ITS-834: Emerging Threats & Countermeasures. Discussion, Research Paper

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

Satapathy and L. M. J. Livingston. (2016). “A Comprehensive Survey of Security Issues and Defense Framework for VoIP Cloud,” in Indian Journal of Science and Technology, 9(6).  https://doi.org/10.17485/ijst/2016/v9i6/81980

D. B. Rawat, 2019. “Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization,” in IEEE Communications Magazine, vol. 57, no. 10, 50-55.  https://ieeexplore.ieee.org/document/8875714

J. Tioh, D. M. Mina and D. D. W. Jacobson, “Cyber Security Social Engineers an Extensible Teaching Tool for Social Engineering Education and Awareness,” 2019 IEEE Frontiers in Education Conference (FIE), Covington, KY, USA, 2019, pp. 1-5.  https://ieeexplore.ieee.org/document/9028369

T. Surasak and S. C. -. Huang, “Enhancing VoIP Security and Efficiency using VPN,” 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 2019, pp. 180-184.  https://ieeexplore.ieee.org/document/8685553

Chapters 11, 12, 13, and 14 in the course textbook

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Wireless Networking

Word count: 300+ words

Chapters 11, 12, 13, and 14 in the course textbook 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also, discuss methods used to secure 802.11 wireless networking in your initial thread.

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

Considering the importance of data in the organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 2 individual assignments (a discussion and a research paper). Please provide answers in separate documents. 

Java Programming Assignment

I need help with this homework. For this assignment, you can make any project in Java but it must take advantages of the special facilities and concepts provided by Java. It should have good object-oriented style in your program. The software you must use to input the code has to be in eclipse. 

Create a set of UML and Data Flow diagrams.

Create a set of UML and Data Flow diagrams.
This is a required assignment, worth 170 points, and must be submitted by the due date.  Late assignments will not be accepted.
Details on the Project: Systems Diagrams Specifications v2.pdf
When references and citations are included, you must apply and use the basic citation styles of APA. Do not claim credit for the words, ideas, and concepts of others. 
Use in-text citation and list the reference on your supporting source following APA’s style and formatting. 
Do not copy and past information or concepts from the Internet and claim it as your work. It will be considered Plagiarism and you will receive zero for your work.
Submit your solution here.

HW

 

Discuss and describe some skills and competencies that you think are important to managers working in today’s world, characterized by generational differences, today’s workplace culture, technology, and sudden changes or threats from the environment. Describe some skills and competencies that you think are important to managers working in these conditions. 

 Using Scholarly and Peer-Reviewed Articles, and/or other professional resources, cite at least 2 scholarly/professional sources. Your answer should be a minimum of 250 words .

1 page

You can use location-based tools to help you find your car or the closest gas station. However, some people see location-based tools as an invasion of privacy. Discuss two pros and two cons of location-based tools.

Vulnerability Scanning of a Linux Target

 

  • Summary of the lab
  • Analysis of the activities performed in the lab and their importance to the course topics
  • How the lab relates to the course and current module topics
  • Related concepts from the module readings and lectures
  • At least one external reference
  • 1-3 pages in length
  • Proper APA formatting and citations
  • Minimum of 1-3 references are required
  • Screens shots are encouraged but should be included as an appendix and not part of the total page count.

a

This is a coding assignment.

need some help in my assignment. I have a XML request and need to convert it into an SQL query which will generate the same XML.

Assignment

Select any example visualization or infographic and imagine the contextual factors have changed:

  1. If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
  2. If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
  3. What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
  4. What other data considerations should be considered and why?  
  5. Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.

Be sure to show the graphic (before and after updates) and then answer the questions fully above.  This assignment should take into consideration all the course concepts in the book.  Be very thorough in your response.  The paper should be at least three pages in length and contain at least two-peer reviewed sources.