Discussion Week 5 ERM

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Web Development Help

I have a web project in HTML & CSS but It has some issues which I need some help in fixing. The project is complete so it is just a minor fix. 

Home work 3

 

Each student will conduct a search  online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relates to the concept: Emotional Intelligence. Your submission must include the following information in the following format:

Key Terms:

  •  Emotional Intelligence

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

 

HUGE HINT for Journal Article Review Analysis Sections. READ THIS NOW! 

You should incorporate these topics into your analysis section. If you do, then the chances of earning a high grade are GREATLY increased, in fact, this is the FIRST thing I look for when grading your papers. 

1. Explain why you selected this particular article among all the articles you could have chosen on your selected term.

2. Explain why you agree or disagree with the author’s key positions in the article. 

3. Explain how the article was easy or difficult to understand and why? 

4. What did the author do well in your opinion? Explain.

5. Describe what you believe the author could have done better in your opinion?

6. What else should the author have included in the article and would the article benefit from a different perspective (such as from a different nationality or different industry or experience perspective). Explain. 

7. What other sources or methods could the author have used to improve the research in the article?  (Hint: look up the types of qualitative and types of quantitative research methods). 

8. What information / in-depth study / or further research should the author focus on as a follow up to this article and why? 

9. Explain what audience would gain the most benefit from your selected article and how they could apply it in their professional lives. 

10. What did you personally gain from this article and how has it shaped your thinking on the topic?  

11. What are the conflicting or alternative viewpoints of the author’s position? Or  What additional research backs up and confirms or adds to the author’s position?  (Hint: this will require you to find another peer-reviewed article that challenges, confirms, or adds to, or provides a different perspective to your chosen article.)

Next,  I look for the summary, writing quality, and formatting. 

I am typically very lenient on the writing because I am more focused on your content, but I will also point out how the paper could be better written. I only heavily penalize poorly written papers when there are excessive writing problems.

Why do I grade papers in this class this way?  

One of the key differences in a Bachelor’s vs Master’s level is critical thinking. Bachelor’s level basically challenges direct knowledge and recall of information. The Master’s level is more about analysis and critical thinking and defending your position in a scholarly way. The analysis section of these papers is your opportunity to exercise critical thinking (that’s why I call this portion of your papers critiques). 

Recalling or simply explaining the journal articles is a bachelor’s level task. When I see this in your papers I give the paper an automatic C. If the paper is poorly written it also gets an F. 

To get a B or an A – you must provide a critique of the paper and the author and how well the author did and what you think of the article. The questions listed above do this properly.  

I do not want to read your version of the journal article. I may as well read the journal article for myself.  Just briefly describe the article in your summary section  – but the analysis section is where you put in your personal critique – in other words, address the questions listed above and even add in additional thoughts based on your own creativity. 

Assessment

inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Attached  Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

Java – Process Synchronization

In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data. 

Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5. 

Information Sec System

  

At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that 

1. Users are authenticated with password-based method

a. discuss the method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification– 

a. discuss the potential method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

3. Compare both password and biometric based method in terms of advantages and disadvantages.

PhD Dissertation

Choose A topic
 Identify a topic. What is the problem you want to address (must come from the literature and be cited). Who are saying there are problems? What has been done so far about the problem? Locate peer-reviewed articles related to your topic. What was the research questions in the studies? What findings were reported? Identify a gap in literature to justify your research. What is the purpose of your proposed study (be specific and clear)? What is the population you would like to address? What methodology are you planning on using? i.e. quantitative or qualitative? 

 Compare common methods to find which is most successsful in reducing the prevalence of social engineering.  Why: “The development and implementation of robust counter…….. Kaabouch, 2019). What:  What is the question you are looking to answer? Which is most successful? 

 Which measures are you wanting to compare?

​ How: Address how you will answer this? By doing what? Gathering what data