Reflection R3

 

Submit a 5 page paper (APA style) describing how Blockchain will change digital marketing.

Reflection Three (R3) is an essay assignment. 

  

Read:

Watch:

  • YouTube: Crytography & Blockchain in Digital Marketing 
  • YouTube: Applying the Blockchain to an everchanging digital media landscape

Contingency Planning

Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ETCM-Research-6

Need this research paper by Thursday USA time. (5 days from now).

5 pages without references and Title page. Follow APA 7 format and citations.

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Comp science

Why protein structure determination is very important in drug design? What is the impact in terms of science, health, and cost?

Access

Using Access, you will create a NEW database, including creating tables, queries, forms, reports, and advanced formatting tools.

Some sample Access ideas include (1) inventory of technology at work, (2) inventory of your home/possessions for insurance purposes, (3) a list of all contact information you have on others.

1. Three tables that are linked (a minimum of 10 records per table).
2. Two types of queries.
3. Two types of forms.
4. Two types of reports.
5. Advanced formatting tools.
6. Organized, formatted, and professionally presented Access file, including grammar items (correct spelling, etc.).

Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING

 

This assignment consists of two parts:

Part 1: SLP Assignment Overview

When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.

Part 1 SLP Assignment Expectations

The Prototype should address the following requirements:

  • The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
  • A basic visual interface to support navigation of the program and identify the future functionality of the application.
  • No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docxthat describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
    • This document should also provide a summary of how the prototype shows proof-of-concept for the project.
    • Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Part 2: SLP Assignment Overview

For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.

Part 2 SLP Assignment Expectations

The Alpha version should address the following requirements:

  • The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
  • All major functionality should be operational at least at a minimal level.
  • Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
  • The visual interface should provide access to all major functions of the application.
  • There should be a demonstrable, functional connection to the required database for the project.
  • All code should be well-documented with comments.
  • The program should run without significant errors.
  • Include a document called operation.docx that describes how to operate the application.
    • This document should provide sufficient information to allow the instructor to set up and operate the application.
    • Identify any external system requirements
    • Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
    • Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.

Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment

computer forensic

 As a cyber investigator, you are investigating a group known as BLGRUS (Bootleggers R Us) that is allegedly posting your company’s music files without your permission.  Write a 2-3 page document on your plan to infiltrate their group (keep in mind their motivations to commit the offense), identify the users, send any legal documentation, and preserve evidence. 

Adding a Radius Server

 

In this lab you will be adding a Radius server for network security  that will prevent non-customers from tapping into your network by  requiring network authentication through a centralized network server  before a user can access your network. You will be continuing where you  left off with Unit 3 Graded Exercise: Cable/DSL ISP Network.

Download the graded exercise instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document. Save using the following file  naming convention YourFirst_LastName_U4_GE1.  Submit the document with  the screenshots using the upload instruction.  

Wk 2 Discussion 2

 Respond to the following in a minimum of 175 words:  

A CISO interacts with many different functional areas across the company, including marketing, sales, finance, and software engineering.

Research a management team job description you may not be familiar with, such as the head of marketing or the chief software engineer.

Describe the potential conflicts or difference of focus between the information security team and other teams, such as application development, networking, marketing, or finance, and how you would address those conflicts.