Security Architecture and Design

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references and 600 words.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Computer Science Final Presentation. Ciss 302.

This assignment will be submitted to Turnitin®.Instructions

Pick any Network you may find in your home, work or on the internet as an example for your case study.

Prepare a presentation and paper report around 10 pages that shows:

  • Introduction – that includes background and history
  • Network model presentation
  • What types of standard protocols and technologies has been used
  • Provide an example for 3 different protocols that are applied in different 3 network layers
  • Show your work citations

No grade if No presentation.

Database management systems Or DBMS (Network Security- Cybersecurity)

 A database management system is an application that provides users with the means to manipulate, analyze, and query data. Almost all DBMSs in existence today are developed to be used with relational databases.  Describe in a minimum 2-page essay (about 1,000 words, double spaced, APA format) a DBMS that you have dealt with at a company, or as a customer.  How was it used to help you access the data? 

Policy and legal_10

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Internet of things

I need help with my project the title is Internet of things 

I need paper with 10 pages 2 for the front & End and 8 for the project 

also I need a paper for the outline.

2 discussions and 1 case study and 1 weekly summary

Discussion 2.1 (Half Page with references)

From the lecture and from chapter 2 of the book, What are the types of hackers and what defines them? A hacker’s skills can range from the novice to the very experienced.  What differentiates a novice hacker versus a very experienced hacker?  What are the ways that a hacker can “perfect” their skills?  

Discussion 2.2 (Half page with references) 

From your book, What type of hacker is defined as an Unsophisticated Threat? 

Weekly Summary 2.1 ( 1 page with references)

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

This is not to be a book review, This is a personal capture of your views on the lecture and the course of study.

Case Study 2.1 (3-4 Pages)

Conduct research on one of the following attacks (Clop Ransomware, Zeus Gameover, Ransomeware as a Service, Fleeceware, Internet of Things Device Attacks, Cryptojacking, or Artificial Intelligence (AI) Attacks). In a 3 to 4 page paper (not including title and reference pages) provide a brief synopsis of the attack. Use what you’ve learned in the first 3 chapters of the course.  Some information that should be included in your paper is, the type of attack, why the attack occurred, and who conducted the attack. Be sure to cite your sources and follow APA formatting. Some sources for the attacks can be found by doing online research. 

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • At least 3-4 peer-reviewed sources that are properly cited and referenced
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

BOTH BOOK AND LECTURES NOTES FROM PROFESSOR ATTACHED PLEASE GO THROUGH IT ….

Translating a Scholarly Article in Your Field of Study for a Public Audience

  

The goal of this assignment is to “translate” or rewrite a scholarly article written about a current topic in your academic discipline for an educated public audience. Your purpose is to make the findings in that article comprehensible and relevant to an educated, non-expert reader.

so i just want to let you know about few things, so the documents engh 302 is the instructions and discipline project is rubrics, which shows how to get full points

now sidhuex4 is my first research conducted on the paper where i choose a topic and found an article which i want to translate

it also has a feedback by the teacher at the end of the document

and the document two articles is the articles i found supporting the main article

if you have any questions please let me know, if something confuses you shoot me a message and i will try to explain it

Need to write this in view point of a software developer, what are your plans and how you are going accomplished it. Following the given guidelines

  

For this assignment, you are asked to reflect on how the technical, team and development process impacts your career interests and goals.  The paper should be double-spaced and between 4-5 pages (assuming a 12-point font), with the following sections: 

Note: Please follow the points and explain according to that( in the view point of programmer the essay should be related to technologies, programming language)

1. Introduction

Where you introduce yourself and what your career goal and interests are.  Try to be specific but naming compainies is not needed. 

—Computer science major who has interest more in developing software and familiar languages like c++programming, python, learing new framework,. 

—Goal is to develop apps like which make people life easier and time saving.

2. Technical Concepts

1. This is where you can talk about what technologies you interest you in further working with, that you need to learn more about, etc. as you look ahead to your career.  It does not have to be specific languages (though it can be), but it can also be frameworks, tools, platforms, etc.

—-Technologies : learing azure , what improvement and learning is necessary framework django

3. Teamwork

1. This is where you talk about how working in teams in terms of communication, project management, etc.

— how is communication and leadership skills

4. Software Development Concepts

This is where you talk about the activities and concepts you related to software development such as the overall process model (e.g. Iterative, Agile) or specific activities like Design or Testing.

— design process model example- waterfall model, iterative model– process to develop to app

5. Conclusion

1. Use this section to tie your reflection in the above areas together.

n Conclude overall and how excited and developing skills are helpful for future