Discussion post

Please respond to the below question.

Complete the Path-Goal Leadership Questionnaire (p. 134 or 154).  What style did you tend to rely on most?  Tell a story that shows how your behavior in one situation illustrated your most common leadership style.

You should post a follow-up response to at least one other classmate.

I don’t have a textbook. 

Question 1

Please answer the question and it has plagiarism check. 

Using the five-paragraph format, discuss what makes a good visualization. This paper should be single-spaced. It should have a meaningful title. It must include 3 quotes from the text and/or expert sites found in the library’s research databases. All quotations should be set off by quotation marks and should be cited properly in APA format.  

digital forensics

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Wk-5 Assignment_4

Assignment 1

Complete the assignment mentioned in the word document named, “Week 5 Assignment”. 

Requirement: 

· ****Separate word document for each assignment****

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Policy, Legal, Ethics, & Cmplc week

 

Week Four Discussion

Week Four DiscussionDiscuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. Do not use attachments as a submission. Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested. 

Wk7

 Assignment 1

Remote Access Method Evaluation

Learning Objectives and Outcomes

Ø Explore and assess different remote access solutions.

Assignment Requirements

Discuss which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. 

You need to make a choice between the two remote access solutions based on the following features:

Ø Identification, authentication, and authorization

Ø Cost, scalability, reliability, and interoperability

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Refer to the attached “Term Paper for ITS632(1)” for assignment. 

Requirements:

· ****Separate word document for each assignment****

· Minimum 6 pages. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Sources: 3-5 References

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $30 max. Please bid if you agree.

Final Project

 In this Project Final you are to update, refine and combine the past seven weeks of Labs to create the Information Security Plan into final document. Remember that you are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. You are creating the final Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook). 

CSF14

14 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Discussion 7 physical security

Question:  

Discuss the LOPA process from a residential perspective.

Fully address the question(s) in this discussion; provide a valid rationale or a citation for your choices.

Initial post should be at least 350 words in length.

** References 

***No plagiarism 

**APA7 Format