Cryptography

in our technological world, cryptography is all around us. Examine your everyday connections to technology for evidence of cryptography.  Provide detailed examples of how cryptography exists in your world.  Next, explore the level of security for two of your examples and offer your opinion on whether the current security is strong enough.  

2 pages papers

executive summaries

 1 page discussion

  1. Search the internet for sample executive summaries.
  2. From your research, describe 3 items that need to be in an executive summary and your reasons why.
  3. Include in your report the ways that you would ensure that your executive summary would get buy-in from the key stakeholders of this project.

Physical Security – individual project

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Python Discussion

1. Describe outliers and pick a technique that can be used to handle outliers

2. Describe missing values and pick a technique that we have not discussed in this class to handle them

3. Discuss why and when do we need to use data normalization and standardization

enterprise risk management/ discussion

 

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Choose Only “ONE” question from these three, and write 4 pages Research Paper: 1.”The Mythology of Computers: The Early Day” OR 2. “Do You Know Where You Computer's Been? Protecting your Computer” OR 3. “Internet Freedom Versus Security: Who Wins?”

  Choose Only “ONE” question from these three, and write 4 pages Research Paper plus annotation: 

 1.”The Mythology of Computers: The Early Day”  

2. “Do You Know Where You Computer’s Been? Protecting your Computer” 

 3. “Internet Freedom Versus Security: Who Wins?”

Make sure to do all of the following:

  1. The annotated bibliography will contain six (6)sources using the MLA style for the reference citations. 
  2. Your sources must include at least one book, one article, and one web source. 
  3. Each source listed will also include a 3-5-sentence annotation that will describe the relevance between the information in the source and your topic. 
  4. Your annotations identify how the source relates to your topic. Spelling, grammar, and writing style will be evaluated. The annotated bibliography should be typed in MLA style, double-spaced with one-inch margins (top, bottom, left, and right). Include your name and page number in the header (top-aligned right); include your name, Prof. Name, Class Name, the date on the left side.