4s week 2 assignment EH 2

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas to explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Include references, no copy-paste strictly. Use your own words.

MIPs and C programming help

Hi, I need some urgent MIPS (Assembly Code Language) and C programming help. Anyone who is well versed with both, please message me and I shall send you the details. Thank You.

short answer

 Week 2 Discussion 

Four code block styles can be created using PHP: standard PHP script delimiter, the script element, short PHP script delimiters, and ASP-style script delimiters. Explain the purpose of each style and the main benefits each would provide for developing a website. Be sure to respond to at least one of your classmates’ posts.

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

mad discussion

  

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

fter reading the main articles this week, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Info security and risk management

NOTE: PLEASE REFER THE WORD DOCUMENT FOR COMPLETE ASSIGNMENT QUESTION AND FOLLOW THE INSTRUCTIONS GIVEN IN THE WORD DOCUMENT

Risk Management Plan Final Paper 10 pages APA format and Power point Presentation for 20 slides for the same paper.

NO PLAGIARISM.

Create a professional, well-developed report, titled, risk management plan that includes the combination of Task 1, 2, and 3 for given scenario in the attachment.

Scenario (Please refer the attached word doc for more details):

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

Develop and provide an introduction to the plan by explaining its purpose and importance.

Create an outline for the completed risk management plan.

Define the scope and boundaries of the plan.

Research and summarize compliance laws and regulations that pertain to the organization.

Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.

Develop a proposed schedule for the risk management planning process.

Create a professional report detailing the information above as an initial draft of the risk management plan.

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

Develop an introduction to the plan explaining its purpose and importance.

Create an outline for the RA plan.

Define the scope and boundaries for the RA plan.

Research and summarize RA approaches.

Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.

Create a professional report detailing the information above as an initial draft of the RA plan.

Project Part 1 Task 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan.

Risk Management Plan Final Presentation

Create a professional, well-developed report, titled, risk management plan that includes the combination of Task 1, 2, and 3

Submission points:

A section titled Introduction discussing the purpose of the plan. You must include details from the scenario, above, describing the environment.

A section titled Scope and Methodology discussing the scope and risk assessment methodology leverage for the development of the plan.

A section, titled Compliance Laws and Regulations. Using the information in the scenario provided above, discuss regulations and laws with which Health Network must comply.

A section, titled Risk Mitigation Plan & Timeline, that discusses the threats identified in the scenario and your proposed mitigations roadmap with timelines as well as any new threats.

A section, titled Roles and Responsibilities, that will discuss the different individuals and departments who will be responsible for risk management within the organization (this was presented in your textbook).

EH Week14 DB

 

Hello,

i need this paper by 12/10 afternoon.

Strictly No plagiarism please use your own words.

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Business ETHICS(PPT)

Main Topic name: Starbucks U.K. Tax Scandal (Case Study)

Sub topic: Case study Background- How did the ethical issue unfold and evolve. 

Need to prepare a PPT on this sub topic with 4-5 slides and 2 references in APA format. PPT should use graphics to convey key concepts and have in slide citations. We have to use the notes section of Powepoint to elaborate on key points.

paper-1

 The Case of Extreme Scientists. How would you describe the architecture Dr. Schadt uses to do his research? Discuss the advantages and disadvantages of Using Amazon for Dr. Schadt’s supercomputing needs. If you were advising a company trying to make a decision about using cloud computing for key business activities, what would you advise and why? Write a 1-2 page paper in APA format. An abstract is not required.  Two to three references are required.