Research Paper

 Instructions:

PICK ANY ONE THE ATTACHED SCENARIOS

You have two deliverables 10 to a 15-page research paper(APA FORMAT)  and a summarized Powerpoint presentation of 8 to 10 slides with notes

Discussion and assignment

Discussion :

 Data architecture and security must evolve in parallel, evaluate this statement and support your statements with a real-life example 

 Your response should be 250-300 words.  (APA FORMAT) 

Assignment :

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. 

This assignment should be in APA format and have to include at least two references. 300 words minimum

300 words

 

This week’s discussion centers around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not. Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.

Operations security

 

The economy is driven by data ~ Data sustains an organization’s business processes and enables it to deliver products and services. Stop the flow of data, and for many companies, business comes quickly to a halt.  Those who understand its value and have the ability to manage related risks will have a competitive advantage. No matter how well an organizations data is protected, eventually there will be a breach of security or a natural disaster.  Well prepared organizations create an incident response team (IRT). 

  • Why is there a significant difference between quality assurance & quality control?
  • Why does the relationship between QA/QC impact risk management?
  • Why are policies needed to govern data both in transit and at rest (not being used – accessed)?
  • What are some best practices YOU recommend in regards to incident response policies?
  • When an incident occurs, there are a number of options that can be pursued.  Which specific action(s) would YOU recommend when assets of a low value are being attacked?

Physical Security – individual project

When we think of ethics, we usually think of guidelines for differentiating between what is right and what is wrong. For example, consider the Golden Rule (“Do unto others as you would have them do unto you”) or the Hippocratic Oath (“First, do no harm”). We are exposed to ethical norms for behavior in many settings (home, school, church, etc.) and from an early age.

In this assignment, answer the following question 7-10 full pages, not including citations and title pages:

If ethical norms for behavior are so commonplace, and guidelines for ethical decision making are common sense, why must we consider the ethical implications of research in this course or any information technology class?

APA 6th Edition formate with in text citation

C++ Program

 Write a program to add two large integers (up to 300 digits each). One approach is to treat each number as a list, each of whose elements is a block of digits of that number. For example, the integer 179,534,672,198 might be stored with block[0] = 198, block[1] = 672, block[2]=534, block[3]=179. Then add the two lists element by element carrying from one element to the next as necessary. Query the user for two large integers and then add them using this method. 

Challenges to Policy-Making in Developing Countries and the Roles of Emerging Tools, Methods and Instruments

Weekly Chapter Discussions: Chapter 17 – Challenges to Policy-Making in Developing Countries and the Roles of Emerging Tools, Methods and Instruments

In the weekly Discussion tab in the course, the Professor and students interact to explore course concepts. For full credit, you are required to post on three different days (three-time each week) and follow the guidelines for the frequency and quality provided below. For your initial post, address the four sections below, and write NO more than 500 words. Your contributions should be in your own words; quote very sparingly. Be concise. All other contributions would be a reflection of the contributions of your classmates.  After your initial post, reply to the contributions by your classmates and follow the guidelines for the frequency and quality of your contributions. 

  • CHAPTER SUMMARY: Summarize chapter presented during the week. Identify the main point (as in “What’s your point?”), thesis, or conclusion of the key ideas presented in the chapter.
  • SUPPORT: Do research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the material presented in the textbook. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the chapter itself. 
  • EVALUATION: Apply the concepts from the appropriate chapter. Hint: Be sure to use specific terms and models directly from the textbook in analyzing the material presented and include the page in the citation.
  • SOURCES: Include citations with your sources. Use APA style citations and references. 

2 Individual Questions

Question 1:

Do some basic research on security certifications.  See https://www.giac.org/.  Write a brief summary of certifications that are open.  Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options. Write 200-300 words

Question 2: both are in a separate document 

 Final Project Name: Efficient Disaster Recovery 

1.  A brief abstract describing your final project. (200words) 

2.  Final Project Research paper. 700-1000 word, double spaced, written in APA format, showing sources, and a bibliography

Example:

How to Write an Abstract (https://www.scribbr.com/apa-style/apa-abstract/)

How to write a research paper (https://owl.purdue.edu/owl/purdue_owl.html)

cloud computing

 

Week 4 Discussion

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.