IT 501 week 4

APA FORMART word file minimum 400 words with proper references and corresponding references list 

  1. Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken.  But, is there such a thing as too much information?
  2. What are some of the major issues with geotagging?  What concerns you the most?

____________________________________________________________

Privacy

Answer each of these questions in a paragraph with five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found online with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer-provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as its privacy and data policies? 

10. How many public cameras are too many? 

Web browser forensics

 

You are going to write a 2-3 page research paper in APA format, with all supporting references and visuals on the following :

You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

https://technumero.com/most-popular-web-browsers/
https://www.toptenreviews.com/best-internet-browser-software

operational excellence 2

 Assignment:

This week we focus on the social and organizational issues that exist with better understanding why changes occurs.  This week discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text.

Instructions:

A) Post an answer to the Discussion Question (250- 300 word minimum) 

B) Respond to AT LEAST Two student’s answers and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations.  

C) Include at least one reference in your answer to the question. Your reference(s) should be APA compliant.

D) No Plagarism

Research paper review in detail

 

I need the following after reviewing the paper

Problem Statement – Issues discussed by the author

Approach & design – How the authors approach to the issue & what proposed ideas they mentioned

Strengths and Weakness – strengths & weakness of the proposed approach & design, and about the paper.  what are the key strengths of the authors proposed system and weakness of the system.

Evaluation(Performance) – How the authors evaluated the proposed system, what parameters they used to test the performance

Conclusion(In readers perspective)

Along with these, I need to have a detailed explanation of the paper section-wise:

sections are:

Abstract

Introduction

DNS: OPERATION AND PROBLEMS 

COOPERATIVE DOMAIN NAME SYS TEM 

EVALUATION 

Comparision with related work

Summary

Conclusion

network administration

There are several different firewall architectures available:
Main Border Firewall
Screened Firewall
Internal Firewall
Host Firewall
DMZ Firewall

In this discussion, you are to describe each of these and describe when they could/would be used. Additionally, how can these be layered and used together to provide better security? What could be a disadvantage to using any of these firewalls?