Wk 5 Discussion – Roll-out Schedule Resilience

 

A project implementation plan, or roll-out schedule, must identify the tasks to be done, the order they need to be done in, and who is responsible for doing each of them. However, in real life, schedules often fall behind what is planned.

Respond to the following in a minimum of 175 words:

  • Discuss some ways for building contingency and resilience into a roll-out schedule.

Open source technology cybersecurity (Critical Thinking )

  

Open source technology is a rapidly growing phenomenon. Many programmers and users are passionate about open source software and believe that all software programs (and source code) should be freely available. For this assignment, address the following items:

· Compare and contrast the practicality for all software to be distributed in this manner.

· Discuss the effects on commercial software and commercial developers if all software were to become open source.

· Include your opinions on whether or not innovation would be enhanced or restricted if there was no financial incentive to create software.

Requirements:

– Paper should be five to six pages in length, not including the title and reference pages.

– You must include a minimum of three peer-reviewed, scholarly sources. 

– Paper must follow 7th APA style guidelines.

– References must be from 2017 and above. 

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them 

Cybersecurity

                                   

Discussion -wk13 Performing Forensic Analysis and Techniques

There are a number of Digital forensics tools available.  Do some research on both software tools and  hardware tools.  Choose one of each to present in your Discussion essay.  Describe each tool and it’s capabilities and the advantages of having it in your Forensics Toolkit.  Considerations should include, functionality, ease of use, reliablity, reputation cost and other factors.
Notes: Your essay should be unique, do not duplicate your other classmates selection. (First come first served) If you must write on a tool that another classmate has chosen, be sure to approach your essay from a different angle.
These consideration very important in the course functionality, ease of use, reliability, reputation cost and other factors.

REFERENCES OR WORKS CITED SHOULD BE INCLUDED.

Week 6 BI

 

Complete the following assignment in one MS word document:

Chapter 6– discussion question #1-5 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

network security basics

SIEM Security Information and Events Management

Describe SIEM concept in general, research the available implementations, tools, Splunk is perhaps the best known, find more .

Ford Fulkerson Alg

Create the following

Presentation Outline

7 – 10 Slides 

o Introduction

o Problem Definition

o Applications of (Algorithm Assigned)

§ Real Life Use cases

o Solution Algorithms and Computational Complexity of the (Algorithm Assigned)

o Implementation of (Algorithm Assigned)

§ Diagrams

§ Examples

§ Example Output

o References

List the following briefly each question in 25 words

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Discussion Post

What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?