Discussion and assignment

Assignment :

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

Discussion:

 

As you meeting with a client, What are the top 3 technical skills that qualify as an assessor to perform a professional information security assessment? explain with examples 
Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Digital/Computer Forensics

 

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

Please read question in comment section

Need to 20 slides on Face book inc 

Mission statement.

Company strategy

Implementation projects

External industry environmental factors

External scanning (political and economic issues)

recent investment in India 5.6 billion dollars

Endless Running Games: Temple Run 2 – Fall Jungle Update!

Run or Die! So hurry!! 

Continue the endless-running journey with Professor Jones in Temple Run 2

The temple was at one time on the ground; an ancient civilization built the temple but they were killed by a disease. 

The leader of the civilization was spared by a remedy, but because he didn’t die, the potion turned him into the large demon monkey that chases you from the temple. 

As time passed, the temple remained unfound until the gems that were placed all over the huge temple were suddenly charged by an unknown source of power. 

Your mission this time is to escape from the demonic forest along with the spoils is “the cursed god statue” – which you stole from a mysterious temple. 

Remember, the Devils are still hunting for you! 

Download Temple Run 2 new version.

Use arrow keys to control in this game.

Tips and Tricks: You can turn the sound on/off on the game screen and play this game in fullscreen mode.

Discussion

 
Students are required to create a portfolio related to an Ecommerce Organization. You can select any type of Ecommerce based Organization. Provide organization background, architectural landscape and products or services being sold. Develop your balanced portfolio as per instructions below. 

The Presentation

 

Congratulations. Your project has been staffed and you are about  to meet with the team for the first time. Initial impressions are important and you’ll need visuals for your presentation. Create a slide  show (in PowerPoint or similar software) in which you address the  following, in this order:

  1. Goals: What the project hopes to accomplish.
  2. Critical Success Factors: Identify at least four different stakeholders; for each, list at least two things that the stakeholder requires in order to deem the project successful.
  3. Acquisition strategy: Should the system be built in house,  created by a contractor, purchased off the shelf and customized, or leased as a service? Explain your rationale.
  4. Resources: For in-house development, what people and skills  are required and what development life cycle do you recommend?  Otherwise, identify three candidate organizations that can deliver the  system.
  5. System functions: In a table format, summarize the types of users for the system; the business reason(s) each would use the system;  the ways that the system supports each of these needs and how this  support differs from the current system.
  6. Connectivity: Provide a diagram that shows how the system will connect to the other information systems and what data flows among them.
  7. Security: List the most serious cybersecurity threats and vulnerabilities of the new system. Suggest strategies to address them.
  8. Mobility: Identify the system’s capabilities for mobile use. Include a title and summary slide.

Use one slide for each of the preceding eight points.

Include speaker notes or audio narration that explains each slide more fully.

Discussion with 250 words

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. 

what is an IoT and Explain its features

 Our IoT definition: a network of connected devices with 1) unique identifiers in the form of an IP address which 2) have embedded technologies or are equipped with technologies that enable them to sense, gather data and communicate about the environment in which they reside and/or themselves. 

 

Features of IOT

The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some of them are listed below:

Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi-directional communication.

Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system.

Integrating: IoT integrating the various models to improve the user experience as well.

Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer.

Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment.

Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other.

Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management.