Assignment

 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

  • Find a DoS attack that has occurred in the last six months
  • You might find some resources at www.f-secure.com.
  • Note how that attack was conducted.
  • Write a brief explanation of how you might have defended against that specific attack.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

security vulnerablities

 

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Network

 

Based on the knowledge you have achieved thus far in this class, compose a brief synopsis compiling what you have learned about today’s networks. Describe how you would create a better network at your home or office utilizing the knowledge you’ve gained with this class. An example of this knowledge would be the cabling selected, as well as the IP address scheme utilized.

Parameters/Expectations:

  • At least 4 paragraphs in length not counting the title page, include a title page, double space, font size 10 or 12
  • Includes a highly developed viewpoint, purpose and exceptional content
  • Demonstrates superior organization, is well ordered, logical and unified
  • Free of grammar and spelling errors 5. No evidence of plagiarism

Big data

  

Assignment # 3 is a research assignment.

We studied Apache Pig in lecture # 4. You are supposed to do online research and find out one case study where Apache Pig was used to solve a particular problem. I am expecting 4-page write-up. Please provide as much technical details as possible about solution through Apache Pig. Please draw technical diagrams to explain the solution. 

I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up.

Please draw your own diagrams and don’t go more than 4 pages in total.

Assignment, Memo and discussions

1.Assignment – Input Form Assignment

identify and apply the different analysis and design methods for business applications.

Use Wufoo to develop an input form using some of the key fields from your project. Copy (or take a screenshot of) the design and paste it into Word document with a title page. 

Provide the resulting URL as well.

Criteria: Design incorporates good choice of colors, text, font, arrangement, and evidence of possible navigation (as in a “submit” button).

Your essay should be 3 pages in length and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.

Atleast 2 In-line citations and references required.

2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required). 

Relate this weeks assignment and discussions to your work in office/organization.

3.Discussions

1) Why is content awareness important? 

2)UX Design Principles – Explain three important user interface design principles.

Each discussion should have atleast 3 paragraphs, 2 inline citations, 2 references. Due by 11/16/2020 .

Plagiarism should be very minimal. I may ask for changes if required.

Galaxy_Discussion

**********************************************************************************************************************

The beginning of chapter 4 has two pictures of galaxies. The study of the universe has been on-going for decades. One organization involved with this is the SETI Institute. You may remember this from the movie Contact. One area of their research is with exoplanets. Until 1995, other solar system with planets like ours was a simple conjecture. Now, this is a very exciting field of study. To do this, the scientists gather immense amounts of data from the telescopes. For their research, the goal is to find a planet which could, in theory, support human life. In this endeavor, the scientists would not be as interested in a gas giant, e.g. Saturn or Jupiter.

If you were creating a decision tree based on the telescope observations, please describe what the root node would be, possible internal nodes, and leaf terminal nodes. 

**********************************************************************************************************************

 Need 250 words with references and textbook is attached. No APA format required 

Connection assignment 2

 

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “  – Information Security & Risk Management  ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Future impact of the internet

 

Week 8 Written Assignment

  • Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.
  • The title page and bibliography do not count towards the word count.
  • Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference
  • After completing the essay, save and upload the document in the Assignments section of the e-classroom.
  • Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that forecasts future impact of the Internet as its role in society continues to evolve. You should point out new issues if you foresee them.