discussion form

discuss the current methodologies used to secure wired and wireless networks via current firewall technologies and the potential exposures that currently exist

Research paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

connection assignment

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ Data Mining ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Discussion 4

After reading the articles this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Data science and Big data assignment 10

This week we discussed Bitcoin Economics.  For this week’s research paper, you need to search the Internet and explain the following:

1.  Why are some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency?  Compare and contrast this with other crypotcurrencies.    Your paper needs to identify two major companies that have adopted Bitcoin technology.

2.  Take a position, either 1) cryptocurrency is a fad that will fade, or 2) cryptocurrency is a legitimate representation of wealth that will persist and grow.  There are rigorous resources available on either side of the argument to lend credibility to your case.  Regardless of your choice, clearly state 2-3 factors succinctly.

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

discussion

 

“GPS Interaction and Cognitive Process”  Please respond to the following:

  • Imagine that you have been asked to design a GPS product that will have voice recognition and Bluetooth capability. Discuss and conceptualize a user interaction model. Predict two (2) problems that may arise in GPS products with voice recognition and Bluetooth capability. Recommend solutions for each of these issues.
  • Attention is one of the six cognition processes. When attention is applied to a design, the goal is to make it easier for the end user to quickly locate where he / she should type information on the computer or mobile device screen. Compare and contrast how the Google search engine and the Microsoft Bing search engine employ the attention cognition process. Provide your opinion as to which search engine better employs the attention cognition process and explain why.

discussion-2

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Cybersecurity

Cybersecurity careers are growing at a very fast rate. what brought you to this program. What do you hope to obtain from taking this course? Has anything you learned anything potentially made you think about opportunities in cybersecurity you may have not before?

EH 8

In 250-300 words
 

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.