Mobile Security

 

Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.

Create a visual poster or infographic to display in the company’s break room.

Include the following information:

  • At least two mobile device threats
  • List of ideal mobile security settings to defend against threats
  • Brief instructions for setting up at least two security settings
  • An explanation on what happens mobile devices are not secured from these threats
  • Appropriate images and graphics
  • Two resources for more information on mobile security, with appropriate citations

IA 5

In 350 words .  Describe three authentication types and give an example of each.
 

Web security

  

Write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations? Would you change, add or delete any of these mentioned below?  Add additional criteria as you see necessary about creating good password security. 

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords such as common names, real words, numbers only

· require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old password before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Note- Copying without attribution or the use of spin-bot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

Discussion 5

This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.

IA week12 DB

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Research Paper

1.  

Submit a group research proposal and topic in the area of Access Control. 

Proposal Requirements:  #######################################################################################

Make sure to follow APA style. Please be certain that your submission is 1 page in length and meet the minimum APA formatting guidelines:

•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the topic by summarizing the issues in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

2. Research Paper: Please check requirements in the below document

3. Paper Presentation.

Assignment; Data: Simple Graphs in RStudio

 

Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types.

*****NOTE THIS IS A NEW DATASET AND HAS NEVER BEEN USED IN ANY CLASS*****

**You must use this dataset – there will be no option to resubmit if you do not use this dataset**

**You must include all the required screen shots displaying all the required information including the dataset name – there will be no option to resubmit if you do not include all the required screen shots with the required information***

Assignment:

The submission MUST include the screen captures of the multiple windows for each graph listed or 0 points will be earned

  • The windows are Code/or file contents, Console, Environment/Files (num observations and variables), Plots/Graphs

Graphs to Produce:

Pie Chart:

  • Create a pie chart of the computer ram
  • Label the RAM sizes for each amount of RAM discovered in the dataset formatted as 2GB, or 4GB, or 16GB, as examples 
  • Title the pie chart as “Computer Ram”
  • Color the pie chart using the rainbow option

Bar Plot:

  • Create a barplot of the computer screen sizes
  • Label the x axis as “Screen Sizes”
  • Label the y axis as “Frequency”
  • Title the barplot as “Computer Screen Sizes”
  • Color the bars in the barplot any color you wish.

Histogram:

  • Create a histogram of the computer prices
  • Label the x axis as “Prices”
  • Title the histogram as “Computer Prices”
  • Give the histogram any color you wish.

Box Plot:

  • Create a boxplot of the comparing the computer price and premium category
  • Label the y axis as “Price”
  • Label the x axis as “Premium”
  • Title the boxplot as “Premium Computer Prices Distribution”
  • Color the boxplot any color you wish.

Scatter Plot:

  • Create a scatter plot of computer price and hard drive size
  • Label the x axis as “Hard Drive Size”
  • Label the y axis as “Price”
  • Title the scatter plot as “Computer Price vs Hard Drive Size”
  • Color the scatter any color you wish.

Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Each graph created must be submitted as a screen capture in the Word document showing all windows as previously listed.  If all windows are not displayed 0 points will be earned. 

Homework 55

Instructions are in the attached file Week 5 Lab Assignment 

Attached below . 

Please follow APA and NO PLAGARISM Thanks 

Also attached Power Point Presentations 3 copies , they are Chapters 12, 13 and 15 

Dis 7 ITM

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.