assignment

 

Students will be required to create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words

  • A case study assessing risk and proposing security for some chosen organization (real).
  • Review of a security incident or threat, describing it in-depth and proposing a controls for future use
  • Technology review, reviewing some security product or control technology
  • Survey of technology, theory, or practice building on and expanding some topic covered

Paper

 

Do your research on statistical  research methods and choose one article that used statistical qualitative research method. Review the article and write a report following  the steps below:

Your report paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Scholarly articles can be found in the Online Library, in databases such as JSTOR or ProQuest. At least the article must be peer-reviewed, full-text article that used quantitative research methods from scholarly journals.

Note: When reading an article use the PECO to analyze the paper:

  • P – Population being study, techniques used in the paper
  • E – Exposure (what)
  • C – Control(how)
  • O- outcome

Scoring Rubric:

  1. The research paper used qualitative statistical methods to addressed the problems —20/20
  2. The paper is 3 to 5 pages excluding the cover page and references pages—-10/10
  3. The paper is APA formatted——10/10

Be clear with well-written, concise, using excellent grammar and style techniques.—-10/10

Develop React JS view

1. Create​ ​a​ ​simple​ ​view​ ​that​ ​will​ ​get​ ​all​ ​the​ ​latest​ ​tweets​ ​about​ ​something

2. Create​ ​a​ ​simple​ ​view​ ​that​ ​will​ ​get​ ​all​ ​the​ ​latest​ ​tweets​ ​about​ ​something 

3. Add​ ​a​ ​button​ ​that​ ​will​ ​update​ ​the​ ​state​ ​of​ ​the​ ​app​ ​to​ ​switch​ ​the​ ​view​ ​from​ ​one​ ​to​ ​the​ ​other

Final Research Paper

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

5s week 3 assignment PL

 Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

No copy paste strictly, plagiarism results in course termination.

Practical Connection Assignment

Provide a 1200 word minimum reflection about how the course Introduction to Blockchain & Cryptocurrencies connects to your job Web Development.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Need residency project with PPT

 

Power Point Presentation

  • 10 – 15 slides total (does not include title or summary slide)
  • Try using the 6×6 rule to keep your content concise and clean looking. The 6×6 rule means a maximum of six bullet points per slide and six words per bullet point
  • Keep the colors simple
  • Use charts where applicable
  • Use notes section of slide
  • Include transitions
  • Include use of graphics / animations

———————————————————————————————————————-

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability. Your residency project will include research & analysis on the below:

Write a twelve to fifteen (12 – 15) page paper in which you:

  • For leaders, implementing security policies is all about working through others to gain their support and adhere to the policies. Discuss widely accepted leadership rules which apply to security policies.
  • Discuss the importance of creating an IT security framework that aligns with organizational goals.
  • Compare & Contrast access control in relations to risk, threat and vulnerability.
  • Identify and discuss two – three information security policy implementation issues & their recommended resolution(s).
  • Explain the relationship between access control and its impact on an organizations security procedures & policies.
  • Discuss quality control vs quality assurance.
  • Discuss the ways in which a “good” policy can reduce the likelihood of risk occurring or reduce its impact.
  • Describe access control and its level of importance within operations security.
  • Argue the need for organizations to implement access controls in relations to the: awareness principle, accountability principle, ethics principle and timeliness principle.
  • Describe the necessary components within an organization’s IT security policy.

Your assignment must follow these formatting requirements:

  • Use at least ten – fifteen (10 – 15) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.
  • The cover page and the reference page are NOT included in the required assignment page length.

Acme Enterprise Scenario Residency Week

  

Acme Enterprise is a private company that is gearing up for an initial public offering (IPO). Prior to going public Acme must be in compliance with: GDPR, PCI DSS, and SOX. Acme is in the water purification business with new technologies that purify water in any form whether it is sewage, ocean, lake etc. 

Part of its IPO process is to show due diligence and due care. Acme has identified your team to conduct a risk assessment and analysis of its information technology infrastructure to uncover any threats and exposures and provide mitigations and controls to reduce those uncovered threat/exposures, so it can have a successful IPO. 

Using the Network Infrastructure design of the Acme Enterprise you are to assess risk of Acme’s:

1. Perimeter Security

2. Network Security

3. Endpoint Security

4. Application Security

5. Data Security

6. Operations

7. Policy Management