Reflection-Security

Please reflect on your dissertation progress. This will be final version.

Topic :  The Smart Phone as a Dangerous Technology  

1000 words

APA format with references needed.

Assignment 2

Discussion 1

  Available until Jun 28, 2022 11:59 PM. Submission restricted after availability ends.

In this week’s discussion post, discuss the following:

  • A woman at work tells you that her husband has just been diagnosed with early stage cancer.  She asks you if she should call hospice.  What do you tell her, and explain why you gave her the answer that you do. 

An excellent response will be at least 3-4 paragraphs in length, using complete sentences and concise language. Please review published peer-reviewed articles (from the Library website) (see syllabus for details) and include citations and references in all post responses.

Your initial post is due on Sunday evening at 11:59 p.m. ET. In addition to your main post, please respond to at least 2 other students’ posts by Tuesday evening at 11:59 p.m. ET. When responding to other students’ posts, be sure to include peer-reviewed references from sources other than the Learning Resources and ideas/examples that adds to the dialogue. Refer to the syllabus for more details about discussion participation. 

Please be sure to use APA citations in your text and to include your reference list. When you refer to and/or discuss any resources, you need to include a citation for that source, such as: (Braincraft, 2015). For more info on APA style, visit the APA Citations and Style module in this online classroom. 

Remember to check back throughout the week and provide thoughtful, substantive responses to at least 2 classmates in order to earn full-credit (include citations from peer-reviewed journals).

Discussion 2

Education

 

response to the article and videos below :

Please read the instructions  attached 

Online Patents and other concerns

 

In order to complete assignment #4, you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes, and outside research to support your answers. The assignment must be a minimum of a full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 61. Chapter 6 noted that Friendster has obtained a number of social networking patents that it could potentially assert against other social networking sites such as Facebook and MySpace. Suppose you are corporate counsel at one of these two companies and you expect that you may eventually be sued by Friendster. In addition to contesting the validity or enforceability of the Friendster patents, what are some of your other options? 

Chapter 72. The CEO of a small but promising start-up company is in need of an experienced engineer to head up a key aspect of the business and has selected Sam as a leading candidate. If hired, Sam would not only be exposed to the proprietary technology that already provides a significant advantage in the market but would be tasked with developing additional proprietary information and software. Sam is currently an employee of XYZ Corp., a competitor of the start-up. What potential problems might the CEO want to consider? What steps could the CEO take to address these problems?

3. Read about the Gramm–Leach–Bliley Act (GLBA). Discuss the impact of the GLBA on the financial services industry

10 page single space technical report in APA

Topic: Network security and cryptography

Major headings to be included in a paper:

         Types of security attacks

         Network security model

         cryptography mechanism

         Network and internet security

         firewalls

Malware

 Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

1000 words

APA format with References needed.

SQL Discussion Response 2

 

Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.

Original Question:  Explain SQL and its functions. What do you enjoy the most about learning SQL? What you find the most difficult? 

Peer Response:

 

SQL is a query language and one of the most popular database languages, mostly due to it not being too difficult to learn. Each SQL database systems have data definition language and data manipulation language. The data definition language is for database creation, change and maintenance. The data manipulation language (DML) is used for computing data within a database. The DML can also support functions like COUNT, which counts the number of rows meeting the selection criteria. CURRENT_DATE will return the current system date. AVG computed the total value of the column given. Some very basic and standard commands include, SELECT, INSERT, FROM, CREATE and DROP. 

I enjoyed how simple it was to understand the language. I have taken courses with other languages and this has been the least confusing. Being able to continue to build on what you already have is the best part. The most difficult was understanding the normalization forms. This was a big hurdle for me but once I got more of an understanding it became simpler to understand how I needed to do the diagrams. Also some of the syntaxes. in the trucks assignment it took me hours, and I mean hours, to fully understand where I was going wrong with some of them. But now I’ve become more aware of what to use and where to use it. 

IT214: Computer Science and Engineering

 

Weekly Assignment/Discussions via Unicheck Week 03

Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

Document your program – to include your name, course, date written, and the formulas used in the conversions.

Instruct the user on how to enter the data requested.

You must use the IF, ELSE, ELIF statements, or a combination of these statements.