Residency Power Point Presentation

 Operations security – PPT should cover below questions (chapter 1 to 6)

Compare & Contrast access control in relations to risk, threat and vulnerability.

  1. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. 
  2. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  3. Describe access control and its level of importance within operations security.
  4. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  5. Describe the necessary components within an organization’s access control metric.

Power Point Presentation

  • 7 – 10 slides total (does not include title or summary slide)
  • Try using the 6×6 rule to keep your content concise and clean looking. The 6×6 rule means a maximum of six bullet points per slide and six words per bullet point
  • Keep the colors simple
  • Use charts where applicable
  • Use notes section of slide
  • Include transitions 
  • Include use of graphics / animations

Data Science and Big Data

 

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Growth of digital retail sector

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are new in the market, note what you think they would have to do to obtain market share based on what you’ve learned this week.
    1. In response specifically list at least three key factors that would influence the success of the digital retail company, please be specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

The paper should meet the following requirements:

· 5-7 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Information Governance discussion 5

Chapter 14 – From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. 

Q2: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

Chapter 13 – According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis.  When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).  

Q1: Please identify and clearly state what the difference is? 

Response

 

Two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

EH 6 Pap

 In 250 words. ‘Ping sweep tool’,  Explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up 

Computer Science

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology.

Please use APA throughout. 

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count)

exercise work (Cryptography)

  

Crypto Security Architecture Exercise

Scenario

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company. 

You’re assigned this crypto architecture project.

Configuration

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet. 

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

All databases use MySQL and are currently not secured.

Constraints

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

Specific Tasking

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

  1. Describe in detail what new cryptographic      systems you are going to propose, how they work, and how they will enhance      security. Be specific about these      systems weaknesses and how you plan to compensate for the weaknesses.
  2. Describe and explain the impact the new      cryptographic security architecture will have on the current security      features and how this impact will be mitigated.
  3. What new issues will arise as a result of      implementing the new cryptographic solutions and what are the arguments on      either side of these issues?
  4. Show a clear and detailed understanding of      the existing encryption being used such as passwords, and operating      encryption features not being used and whether you plan to use these or      not, and if not why not.
  5. How well will all these new cryptographic      features work together?  Identify      any areas of concern, and how you propose to resolve conflicts and issues.
  6. What if any current security features can      be eliminated cost effectively by the new crypto architecture?