Emerging threats_3.2

Discussion:

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

At least two scholarly sources should be used in the initial discussion thread.

Note: Answer should be minimum of 300 words

Qu

1. 250 words:   Meals on Wheels Organization

write a one-page paper discussing the challenges the organization (Meals on Wheels) had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

The paper must adhere to APA guidelines including Title and Reference pages.  The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page

2: 250 words:

What are FOUR (4) differences between descriptive and Predictive categories of Data Mining.  Provide your response in no less than 250 words. Each difference discussed must be clearly stated before describing them in the proceeding paragraph.

Requirement

Your response must be written in no less than 250 word, using  properly formatted APA in-text citation and scholarly reference support all your assumptions and or quotations

3. 250 words:

 Using different scholarly or peer-review articles involving data mining, describe THREE (3) note worthy application or usage of “data mining” in the real world. Support each usage with examples for each use. All response must be in your own words and citation provided to support your response. Use proper grammar and in-text citation. 

fake news

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format. 

MIS 504 Introduction to Information Systems

  

Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking by eavesdroppers. You are expected to prepare a research project (e.g. 400/500 words) about malicious programs (e.g. Shamoon), and the damage being caused to public and private sectors in Saudi Arabia, if any. 

Purpose: The assignment is to promote awareness of various security threats, and to develop a better understanding of how enterprises/business firms improve their security environment via the establishment of a framework for security and control. 

Assignment Guideline:

1. Use Time New Roman.

2. Use Font Size 12.

3. Use 1.15 Line Spacing. 

Access Control discussion 3

 Discuss why it is more effective and less expensive to prevent security breach than to fix one after an attack.

500 words

no plagiarism 

no grammar mistakes

need APA format

properly cite the references

blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

  • Be approximately 2-3 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Ethical Analysis

The google glass sits on ones face just like any other glasses but there are no actual lenses. It is asymmetrical as the prism is only on one side of the glass. Given the intrusive natures of these technologies it is easy for employees to take videos or photographs of other people at work and share it with others. What ethical issues arise from the use of wearable technologies in workplaces? Analyse it based on any four ethical philosophies taught to you in this unit .

A suggested report structure is as follows. 

• title page • executive summary 

• table of contents 

• introduction

 • ethical analysis 

• conclusion 

• references 

• appendices  

Computer Forensics

From the given scenario, we need to find 5 hidden evidences from the given image.dd file. you have to use Autopsy software to extract the .dd file