EH 13

 In 250-300 words.

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Emerging threats_3.2

Discussion:

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

At least two scholarly sources should be used in the initial discussion thread.

Note: Answer should be minimum of 300 words

2 Individual Questions

Question 1:

Do some basic research on security certifications.  See https://www.giac.org/.  Write a brief summary of certifications that are open.  Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options. Write 200-300 words

Question 2: both are in a separate document 

 Final Project Name: Efficient Disaster Recovery 

1.  A brief abstract describing your final project. (200words) 

2.  Final Project Research paper. 700-1000 word, double spaced, written in APA format, showing sources, and a bibliography

Example:

How to Write an Abstract (https://www.scribbr.com/apa-style/apa-abstract/)

How to write a research paper (https://owl.purdue.edu/owl/purdue_owl.html)

online discussion

 

There are many ways to misrepresent data through visualizations of data. There are a variety of websites that exist solely to put these types of graphics on display, to discredit otherwise somewhat credible sources. Leo (2019), an employee of The Economist, wrote an article about the mistakes found within the magazine she works for. Misrepresentations were the topic of Sosulski (2016) in her blog. This is discussed in the course textbook, as well (Kirk, 2016, p. 305).

After reading through these references use the data attached to this forum to create two visualizations in R depicting the same information. In one, create a subtle misrepresentation of the data. In the other remove the misrepresentation. Add static images of the two visualizations to your post. Provide your interpretations of each visualization along with the programming code you used to create the plots. Do not attach anything to the forum: insert images as shown and enter the programming code in your post.

When adding images to the discussion board, select the plus sign in the toolbar, then choose the image from your files.

 

This is the data to use for this post: Country_Data.csv

Before plotting, you must subset, group, or summarize this data into a much smaller set of points. Include your programming code for all programming work. It would be more likely that one would win a multi-million dollar lottery than plot the same information the same exact way. However, if you have, you will need to repost and make your post unique. The first post to provide the content does not need to change.

References

Kirk, A. (2016). Data visualisation: A handbook for data driven design. Sage.

Leo, S. (2019, May 27). Mistakes, we’ve drawn a few: Learning from our errors in data visualization. The Economist. https://medium.economist.com/mistakes-weve-drawn-a-few-8cdd8a42d368

Sosulski, K. (2016, January). Top 5 visualization errors [Blog]. http://www.kristensosulski.com/2016/01/top-5-data-visualization-errors/

Considerations for every forum:

Remember your initial post on the main topic must be posted by Wednesday 11:59 PM (EST). Your 2 following posts, discussing and interacting with peers’ posts must be completed by Sunday at 11:59 PM (EST). 

Your initial post should include your references, thoroughly present your ideas, and provide evidence to support those ideas.  A quality peer response post is more than stating, “I agree with you.” State why you agree with your classmate’s post. Use the purpose of the forum is to generate discussion. 

No credit will be earned for posts that are disrespectful or not on the topic of the forum.

An example post:

The factual and misrepresented plots in this post are under the context that the visualizations represent the strength of the economy in five Asian countries: Japan, Israel, and Singapore, South Korea, and Oman. The gross domestic product is the amount of product throughput. GDP per capita is the manner in which the health of the economy can be represented.

The visual is provided to access the following research question:

How does the health of the economy between five Asian countries: Japan, Israel, and Singapore, South Korea, and Oman, compare from 1952 to 2011?

gdpPerCapitaGDP

The plot titled with “GDP per Capita” is the true representation of economic health over the years of the presented countries. Japan consistently has seen the best economic health of the depicted countries. Singapore and South Korea both have large increases over the years, accelerating faster than the other countries in economic health. Oman saw significant growth in the years between 1960 and 1970, but the growth tapered off. All of the countries saw an increase in health over the provided time frame, per this dataset. Israel saw growth, but not as much as the other countries.

The plot titled without “per capita” is only GDP and does not actually represent economic health. Without acknowledging the number of persons the GDP represents, Japan is still the leading country over the time frame and within the scope of this dataset. Singapore’s metrics depict some of the larger issues of representing the GDP without considering the population. Instead of Singapore’s metrics depicting significant growth and having a level of health competitive with Japan in the true representation, Singapore has the fourth-smallest GDP. It indicates that Singapore’s economy is one of the least healthy amongst the five countries.

The programming used in R to subset, create, and save the plots:

# make two plots of the same information - one misrepresenting the data and one that does not
# use Country_Data.csv data
# plots based on the assumption the information is provided to represent the health of the countries' economy compared to other countries
# August 2020
# Dr. McClure



library(tidyverse)
library(funModeling)

library(ggthemes)

—————– Coding removed due to issues with students reposting the example post in prior courses —————–
You are required to post your code on the discussion, despite the removal in this example.

Your peers and I should be able to copy and paste your code into RStudio to render your graphics.

——————————————————————————————————————————————–

# save each plot with a transparent background in the archive image folder 
ggsave(filename = "PerCapita.png",
      plot = p1,
      bg = "transparent",
      path = "./code archive/_images")
ggsave(filename = "GDP.png", 
      plot = p2,
      bg = "transparent",

Practical Connection Paper

 

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Discussion: Computer Crimes

 After reading about the surge of internet computer crimes, discuss the following: How have computer crimes driven changes in information technology security? How does the Fourth Amendment apply to computer crimes? 

CLoud_Computing_Research_paper

 Heartland Payment Systems 

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 800 words and to label which section below written about.

Include:

I. Company Name- Heartland Payment Systems—type of company—brief history—Industry—Customers (consumer, business, or both)

II. Type of threat

III. What or (who) caused the threat

IV. How the threat was discovered

V. How the threat was resolved

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded. – THIS IS MY QUESTION TO WORK ON. PLEASE START WRITING ON THIS QUESTION.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Body

· Conclusion

· Reference page

· Minimum 3 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted