- Discuss what performance management is and how it influences effective teams.
- Define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…). Please note at least five organizational activities and be specific when responding.
- Note at least two organizational capabilities and compare and contrast each.
Access Control – Security breaches can have serious consequences for an organization
Do a case analysis of any one of the cases presented in Chapter 5 in the textbook (Chapple et. al.), pages 105 to 107. Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector, or the Critical Infrastructure. Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:
• 12-pt, Times New Roman font
• Double-spaced
• 1” margins on all sides
• Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
• Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. Be sure to include at least three reference sources.
• In-text citations – Please include the author name and year of publication
Questions – File attached
Need 2 to 3 lines of answers for the questions in the file attached
Written Assignment 4
Describe the role of forms and their value in creating a VBA application. Create a simple form and include a screenshot in your journal, as well as a description of what it does.
· Prepare a quality, substantive journal post that addresses the objectives of the
assignment and the expectations set forth in the grading rubric.
· 300 words minimum is required.
· Use APA format – Refer to APA Style and the Online Writing Center resources
in Academic Resources for guidance on paper and citation formatting.
· Use at least two sources of credible evidence
Paper 8 for Jennifer
Please find the attachment for question
Week 2- Apply: Malware Attacks
Assignment Content
- Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, and/or diagrams; all of which make it easy to follow troubleshooting instructions.
Throughout the next four weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.
Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.
Include the following information:
- Details of the malware
- The exploited vulnerability and its attack vector
- Two risks of this malware
- Step-by-step instructions on how to resolve the malware attack
- Note: Numbered or bulleted steps/guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps/guidelines.
Cite at least two resources within the assignment in APA format.
Submit your assignment.
CC2
Consider, in 500 words or more, how cloud computing business processes as services can improve efficiency. This discussion is about the cloud computing business process as a service and security.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.
SQL injection vulnerabilities (Cyber Security)
- Injection attacks have stood at the top of the OWASP Top 10 for nearly a decade. Why do you think SQL injection vulnerabilities still exist? What procedures, policies, or practices do you think it will take to make them stop?
Research Paper on Forensics
After reading the articles of digital forensics techniques, please write a research paper that answers the following questions:
- What are mobile forensics and do you believe that they are different from computer forensics?
- What is the percentage of attacks on networks that come from mobile devices?
- What are challenges to mobile forensics?
- What are some mobile forensic tools?
- Should the analysis be different on iOS vs Android?
Your paper should meet the following requirements:
- Be approximately four pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.
I attached one paper, and you need to download some more papers in order to answer these questions.
Research paper
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
- User authentication and credentials with third-party applications
- 3 common security risks with ratings: low, medium or high
- Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.