Access control discussion 14

Discuss the major components of information assurance.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Research Paper

 

This paper must directly address the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional and contain all of the following elements;

  • a title page.
  • an introduction of the content of the paper.
  • a brief review of the recent literature related to your selected law or regulation.
  • a brief analysis of the applications of that law or regulation.
  • a conclusion that summarizes the content of your paper and discusses future research opportunities related to your topic.
  • a reference page(s).

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

  • Your paper must include both a Title page and a Reference page.
  • Your paper should NOT include an abstract.
  • Your paper must include a minimum of 7 peer-reviewed resources (articles or papers)
    • Cited sources must directly support your paper (i.e. not incidental references)
  • Your paper must be at least 1000 words in length (but NOT longer than 1200 words; Scholarly writing should be efficient and precise. Be clear in the information that you are conveying and with the evidence used to support it. Here is a good resource to help with writing concisely:https://academicguides.waldenu.edu/writingcenter/scholarlyvoice/writingconcisely)
    • Title and reference pages are NOT included in calculating the paper length.

This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points.

 Note: This one IP is worth 200 points. Parts 1 and 2 together are worth 100 points. Part 3, which is “summative” is worth 100 points. Part 1: In a two-phase, total-order multicast system, messages are sent in the following sequence from node S to G1 and G2. G1 and G2 are the members of the group. 1. S sends m1 to G1 2. S sends m1 to G2 3. S sends m2 to G2 4. S sends m2 to G1 Use the basic implementation of the Lamport clock. The clock s at each node start at: S: 4, G1: 6, G2: 1 Show the exchange of messages and their acknowledgments in a clock diagram using the basic implementation of Lamport’s clock. In which order and at what times are m1 and m2 delivered? Part 2. Draw a state diagram of Maekawa’s voting algorithm on the slide “Maekawa’s algorithm” in the “Distributed mutual exclusion” slide set. Note that the state diagram is from the point of view of any one of the nodes, called “this” node below. The state diagram cannot show the states of other nodes. i) Start with the basic case where “this” node wants the lock, gets it, and then releases it, and no other node wants the lock at the same time. In this case, “this” node goes through all the states in this order: Released and not voted Wanted and not voted Wanted and voted Held and voted Released and voted (Back to) Released and not voted Events are: acquire for when “this” node wants the lock release for when “this” node gives up the lock. 8/7/20 3:01 PM 15 request_received, reply_received, and release_received when a message from any node arrives at “this” node. The state diagram is similar the one of Ricart and Agrawala’s state machine (in the Distributed Mutual Exclusion PowerPoint deck) but has more states. *** If you do part i) more or less correctly, you will earn most of the points. *** ii) The complete solution includes the situations where “this” node votes on requests from other nodes. The states are the same as above, but there are additional transitions and actions. Use the “Maekawa scenario” slide in the Distributed Mutual Exclusion slide set, or Fig. D-10 in the Study Guide. Warning: There is an incorrect solution for this problem on the Web. It has extra, incorrect states. Part 3 (100 points): Summarize the course in your own words in an essay of 5-6 pages or so. Feel free to reuse any relevant DB posts as well as Unit 3 IP, but please correct any errors found. Edit it all into one paper that reads nicely from top to bottom and is styled according to APA. Include at a minimum: • How threads and safe objects interact. This can be in general or based on Ada or Java. • Entity-life modeling: the idea of finding event-sequence models of the domain and map them onto thread architectures in the software. Deadlock prevention. • The use of logical clocks for communication and/or for distributed mutual exclusion.  

Complete a Physical Security Assessment (internal and external) of your place of work or living area. IRefer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

 

Topic: Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

Instructions: Please download the Assignment 2 Physical Security Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_2_Physical_Security_Assessment.docx and submit to the appropriate assignment folder. 
Also review any additional files attached for more information. 

HomeWork

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

rewrite my stor

base on my story (attached file below)

Rewrite your story for clarity/structure/grammar/etc. Also make sure you address any issues we discussed in the storytelling lecture.

Make the stories more fun to read. If there is anything about a story that is boring or confusing, rewrite it. This may include unnecessary or missing scenes, too many characters, tedious or confusing parts, etc. Additionally, point out any issues of clarity (all the material covered in the clarity lectures). Point out any grammar issues you notice too, but don’t focus on them.

Do not change the main idea of the story.

Tips:

The story is their story, not yours:

+ the story is definitely not about the interview process

+ the story probably doesn’t even involve you

Stories can take place over a lifetime, but cant be the same as describing the lifetime (think of history class)

Stories should let us understand the characters

+Give them a voice, don’t just describe what happened to them

Dont end the story with a moral lesson: it doesn’t feel like real things happing to real people.

Infer Stats in Decision-Making (DSRT-734)

 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is Cyber Security or any Security IT-related and peer-reviewed, academic research piece.   Four pages requried and the paper should cover the basic guidelines.  Must submit original work and plagiarism should be less than 20%.

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References