Security Arc

 Question A

  • If you were given a set of vulnerabilities how would you prioritize remediating them?

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

APA format.500 words with references

Assignment Seven

Week 7 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that illustrates the impact of the  Internet on Human Rights (In a pinch you should review the UN Declaration on Human Rights if you get stuck).

Course reflection discussion

My course is cloud computing and I work as a software engineer.

Write a brief reflection on this course and on how it will aid your professional career and development.

  • How will this course impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this course prepare you for further studies related to your chosen professional career?

Essay about designing rational Agents for (Artificial intelligence) course

The requirements is: 

Explain topic and write what you understand about it

No grammar mistakes no plagiarism

Make it simple anyone can understand 

(700-800) words at least. 

Each article number of graphs for example > 

designing rational agents > Graphs/drawings. 

Draw what’s meaningful to you. 

You can use long quotations & the references. 

Finally make it simple and not deep

Discussion 2

 

The United States v. Dioguardi

428 F.2d 1033, 1038 (C.A.N.Y. 1970).

At least, a minimum standard of trustworthiness must be established to eliminate the theory of accuracy, the integrity of computer used to generate evidence, and the admissibility of such records in court. The original contents of free and fair evidence are deep-rooted in writing panache, recording, and photograph required by court standards to ensure that court decisions are based on reliable, and authentic evidence. The advent of photocopiers, scanners, related technology that can be used to create identical acceptable duplicates in place of the original and in the market.  A genuine question on the authenticity of the original and accuracy of a photocopy could be unfair to accept in place of the original. Presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original copy being unintentionally altered.

A paper printout of a digital document may be considered equivalent to the original unless essential portions of the original are not visible in printed format. Hearsay Digital evidence cannot be admitted in court if the author of the evidence is not present to verify and authenticate the evidence’s integrity. Computers is an electronic device can be programed to store and output information with limited human intervention; hence, the computer system can initiate the hosting, emitting errors and uncertainty in various ways in any location and at any time. Digital evidence is generally a suggestive of human activities; for example, the system clock on a computer can be incorrect, and date-time stamps can be misinterpreted. Furthermore, the source internet protocol (IP) address on network traffic may be assigned to a proxy device rather than the actual originating computer.

Scenario:   A genuine question on the authenticity of the original and accuracy of the photocopy of an evidence could be unfair to admit in place of the original copy.  Furthermore, presenting a photocopy of digital evidence is usually more desirable because it eliminates the risk of original being unintentionally altered. As an organization lead forensic investigator, which of this conclusive evidence will you present in court:

  1. Provide a comprehensive narrative on the importance of the original copy of the evidence in court?
  2. Provide a comprehensive narrative on the incongruity of a photocopy of evidence in place of the original copy in court?

discussion (Managing in a Global Enviro)

 Topic :  International Monetary Fund (IMF)

See one week-1 folder for  research terms.  Topics will be selected on a first come first serve basis.  To claim a topic, go to this week’s discussion form (below) and check what topics remain available.  Select an available topic and start a new discussion thread by placing ONLY the topic in the Subject Line (do not put your name or anything else here).  Leave the body of the thread blank and save the post. In weeks when there are insufficient topics for everyone once all topics have been selected you may then start selecting from the entire list again.  But there should never be three posts on the same topic – if so the last one posted will receive no credit.         

Now research your selected term in the university’s electronic library from only academic (refereed) journals.  You will need at least three journal references and the textbook.  Start your research with the textbook so it always grounds your topic.   When your research is complete post it in the discussion form below.

Once you have completed your research return to your “initial post” and respond to it; actually past the paper’s body in the message section (for your peers to read) but attach the actual paper so the professor can review it for proper APA formatting.  In weeks when there are insufficient topics for everyone once all topics have been selected you may then start selecting from the entire list again.  But there should never be three posts on the same topic – if so, the last posted will receive no credit. New topics will be available each Saturday.

Peer Replies – post at least two substantive peer replies, of at least 200 words, in response to your classmates’ posts.   However, credit cannot be given for more than one peer reply per day. 

Convex Hull

This week’s discussion has introduced working with geometric objects and transformations, particularly with respect to scalars, points, and vectors. In this assignment, briefly discuss a convex hull.

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.