In my computer science class, we are required to design a logo for a wine company. I have made a sample logo. The name is Profound, since 2010, and a simple logo. If you want to just stick with my design please make it professional. I’ve been lacking on classes and would need some help.
Discussion Reply!!! About 75 words
Part 1: Security Threats
A Facebook data breach revealed more than 530 million individuals’ personal information to hackers. This included the date of birth, user’s name, current city, and posts made on their wall. The exposure was discovered in 2021 even though it existed since 2019.
This breach happened when cybercriminals scraped data from Facebook’s servers using a misconfiguration in their contact importer. As a result, they could gain access to the personal information of millions of people.
According to (Vojtko How to prevent security misconfiguration) “The most common mistakes that lead to security misconfiguration are: Unnecessary ports being left open, Unneeded services permitted to run, Leftover pages still available to access, and Unused accounts with certain privileges not being deleted.”
By not removing these things you are leaving the application open to attacks. A couple of things we can do to prevent Security Misconfiguration are: Remove unused features, Disable the use of default accounts and passwords, and Limit access to administrator interfaces.
Part 2: Mobile devices
A desktop computer is more physically secure than laptops, smartphones, and tablets because it is often kept in one location, making it easier to protect. Desktop’s access to internet usually comes from a single source, which help to fight malware easier.
Each one of these items have different practices when it comes to secure your device, these are a few ones that they have in common:
Always run updates, avoid public or suspicious Wi-Fi, enable remote lock, enable user authentication, turn off device when not in use, and restrict physical access to device.
I’m already implementing a few security practices on my mobile device to protect it from being hacked. For example, I try to avoid social media apps as much as possible ( I do not have Facebook, Twitter, Tik Tok). Instagram is the only social media platform I have, and I always try to share as less information about myself as possible.
Another practice I use is to always download files from a trustworthy source or page.
References:
Vojtko, Mark. “How to Prevent Security Misconfiguration.” Hashed Out by The SSL Store™, 28 Dec. 2020, https://www.thesslstore.com/blog/how-to-prevent-security-misconfiguration/.
WK3 092021
NOTE: **** post answers in separate documents for each Question
**** Please follow the instructions to the point and pick relavant topics according to the subject
**** Follow APA7 format
Subject: Cloud Comp
help with comp assgn due in 6 hours URGENT
due in 6 hours
attached
Data Science w 1
Importance of Programming
Write a short paragraph on the importance of programming in data analytics. Also, write the advantage of open source language like R over other licensed programming software.
Question
Contact user for instructions
Power Point
´1. Proposed the IT budget for the e-commerce initiative
´2. Discuss the IT-based risks associated with global e-commerce
Required 3 slides with Images, Plagarisim copy required
Research Paper
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
- User authentication and credentials with third-party applications
- 3 common security risks with ratings: low, medium or high
- Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Week – 6
https://www.bls.gov/cps/tables.htm#charemp
There are countless sites that are willing to share the results of the data collection they perform with the general public. As analysts, it is important for us to understand how to acquire and work with a wide array of data from a wide array of sources. This week, we will focus on one open-source site:
This week’s assignment is to take one of the datasets available on this page and graph it using R. You have the choice of the dataset from the above page, and the type of visualization you wish to use. In your paper, describe the dataset and its significance.
Your paper should be 500 words with a screenshot of the R code and the visualization you create.
Mobile Sensing current trends and challenges
Your task is to reflect and analyze the above research, Write a one-page reflection summary using APA style that addresses the current trends and challenges in Mobile Sensing.