Chapter Discussion

The political debate over Net Neutrality has been going on for many, many years now in this country against the backdrop of freedom of information vs. censorship.  Write an essay explaining a brief timeline of the controversy, who the stakeholders in the debate are, and what position they are taking in the controversy.  Explain whose position you support and why.  It is possible you will not agree with either point of view completely.  In that event, propose a compromise solution and explain why it is the better outcome of the debate.  Below are two short articles outlining the basic idea of the debate.  After reading them, research the topic in more depth and use facts or quotations from articles you find to support any conclusions you draw. You must reference at least two additional sources. 

cryptography and Network Security

I need the solutions for the 2 problems of this uploaded file. like;

 For the Protocols 1, 2, 3, and 4, given below, determine which of the following five security services are being implemented and which are not implemented. In each case, explain why. 

 Services: 

 C – Confidentiality, 

 AS – Authentication of the Sender, 

 AR – Authentication of the Receiver, 

 NS – Non-repudiation of the Sender, and 

 NR – Non-repudiation of the Receiver. 

The file uploaded has the whole 2 problem Questions

Cyber security planning and management

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

 There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/
https://www.techrepublic.com/

Access control – Week 7 Written Assignment 2

 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

Discussion 7

Define radio frequency identification (RFID) and near field communication (NFC) and explain the challenges and security considerations of RFID and NFC.

No Plagiarism need 200 words with references

Analyzing and Visualizing data

Identify at least 6 different scholarly research articles (only conferences or journal articles are allowed).

Review the articles and provide a 4 page summary ( not including cover page and references).  Highlight the Data visualization  tools that the work utilizes and how the data is interpreted.

Please ensure that your paper follow APA 7 guidelines.

Simulation Exercise 1

 

Simulation Exercise 1

EMA Workbench is an open software tool  that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their main website (not the GitHub download site). Then do the following:

1) Under documentation, go to the Tutorials page.

2) Read through the Simple Model (in your chosen environment), and the Mexican Flu example.

3) Decide how you could use this software to create a model to help in developing a policy for a Smart City.

Write a three-page paper and explain how you could use the EMA Workbench software to develop a model to help create a policy for a Smart City. Explain what policy you are trying to create (i.e. traffic light placement, surveillance camera coverage, taxi licenses issued, etc.), and what key features you would use in your model. Then, explain how EMA Workbench would help you. NOTE: keep your models and features simple. You do not really need more than 2 or 3 features to make your point here.

Simulation Exercise  Paper Requirement

1. Three pages long. The cover page and reference page NOT included. It is okay if your paper is more than 3 pages long.

2. Use Times New Roman font, size 12 and double-spaced.

3. Include a cover page and a reference page.

4. Use section headers for good readership.

5. Use figures and tables if needed (not mandatory).

6. Use APA for in-text citations and references.

Discussion week 3 infotech global

 

Question: Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages of this approach?  Is there another approach that might work better?

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • please cite properly in APA
  • Make an argument concerning the topic.
  • Your initial post must be at least 250 words 

No Plagirsam 

Week 8 Assignment 2 Create an ERD

 Week 8 Assignment 2 Create an ERD

Create an ERD

Preparation

In this assignment, you will be drawing an Entity Relationship Diagram (ERD) or Database Design Diagram. The following videos and documents will assist you:

Entity Relationship Diagram (ERD) Tutorial – Part 1.

Entity Relationship Diagram (ERD) Tutorial – Part 2.

Ultimate ER Diagram Tutorial (Entity Relationships Diagrams).

Scenario

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.

Instructions for the Database Design Diagram

Use any drawing package or any other application you know such as Visio, Word, PowerPoint, or another tool to create the Database Design Diagram. Otherwise, you may draw the diagram by hand with a pen and paper. If you draw the diagram by hand, then take one or more pictures of the diagram with your cell phone or laptop camera, place the images into a Word document, and submit the document. Otherwise, if you use software to create the Database Design Diagram, then take one or more screen captures of the diagram, place the screen captures into a Word document, and submit the document. Submissions that are not in .doc or .docx format will not be graded.

Include the following in the document:

Draw the entities of the database and the attributes of each entity, based on your research and/or common knowledge of a college and the information tracked by a college.

Create the appropriate relationships between each entity within the diagram.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

Draw a database design diagram that depicts the attributes and relationships of the entities.

Note: All Assignments must be submitted into Blackboard. The whole Assignment (e.g. Assignment 1, 2, and 3) which includes both required images and written portion must be submitted into “one” MS Word document. All images pasted/copied into the MS Word document must contain an image label as to what the image represents. Assignments not submitted into “one” MS Word document will not be graded. Students must apply labels to their Database individual screen shots for Assignment 3.

This Video will help you understand “Assignment Two’s” challenge:

Watch Media

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Institution Release Statement

Discussion 5

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.