Professional Behaviour

 

In this Assignment, you will have an opportunity to view a set of slides. After viewing all of the choices of sets of slides, choose one of the sets that best represents your desired career field. Then, describe and analyze what you viewed according to the following directions. Each paragraph should be a minimum of 5–7 sentences.

Choose a set of slides to view.

Your Assignment should include:

Part 1: View and Analysis (3–4 paragraphs)

Describe and explain what you viewed. Answer the following questions in your response:

  • Which set of slides did you choose to view? How does this set of slides relate to your own career?
  • Were the individuals professional? What made the individuals professional (consider attire, non-verbal communication skills, presentation of self, and identify and describe specific things in the slides that made the individuals professional)?
  • After reviewing the slides, list and explain specific areas that would be unprofessional on the slides as well as in your field when considering attire, non-verbal communication skills, and presentation of self.
  • Include any additional thoughts focused on professionalism based on what you viewed on the slides.

Part 2: Personal Reflection and Connection (4 paragraphs)

  • Describe the appropriate attire for an individual in your profession. Provide specific examples of appropriate attire. Note: you may want to research this by talking to those in your profession or researching appropriate attire for your profession as this may differ from what you viewed in the presentation. In addition, review the Credibility Robbers information from the Unit 2 Learning Activities.
  • Describe and analyze what makes someone a professional in your field. Use research to support your ideas for this paragraph.
  • Explain the behavioral attributes you practice that identify you as a professional (review Units 1–3 for information).
  • What aspects, such as attire, non-verbal communication skills, and presentation of self, do you possess that make you professional? How do these aspects relate specifically to your field?

Assignment Format

Your submission should:

  • Have a brief introductory and concluding paragraph
  • Be about 2 pages, double-spaced, in length using 12 pt. Times New Roman font
  • Include a title page and reference page (note: these do not count towards the two-page content requirement).
  • Be clearly written in Standard English. Be sure to proofread your assignment before posting to ensure you have proper grammar and writing mechanics.
  • Be unified, original, and insightful
  • Follow proper APA format for both in-text citations and sources on reference page.

IT345 8

 Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources. 

 

Topics:

  • Do you believe we are too dependent on computers? Why or why not?
  • In what ways are we safer due to new technologies?
  • What are some recent examples of technology that has been created that is used to “save lives”?

Computer science

Briefly describe the following

1.profession (15 marks)

2.professional(15 marks)

3.code of conduct (15 marks)

4.Ethics(15 marks)

5 contracts(15 marks)

6.policies(15 marks)

7.practices(15 marks)

Management of Information Security Project

Project Description

Carry out a security self-assessment of an organization of your current or previous employer or your own organization. You must seek permission from the individual responsible for the information security of that organization. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.

Report

Write a report based on the self-assessment of an organization. It should be 5-7 pages long, 12 point character size, double line spacing, and have 1” margins on all sides. It is recommended that you do not use the actual name of the organization in the report; use a title, such as “ABC, Inc.” Your report should include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of an action plan.

Deliverables: A single Word document

Project Guidelines:

For the project, you can do a security assessment on either a single IT system or the entire IT infrastructure of an organization, whichever you think is feasible and manageable.

You can use these guidelines when working on your project:

1) Your project report just needs to be a very general assessment of the IT system in organization. You can keep it brief (about 4 to 8 pages long, not including the cover page), and broadly cover the following areas:

 Management Controls

 Operational Controls

 Technical Controls.

You don’t need to get into specifics on anything that might be considered sensitive or proprietary. Keep it very general (something that can be in the public-domain).

2) For your project, **only** use information that is considered public. Please **do not** use or reference any proprietary or non-public information. As the project guidelines state, do not use the actual name of any organization – instead use “ABC Inc.” And in your project please don’t reference any documents that are not considered to be in the public domain; also don’t use any company names – use something generic such as XYZ Inc.

3) Instead of doing a self-assessment of a real company, you can also do a self-assessment of a fictitious company similar to a real entity. For example, you could imagine that you are performing an assessment of a fictitious entity such as the following:

 A college bookstore that accepts online textbook purchases, or

 A pharmacy store that maintains a database of customer prescriptions

 An auto-insurance agency that maintains customer data

 … etc. … etc.

You can imagine yourself being hired as an Info Security consultant to perform a security audit of the fictitious company’s IT infrastructure. Assume that some rudimentary security measures are currently in place, but there is much room for improvement. In your report describe your assessment of the security measures currently in place and recommend any needed improvements to ensure better IT security in the organization.

ETCM DISCUSSION-5

Discussion: Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

 

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Case Study

Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector or the Critical Infrastructure.

Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

 

Required Books and Resources

Title: Access Control, Authentication, And Public Key InfrastructureSubtitle: **PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS.ISBN: 978-1-284-03159-1Authors: Mike Chapple, Bill Ballad, Tricia Ballad, Erin BanksPublisher: Jones & Bartlett LearningPublication Date: 2014-08-01Edition: second

Course Required text can be found and purchased via the UC Barnes and Noble Bookstore: https://cumber.bncollege.com/shop/cumberlands/page/find-textbooks

Research paper

Attached the document with the instructions and also the reference article. need 4 pages of content on given questions  with zero plagiarism

connection assignment

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ Data Mining ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.