Discussion

 

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Note* Use proper citations (APA) and references in your post. 

Answer the following questions

 

  1. Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
  2. Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
  3. Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
  4. Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
  5. Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.

Malware

10.1 What are three broad mechanisms that malware can use to propagate?

10.2 What are four broad categories of payloads that malware may carry?

10.3 What are typical phases of operation of a virus or worm?

10.4 What mechanisms can a virus use to conceal itself?

10.5 What is the difference between machine-executable and macro viruses?

10.6 What means can a worm use to access remote systems to propagate?

10.7 What is a “drive-by-download” and how does it differ from a worm?

10.8 What is a “logic bomb”?

10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10.10 List some of the different levels in a system that a rootkit may use.

10.11 Describe some malware countermeasure elements.

10.12 List three places malware mitigation mechanisms may be located.

10.13 Briefly describe the four generations of antivirus software.

10.14 How does behavior-blocking software work?

10.15 What is a distributed denial-of-service system?

Access Control Discussion

Evaluate a qualitative risk assessment framework versus a quantitative risk assessment framework with specific examples (e.g., FAIR, NIST, etc.).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

language

  questions will be over converting Binary, Octal, Hexadecimal, and Decimal, 2’s Complement and Boolean Logic.  

Project Team Lead

In 175 words or more imagine you are a project team leader and have been asked to develop a conversion and migration strategy. Create three conversion and migration tasks specific to a system implementation and discuss why those tasks are important for a successful implementation. 

Malware Protection Procedure Guide

  

Requirements:

  

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 3 pages

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

practical connection online

 

At UC, it is a priority that students are provided with strong educational programs and courses ( Enterprise Risk Management (ITS-835-02)that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).