Concert Report 1!!!!!!

 Concert Report 1 should be a critique of the National Symphony Orchestra Concert on May 30, 2019. (The concert is not 2 hours and 4 minutes long.  

Gianandrea Noseda, conductor

Francesco Piemontesi, piano

Program

Respighi: Ancient Airs and Dances – Suite No. 2

Rachmaninoff: Rhapsody on a Theme of Paganini

Casella: Symphony No. 2

Paper Details:

  1. Length of Papers: 2-4 pages only. 5 points will be deducted from the total score if the paper is less than two full pages or more than 4 full pages. A standard concert report should include separate paragraphs for the following: an introduction, a paragraph to describe each piece of music (or each movement in a piece of music performed), and a conclusion. Most reports will include a total of 5-10 complete paragraphs depending on the lengths of the paragraphs. 

Testing Project Proposal Paper on Reconnaissance Phase

Reconnaissance project need help to get done. Below is the project requirement. USA 

  • Prepare a business case justifying the need for a penetration test. Remember, the project manager is usually NOT excited about the test and is only doing it to check a box. Make sure they are aware of why it is necessary, and what benefits it brings them. In this business case, be sure to include why Penetration Testing is important from the business perspective, not just the security perspective.
  • Develop a project timeline. Use project management software such as Microsoft Project, Zoho Projects, Team Gantt, or any other similar piece of software to develop a Gantt Chart showing the timeline. This project is due to take 5 weeks (Weeks 2-6 of our course).
  • Define what deliverables the organization can expect from you. At what points in your timeline can they be expected (be sure to include these in your timeline above!), and what will they contain?
  • Discuss the difference between active and passive information gathering. What activities are conducted in each type of information gathering?
  • Discuss what OSINT is and what kinds of tasks it entails.

Paper Requirements:

  • Written Communication: Write in a professional manner using APA 6th Edition and formatting with correct grammar, usage, and mechanics.
  • Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…).
  • APA Formatting: Resources and citations are formatted according to APA 6th Edition.
  • Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
  • Font and font-size: Times New Roman 12pt, double spaced

 

Resources:

W9:D

  

This week we discuss each of the different roles that people play in the design, development, and use of information systems.  Please also explain the importance of where the information systems function is placed and the various types of users of information systems.

Write 3 different independent scenarios for the above topic. The main scenario needs to be 300-350 (from the text books provided) words and the other 2 for 200-250 words. This submission should be between 750 and 850 words (The word count does not include the title and reference page). Deductions will apply if the word count is not observed. 

ETCM DISCUSSION-1

Topic:  After reviewing 1 and 2 Chapters in below text book, Describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data?

Discussion should be between 250-to-300 words. 

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

Make sure APA format, citation are very key.

Time: 36 hours

Text Book:  https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/4837883?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27%2528ISC%2529%25C2%25B2%2520CISSP%2520Certified%2520Information%2520Systems%2520Security%2520Professional%2520Official%2520Study%2520Guide%2520%2528%2520PDFDrive.com%2520%2529%25282%2529.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200823T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200823%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=7fff08a758bea1467da136f30e8b64c079c4bc1827f611839a08ecc614ad4b9f 

 

Policy, Legal, Ethics and Cmplc

 

Research Project Proposal

The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. Do not zip your submission.

Respond helpfully to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Wtite to help them focus and say something that you think would help them say something that would be valuable.    You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested

Caesar Cypher

Analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Minimum 350words. 

Also need 4- 5 lines two different opinions on Caesar Cypher . 

Page 92-94 in attached reference

bharg research paper

 

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use  Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

one and half page excluding citations

 Topic:

MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used.  What is the difference between a one way hash value and other cryptographic functions? Why is a “salt” important?