Assignment Lab 6

 

Technology Acceptable Use Policy (AUP) 

FileName: AUP_YourLastName.docx

Upload the file for grading below

You are the owner of a new technology corporation, Acme Technology, LLC., and charged with the responsibility of writing new Acceptable Use Policy (AUP) for the organization.  Based upon  Week 6 readings of Chapters 16, 17, 18 and 19, write the text of the AUP that you propose.  Consider defining major the terms, stating organization policy related to the terms, stating organization penalties for violations, applicable state, and federal laws from which you derive the language.  (See Chapter 4 of the course materials)

You are writing this policy from scratch, please review the following three corporation’s (Amazon, Microsoft and Dell Corporations) samples of AUPs to assist in the process.  

Upon sucessful completion of the New AUP, Upload: AUP_YourLastName.docx for grading purposes.

Please NO PLAGIARISM

Need 1 and a half page 

Need it in APA FORMAT with References 

Diffie-Hellman Key Exchange

 

What is Diffie-Hellman key exchange algorithm, its use and protocol, and how it works?

Demonstrate your understanding with examples.

 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research Paper on Cloud Computing with in ERM

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

Week 6 Experience Portfolio

 

Hello,

i need this paper by 12/10 4pm.

Strictly No plagiarism please use your own words.

Length: Minimum of 600 words Create a portfolio related to work experience Network security and proxy related in IT. Submit a file that outlines any projects you have worked on as a student or professional that may influence a hiring manager or company to hire you.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism.

Wireless Networking

 

Draft a response to each of the questions below. After you have  posted your own response, make sure you go back through the discussion  and read the responses of your peers. Make sure you respond to at least  two of your peers’ posts and take the opportunity to ask questions and  share ideas. Your responses should again be detailed, thoughtful &  substantial. Use your textbook and other academic resources to justify  your responses.

  1. When did Wi-Fi become an official standard?  Who is the governing body?
  2. What are some of the different Wi-Fi standards?  How are they similar?  How are they different?
  3. How do we keep Wi-Fi, or wireless networks, secure?
  4. What are some different companies that offer wireless networking equipment?  Compare and contrast some of their equipment.  

737 Max 8 crashes

 

Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Automated tool for SQL Injection

 Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution.  Write in essay format not in outline, bulleted, numbered or other list format.  Use the five-paragraph format. Each paragraph must have at least five sentences. 

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Cite your sources in a clickable reference list at the end. 

Preview the document

Project Phase 4

 

Unit 4 Project Phase 4 Downloadable InstructionsPreview the document

Congratulations, you have set up a new network in a rural area that  will be serving a small neighborhood. Your network currently consist of 6  houses but is expected to grow to include all of the 500 houses in your  area. The only other network alternative to your system is satellite  networking which is very slow and prone to outages. You will be  providing both cable TV and internet access through your network so make  sure you are providing enough speed in your network for your customers.

Download the project instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document

cloud computing

 

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.