Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Discussion

In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future. 

Contingency Planning

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Need Response 2 to below discussion

please provide the two responses in 75 to 100 words for below discussion posts

Post#1

 COLLAPSE

Nowadays internet is growing very fast and more collaboration services are added to the internet like online payment, online data storage, social apps, and many more so everybody from the home user to a big organization is looking for secure data storage because cyber threats are growing increasingly. Cybercriminals plan strategies for data tempting by accessing the company’s private network after that asks money to save the organizational data, also this is not with a single company, but it is with any home user to any organization. “Although almost all cloud vendors claim that their clouds are safe, security concerns are still raised widely among cloud users” (Chen, Sharieh & Blainey, 2018). To Save from this hassle a business owner can devise the SECaaS i.e. Security as a Service.

SECaaS is based on cloud base platform where a user can save its all data over the cloud and can access it from anywhere in the world, also it is more secured than other platforms like to save locally. Nowadays CIO and CTO of the organizations having the preference for security as a service because of many reasons like cost-effective, easy to use, protection against new threats, Auto-updates and customizations, and many more. “Driven by the advances in sensing, processing, storage, and cloud technologies, sensor deployments are pervasive, and thus an increasing amount of information is available to devices in the Internet of Things (IoT)” (Chen & Zhu,2017). Some of them we will discuss below:

Cost-Effective: There is no special manpower is required to move data from one server to another and vice versa also it saves time as well while doing movement of data.

Ease of Use: There is no specialized training is required for any home user to any organizational IT also it is available to access instantly.

Save from latest cyber threats: As it is always up to date so a business owner can be stress-free as it can tackle to latest cyber threats as well.

Disaster Management: In event of a disaster your data will be saved on the cloud and security as a service ensures the same.

User Authentication & Encryption: This service is based on user authentication with the user’s password for access the data saved is encrypted as well. There are several reasons to choose security as a service.

Flexibility: These offer the particular service you want to choose for your organization instead of a whole package.

Availability: Your data is available 24x7x365 days without any issues. “In the Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on-premise security solutions” (Sharma, Dhote, & Potey, 2016).

Report:- SECaaS is having the reporting management where you can check the significant security events, attack logs, and other significant data.

TCO:- Total cost of ownership helps to share the results between the traditional following method and new platform i.e. security as a service. Also along with this user can same the time by accessing the content even the user is sitting in any part of the world and last you will find the lower TCO while adapting SECaaS.

Post#2

 

“Security as a service (SECaaS) is an outsourced service wherein an outside company handles and manages your security”. (Brook, 2018). In the fundamental way, using anti-virus sound over the Internet is the best definition of security as a service. Security as a service no more offers security solutions centrally, where the IT department installs the virus detection software, spam filtering software and other security tools on each computer or network or server, upgrades the software or advises us to use it. The old way to do it is pricey as well. Hardware expenses and licensing costs continue to allow us to use the app. Instead, security as a service helps us to use only a web browser tool to make it direct and cost-effective.

For certain businesses, the security competence deficit is an urgent challenge and in-house protection practitioners have to be able to take their time on the most important business activities. By defining tasks that SECaaS or managed security services (MSS) suppliers can handle, such as program setup, repair, and disaster recovery, companies can prioritize their available time and resources.

In the past, the dominant assumption was that protection could be triggered and left to work, so a big security force wasn’t really necessary. But with the growth of the danger scene and the acceptance of cybersecurity as a continuously evolving war against ever more advanced cyber criminals, this mentality has changed. Companies need to determine whether they need to recruit more protection practitioners-a battle in a very competitive and skilful industry-or whether they need technologies and services. (Byrne, 2018).

Security as a service has many advantages. The most evident is that it includes a web interface to administer the business. It supports ongoing updates and helps outsource manual functions, such as log management. The need for expensive technology consultants and researchers may also be bypassed by using a cloud based security product. SECaaS providers are heavily dependent on their on-going defense and records are continually updated to provide up-to – date security coverage. This also eliminates the problem, instead of integrating all elements into a management scheme, that of providing different infrastructures. Yet SECaaS provides far more security experience, in addition to being an effective means of saving money and time than normally possible within an enterprise. (Panda, 2016).

The use of security as a service has many benefits. Those are:

1. People are working with the most updated and best available security software. To be accurate and useful, anti-virus software must work with the current descriptions of the virus so that risks can be stuffed out and with the latest. People always use software that have the newest risks and options modified with security as a service. This does not mean that the customers should not upgrade their anti-virus software and keep other applications up to date and make sure we use the new security updates. The same is true with email filtering upgrade and repair.

2. We have the right protection staff to work with us. IT security professionals are at our service and may have more expertise and ability than anyone on our IT squad.

3. Faster production. The beauty of the services is that we are able to provide our customers with immediate access to these resources. On request, SECaaS deals are presented so that we can measure up or down as desired and do so with agility and speed.

4. Employees should concentrate on the organisation’s most critical issues. Using a web interface or a management dashboard, it’s easier to administer and regulate our own IT team ‘s security processes in our business.

5. Allows management in-house smoother. It is not enough to keep data secure if we have secured data. We should be mindful whether a customer accesses this information when he or she has no clear business intent.

6. Cost reductions. No hardware or software licensing needs to be purchased or paid for. Instead, it is possible to substitute upfront capital at a discount rate relative to upside costs with contingent operating expenses.

7. Protection against cyber-attacks and threats. Hackers are actively designing ransomware and cyberattacking tactics. With cyber security professionals developing strategies for existing cyber challenges, cyber criminals are increasingly designing new and creative ways to escape detection and penetrate business networks effectively in stealing their data. Therefore, good cyber defense strategies should be good at adapting not only to the current established cyber threats; they should also be able to detect and counteract new threats and emerging threats. We are not only shielded from current threats by outsourcing to an SECaaS provider; we are also protected from new threats. The security company works to be completely mindful of any new risks to cybersecurity. Our provider also guarantees the complete configuration of the network security system to defend against novel cyber-attacks. (Elliott,2020).

Task6

Topic 1:   List and briefly define the key attributes of cognitive computing.

Topic 2 :  How does cognitive computing differ from ordinary AI techniques?   

Note:The work must be formatted with the APA 6th edition style (double spaced and references indented accordingly). 

All citations and references must be in the hanging indent format with the first line flush to the left margin and all other lines indented.

You need to cite your sources in your discussion post both in-text and in a references section. Minimum 500 -600 words. NO PLAGIARISM.

Discussion Topic-3

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used.

A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

600 Words Initial post with at least 2 scholarly references and In-text citation.

Comment 1: 150 words with at least 1 scholarly reference and In-text citation.

Comment 2: 150 words with at least 1 scholarly reference and In-text citation.

*** Please attach the grammarly score screenshot in the end of the document.

Information Governance Week -3 Discussion

 

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.  Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective. 

For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.

500 words and Research Paper (Check attachment)

Article

Topic: VEEM and Blockchain Technologies Transforming Global Marketing.

 Write 4-5 page paper & accompanied 8-12 slide power point.

  • Paper: Must be APA format, 12 pt font, Times New Roman, with title page and references page. Minimum 2-3 references. Title page and References page do NOT count towards minimum.
  • Power Point: Is a summary presentation overview of paper, with additional charts/graphs to help demonstrate your insights on the topic.  Any template is fine to use.

 

Answer the following questions in your paper and power point.

1) Define how VEEM and Blockchain is expanding the global marketing efforts of companies

2) In your company of choice, who are they, are how do you think they use Blockchain and VEEM technologies to operate their digital marketing efforts?

3) How does this company use those technologies to expand globally their marketing efforts?

4) What challenges do companies in general face when it comes to implementing these technologies for their marketing efforts?

5) What forward thinking 1-2 key strategies do you think this company and their industry can implement to be competitive in the global marketing landscape?

You can use magazines, company websites, journals, news articles, interviews etc, to research and uncover your information.  There is no exact right or wrong answer to the questions on the strategies and challenges you think face that company and their industry, as long as your supportive research supports your thoughts. Looking for more what you think based on the research conducted. 

Week#1 Discussion

 

After reading the article this week, and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

wk3_dis 632

 

  1. Provide the title of your term paper (note: you may change the wording in the official title in the final version however, you cannot change the topic once you select one)
  2. Include an introduction on the topic
  3. A minimum of 3-5 references in proper APA format