Ethical Hacking

 

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Cloud Computing Discussion 4

 Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.   

Use at least three sources. Do not use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

operations security

COBIT:  Control Objectives for Information  and Related Technology

Be sure to explore the following page as there is much information found on ISACA’s site.

http://www.isaca.org/cobit/pages/default.aspx

Write a 2 page paper on the concept you chose.  In your paper, cover these key points:

Full describe the concept you identified from what you learned so far.  Be very detailed and pretend you are explaining the concept to someone who knows very little about it.  Be sure to include citations to sources from the library and textbook.  You will need to use APA format. 

Identify how you will apply the concept to the job you have or that you aspire to achieve.  Be very specific about the job role and tasks

Tell why you think knowledge of this concept is important.

Reflect deeply when you write this paper as this a personal reflection and not just a research paper on the topic.   Think about how you will apply what you learned and your writing will be evaluated on the quality of your reflection on your chosen topic.   Describing how you will apply what you learned is a very important part of this assignment.

wk 9 fund

Why is a blockchain ledger more reliable than a database system? Can you really use it for just about any type of transactional system or are their limits?

Cryptography

evaluate  the history of cryptography from its origins.  Analyze how cryptography  was used and describe how it grew within history.  The writing  assignment requires a minimum of two and half written pages to evaluate the  history.  You must use a minimum of three scholarly articles to complete  the assignment.  The assignment must be properly APA formatted.

APA Formatting checklist

Time new Roman Font, 12pt
Double Line spacing
Paragraph and headers alignment
References formatting

Forums / Week 7 Forum / Topic: The Next Course Enrollment

 Congratulations on completing over 75% of this course!  Please reflect and share what you learned  and actions you will take to reach your educational goals. Here are some questions to serve as a catalyst for your reflection and discussion: