IT348 week 1

350 words 

1. Research and explain, compare and contrast between an RFID tag and a GPS tag.  [Write it in your own words.]
2. Give two examples of each. 
3. Think about a practical application using one instead of the other.

List the Following Briefly in Six sentences each

  • 6.2 What protocols comprise TLS?
  • 6.3 What is the difference between a TLS connection and a TLS session?
  • 6.4 List and briefly define the parameters that define a TLS session state.
  • 6.5 List and briefly define the parameters that define a TLS session connection.
  • 6.6 What services are provided by the TLS Record Protocol?
  • 6.7 What steps are involved in the TLS Record Protocol transmission?
  • 6.8 What is the purpose of HTTPS?
  • 6.9 For what applications is SSH useful?
  • 6.10 List and briefly define the SSH protocols.

SECURE CLOUD ARCHITECTURE

Title: Cloud-Based Web application 

You are part of a startup company. A startup company is a newly formed business with particular momentum behind it based on perceived demand for Web Based Software applications in one of the given fields below. The intention of your startup is to grow rapidly as a result of offering something that addresses a particular market gap in one of the following areas.  Your team was tasked to Develop a new Cloud-Based Web application for Desktop and Mobile for one of the topics below.

  • A new Food delivery app
  • A new Dating App
  • A new Real Estate sales app
  • A new Healthcare application

Select just ONE  of  topic and then explain what this new application would do.

As a startup company, your team has limited resources ( less money and very small  IT infrastructure ) .  

Once you have done that, answer the following questions.

Question 1 What cloud service model you would  use for this app when you are  developing the software ?

Question 2  What cloud service model you would  use  so  the customer can access to the software and use it?

Question 3 What cloud deployment  model  you would use to keep data  and all transactions?

Case Study – Usability Business

1. Include abstract. 

2. The assignment requires a 4-6 page review excluding ref and abstract.

3. Summarize the case study

4. Identify the study method used and why it was appropriate

5. Explore some of the qualitative or quantitative methods gathered 

6. How would you conduct the study any differently?

7. Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future?

4/4 Assignment

  1. Paper on Mitigation Strategy

  1. Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4.
  2. As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).
  3. Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.
    1. Include a short executive summary for this assignment, which you will revise later for use in the final paper.
    2. The mitigation strategy should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
    3. You may use tables or other graphic representations; however, these additions to the paper should not be included in the page count.
    4. The paper should include references to any material used in preparing the paper. You should use online resources to develop your plans; just make sure to cite these sources.

Concept paper

 Submit a 3 page concept paper IAW APA format on   

Identity Theft. Paper organization will include (use as headings):
 

  • Coversheet
  • Introduction.
  • Problem Statement.
  • Relevance and Significance.
  • References (at least five).

4 Discussions and 2 Case Study

Discussion 5.1

Why is are intellectual property laws so important?  Do you think  they are important or should be do away with these laws?  

Discussion 5.2

What are patents and how are they used?  Are all patents the same? What is the difference between a trademark and a copyright?  

Discussion 6.1

What are shrinkwrap, clickwrap, and browsewrap agreements?  Why are they used and can you provide examples of each?  

Discussion 6.2

Why would you include an information security provision in a contract? 

Discussion 7.1

List and explain several types of policies that can be used to govern information security.  

Discussion 7.2

Briefly describe the risk assessment process?  What are the steps to handling risks?  Feel free to provide your own example of how you have handled risk situations that you’ve had to deal with.  

Case Study 5.1

Write a 3 to 4 (not including title or reference page) page paper that describes some your state laws protecting data or security of personal information (the state you live in ,have lived in, or want to live in).  First, list the state you chose.  Then provide the name and a brief description of the law, to include when it was enacted, punishment if not followed, and who/what the law protects.  Make sure you follow the grading rubric and write your paper in APA format.  Cite all sources appropriately. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited

Case Study 6.1

Conduct research and write a 3 to 4 page paper giving examples of a tort law case and a criminal law case. Make sure you adhere to the grading rubric and write your paper in APA format.

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited 

Research the 802.11 Wireless Standards. Select and discuss 3 implementations of the Standard (802.11x). Which implementation of the 802.11 Wireless Standards is the best, and why? Discussion Board Assignment Guidelines Research the 802.11 Wireless Stand

 

Research the 802.11 Wireless Standards. Select and discuss 3 implementations of the Standard (802.11x). Which implementation of the 802.11 Wireless Standards is the best, and why?

Discussion Board Assignment Guidelines

  • Research the 802.11 Wireless Standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, and so on), and describe each of them in 1–2 paragraphs.
  • Considering all of the 802.11 implementations, answer the following questions:
    • Which implementation of the 802.11 Wireless Standards is the best?
    • Why? Support your answer.
  • Post a new topic to the Discussion Board that contains your implementation descriptions and your answers to the questions above.
  • Respond to 2 other students’ posts on the Discussion Board, and critique their descriptions and answers.
  • Use APA references and citations to support your assertions.
    • Do not include a table of contents or abstract.

Your submitted assignment should include the following:

  • Your Discussion Board topic containing your 802.11 implementation descriptions and responses to the 2 questions in the assignment guidelines
  • Responses to 2 other students’ Discussion Board posts

Cyber

 Need help with question. will give instructions once we communicate.