Emerging Threats

  • After this weeks readings and your own research, describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.Privacy Principles for Sharing Cyber Security Data

  • Threats to Cyber-Systems
  • CIA Triad
  • Personnel Security
  • Risk Management 

assign-2

 Search the Internet for companies that supply utility computing. Select 2 or 3 companies and compare them to Amazon. What services do these companies provide? What promises do they make about availability?  Grammatical and mechanical errors will be checked. 

2 pages with apa format and no plagiarism

CSIA 459 disc

Before you begin read the following articles:

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

19 Mirai Botnet Authors Avoid Jail Time

You have been asked to provide a short presentation for Business Leaders Round Table meeting in your community. The topic of the meeting is Emerging Cybersecurity Threats and What Businesses Need to Know. Your presentation will be part of a series of talks about the risks associated with unsecured cyber-physical systems. The organizers have asked you to begin by presenting an overview of the Mirai Botnet attacks followed by a discussion of threats and vulnerabilities which have been found in cyber-physical systems used to manage buildings and utilities.

For this briefing, you will need to find and use three additional authoritative sources that provide information about threats, attacks, and vulnerabilities affecting cyber-physical systems.

Format your presentation as a background paper to be shared with attendees. The target length as specified by the meeting organizers is 5 to 7 paragraphs in length.

Post your paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.

Tasks

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Product Idea and Search Engines/Electronic Marketing. 

After reviewing the assigned reading materials, complete the following activities:

1.  You will develop a product service idea.

      A. Describe the product/service including the benefits of using the product/service

      B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Need help in home work 111120

you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s the strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Digital Forensics

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

case study

Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the success factors in the Scotiabank-Kabbage partnership?2. Under what conditions is the same model applicable?When will the Scotiabank-Kabbage model not work?3. Under what circumstances should Scotiabank seek fintech partnerships?4. Identify a sector (e.g., international payments, blockchain, lending or wealth management) and a geographic market where a fintech partnership would create value for Scotiabank, and explain why.5.Based on your answer to question 4, what recommendations would you make to Scotiabank’s executives for a three-year plan, choice of partner, reason for the partnership, and suggested procedure (i.e.,what partnership model to follow)?6. What challengers is Scotiabank facing in the blockchain sector? What are the implications for the bank’s blockchain partnership strategy?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property?
  • What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property?
  • What is plagiarism, and what can be done to combat it?

Sync Sessions are held four times per term.  For the exact dates and times please check the course schedule under the Course Overview area.  To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.

Due: Assignment is due Thursday of the second week in the module.