Hmework

 

Assignment 1

Discuss the following questions and submit as an attachment in a 500 word APA formatted paper by Wednesday 11:59 pm: 1. What is Blockchain? 2. What are Blockchain’s potential applications in organizational functions such as human resource management, accounting, and supply chain management. You are required to cite this week’s assigned readings in your paper. You may also cite external sources if you wish. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I often provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words and it should be submitted no later than Wednesday before 11:59 pm EST.  Your response should be formatted in APA style and reference each of this week’s readings.

The following guidelines are used to grade your discussion papers:

1. Discussion posts are worth 50 points each week. Forty points for the student’s initial discussion post paper, 5 points each for peer response posts.  Your two peer replies should contain a minimum of 150 words each and should be submitted no later than Sunday before 11:59 pm EST. 

2. The following point allocations are used to grade all discussion papers: 10 points APA style, 10 points use of required readings, 10 points content, 10 points scholarly writing/grammar/structure. Failure to cite each week’s required readings will result in an automatic 5-point deduction. Failure to provide in-text citations of paraphrased and quoted material will result in an automatic 10-point deduction.

—————————————————————————————————————

Assignment 2

 

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

Note: The first post should be made by Wednesday 11:59 p.m., EST.

Capture the Flag (CTF) Write-Up

 

The individual CTF challenge is made up of 100 challenges separated into 10 categories of 10 challenges. You may choose which challenges you want to attempt and may attempt multiple challenges from the same category. Once you have attempted any of the 10 questions out of the 100, proceed to the CTF Challenge Write-Up. For this Project:

  • Review the Capture the Flag (CTF) Challenges and pick 10 to solve.
    • You can check your answers with the “CTF Answer Checker” in the quizzes section of the course
    • You can keep submitting your CTF answers until you get 10 correct
    • This will not affect your assignment or course grade
  • When you have attempted 10 challenges:
    • Follow the instructions in the Capture the Flag (CTF) Write-Up Template to answer follow-up questions on your CTF experience
    • For the Write-Up, you should list the 10 challenges you attempted and explain at least 2 challenges that you actually solved to complete the assignment
    • You do not need 10 “correct” solves; rather, focus on what you learned from the challenge(s) you solved and also those you did not solve

When I first started reading the narratives, it was a little difficult to follow because of the grammar and the way they spoke back in that time period. I have never read anything like these stories before. You are always taught about slaves and the war i

 

When I first started reading the narratives, it was a little difficult to follow because of the grammar and the way they spoke back in that time period. I have never read anything like these stories before. You are always taught about slaves and the war in school, but we never had to read narratives like this that come straight from the people’s perspective. I think the strengths of the oral histories is that you get to read what it was like straight from the people that experienced it. You get more emotions in the stories because they lived through it. I like how in many of the narratives, it was like they were telling a story. They had many details because they were asked open-ended questions and could go into detail about what they experienced.

I think it is very interesting how the experiences of the slaves are different. For example, Mary Anngady was a slave, but she was one of the lucky ones. She was taught her ABC’s by her master’s daughter and was given a spelling book by her miss’s Bettie. Her family was given many privileges. They had plenty to eat and clothes. They also attended church and was given religious books and even played with the white children. But for Louisa Adams it was a different story. For her and her family, they worked all day and got hardly any food. They had to steal food or eat what they made in the garden. They only got one pair of shoes for the year and if you wore them out you had to go barefoot. Her brother wore his shoes out and had to go barefoot in the winter and had cracks in his feet so bad that he bled.

write you response

for example how to write a response

I agree, I hadn’t read any narratives with this type of dialect before these. I found it very interesting because I could pronounce what the interviewees were saying in my head, so it made it sort of fun to decode! I also agree with you that oral histories make the content much more meaningful. The details that the ex-slaves exhibited were very real and that makes the topic much more substantial, in my opinion. I was also surprised about how different the slaves were treated. Mary Anderson’s master did not believe in whipping his slaves and they got a big breakfast on Sundays for their hard work throughout the week, yet Louisa Adams and her family were treated like animals without even suitable clothing. I wonder why some masters were completely different!

Help 2

During this assignment, you will conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.

Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)

Use the following guidelines to create a four to five-page report.

Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)

List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.

Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.

Part 2: Identify Risk (“Where is the Risk to My Information Assets”)

List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.

In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).

Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)

Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., NIST SP 800-39 Managing Information Security Risk).

Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.

Provide a diagram of the matrix that was used to assess risk.

Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.

Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.

Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)

Review the characteristics of a risk appetite within Chapter 6 of the course text.

Establish a Risk Appetite Statement for the company.

Define the Risk Tolerance of the company.

Part 5: Control Risk

In 300–500 words, identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.

Week 3 Assignment

Subject:  Leading Strategic Change with Technology

Companies often have many sources of disparate data and the systems used do not directly link or share data. Therefore, data must be collected and stored in repositories. 

Chapter 8 explains that a data lake contains unorganized or unstructured data, whereas a data warehouse contains structured data which has been organized for a specific purpose. 

Chapter 8: Understanding Data’s Impact on Business

Note: 300 words with intext citations with 4 references must needed

Simulation Report 1

Interpretive Simulations

Each student, independently of the team will prepare a brief summary for the week’s simulation efforts. This report will include the following information: 

  1. What was your one corporate generic strategy as reviewed from our text for the week?  Break this down by your target market and your competitive advantage.  Why?  Did your overall strategy change since week 1?  Why?
  2. What was your strategic action plan going into the rounds detailed in Blackboard including the reasons for the moves and how it relates to your overall strategy?  What are your objective and measurable goals for the moves?  Did you have to make operationally reactive moves not related to your strategy?  Why?
  3. What was the objective, fact-based results compared to your intended moves and the reasons of these moves generally? How did your moves advance your one Generic Strategy?  Be specific.  Did you get the objective results you expected?  Why/why not?  Share any objective measures from the simulation program that are pertinent to the strategic implementation results and note any purely operational moves.  How did your competition and the external environment impact your moves?  What is your analysis of this data results compared to your intended results?
  4. What do you think the next set of objective and measurable moves you will have to consider, and what will you suggest to your partners regarding next week’s moves?
  5. What have you learned and how does this relate to other lessons in this course and to your career?
  6. Provide a log regarding the specific dates and times that you accessed the simulation system including specifically when and how you and your teammate reviewed and discussed the simulation system data and decided on your moves to make.  A sample is provided in week 1.

 

Your report this week should cover periods 1 thru 4 inclusively with fact-based objective data that you analyze from all 4 periods.Your grade for each of the simulation report papers will be based on your analysis and critical thinking around the selection and implementation of the corporate strategy for your company.  Your analysis must be increasingly more thorough with each paper as you become more familiar with the simulation program and with the concepts from our course.  The grade will also include a portion based on your team’s current position and your team’s work together.  Review the required components in the grading rubric for the simulation paper.Submission 

Details: Your assignment will be between 1000 and 1500 words and follow APA Guidelines. Include a cover page and at least your course text as a reference.

References: Thompson textbook 2021.

Feedback: Please use the documents I have attached and no google words copied. Every letter should be written on own.

paraphrase 470 words

  

A few of fields In cybersecurity that will be important in several years are Application Security, Network Security and Mobile Security. Both fields to me have a lot of growth opportunities and can be very dangerous if not used right. For instances application security plays a crucial part in our everyday life cycle which includes work, school, home use..etc. Certain application software can be very pricey, companies use it to evaluate security of the third-party software they may be using. Application penetration testing is a big help in order to exploit vulnerabilities in applications before hackers are able to discover them. Penetration testing are broken down into 5 stages which are analysis and WAF configuration, maintain access, planning and reconnaissance, scanning, and gaining access. Locking down the application is very important in so many ways. Mobile security is more important than ever before. More data is being stored on mobile devices so that gives the cybercriminal more opportunity to steal valuable information. More cybercriminals are focusing their efforts more on smartphones, tablets, and laptops. They can easily steal more money and data from users this way. IT security administrators noticed it’s getting harder over the years in securing sensitive data. While cybercriminals use it as another way to compromise businesses. That’s why in today’s society more organizations have personally banned the use of mobile devices or their property. People still view mobile devices as being more secure than PC’s. They think PC’s have a real operating system while mobile devices have some sort of firmware that’s unbreakable, along security apps which is not true. Network Security plays a important fact in cybersecurity, there is so many attacks daily on networks. Some common internet attacks are eavesdropping, Trojans, viruses, phishing denial of service, and IP spoofing. Over a period of time companies started to notice many data breaches over a network begins with negligent employees. These kinds of breaches happens all over the world, the cost of data breaches could range over $4 million per breach. With is huge price tag can do major damage to a business and customers will start to lost their trust in a organization like a bank. When it comes to cost data breaches can also come with legal fines. FCC found out carriers had breached personal data up to 305,000 users through their lax data security practices and exposed users. Penalties by the FCC has not been a regulatory body of concern with respect of data security and breaches. Some of the career opportunities and pathways to cybersecurity certifications are as follows: A Entry-level helpdesk which requires a Security + certification. A Cyber Security Forensics Specialist, certified Pen Tester w/Polygraph requires Certified Pen tester, programming experience with Java, C, C++, Perl, Python, Enscripts, Linux/Unix, Mobile OS, Android certifications. A Cyber Security Penetration Test Engineer requires OSCP, GIAC, GPEN, GWAPT, GSSP, ITIL, or CISSP certifications