Discussion 10

 

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

Write a Java programme

 1. Write a Java programme that will be used as a school finance system.

2.  

Write a program to print the area of a rectangle by creating a class named ‘Area’ having two methods. First method named as ‘setDim’ takes length and breadth of rectangle as parameters and the second method named as ‘getArea’ returns the area of the rectangle. Length and breadth of rectangle are entered through keyboard.

3. Write a program that would print the information (name, year of joining, salary, address) of three employees by creating a class named ‘Employee’. The output should be as follows:

 

Name        Year of joining        Address
Robert            1994                64C- WallsStreat
Sam                2000                68D- WallsStreat
John                1999                26B- WallsStreat

cup-2-a

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. 

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

Assignment #020

elect a company that has violated an HR law.
Imagine that you are an HR manager within that organization. You have been tasked with developing training to help prevent future violations of the HR law. 
Compile research and information to include in your training. 
Address the following in 900 words from your research:
Summarize the situation, explaining key HR law considerations should take place and the impact on the organization by explaining objective details.
Discuss the law’s requirements. Include information regarding what the law does, how it is executed, and the execution gaps of your selected organization.
Recommend three steps that organizational leadership should take in order to avoid challenges such as this one from happening in the future.
Cite your sources with APA formatting. Provide at least two terms, or concepts or best practices per page; Provide at least two citations per page; Provide two peer-reviewed references from the weekly reading only, that support citation.

400 words 2 reference

 

1.Describe the processes needed for maintaining and updating policies and standards

2. Describe one security principle in which YOU think policy writers should keep in mind when developing security policies.  Why is this specific principle important?

JA1 Business ethics

  1. How would you personally define ethics?
  2. How do business ethics differ from your personal ethics?
  3. What is the biggest influence on your personal ethics? Why?
  4. Do you try to always be ethical? Why or why not?
  5. Do you think you have a high personal standard?
  6. Do you know an adult that has lied, cheated, or stolen anything? How might an adult justify this type of behavior?

Requirements:

  • Answer each question not less than 100 words.
  • Include the list of references used.
  • Avoid Plagiarism.

Computation

 

Suponga que Ud. tiene una oficina consultora en ese campo de especialización.
Utilice alguna de las plantillas que Excel proporciona para personalizar una hoja de trabajo que sirva como factura a un cliente; asegúrese de incluir el logo de su compañía. Use los recursos de edición de Excel para producir un documento profesional.