which has been provided for you.
  • Additional information can be reviewed under the course reference links and research on the internet.