Discussion

 1. Discussion

Write 400–600 words that respond to the following questions:  

  • Explain how can we use Hash function to ensure the security of online communication?
  • How can we use Hash functions for intrusion and virus detections?
  • Provide real life examples support your initial post.

distributed systems

  

a) Briefly differentiate between lazy and (immediate) eager update propagation. How can they be compared to delayed-write and write-through policy in implementation? Which situations would they be good? 

Journal 2

  In chapter 4, the author describes four types of costs that blockchain technology can reduce. Which of the four cost types, if reduced through blockchain technology, would most impact the organization for which you currently work?  What would be the most visible impact on your job role? How could you minimize any negative impact? and also ask three questions to students.  

Journal (Original Post) Structure:

Title

Introduction

Content

Conclusion

Reference list

Please follow the instructions APA Format.

Ethical Hacking

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Disk Image

Your spouse works at a middle school and reports rumors of a teacher, Zane Wilkins, molesting some students and taking illicit pictures of them. Zane allegedly viewed these pictures in his office. Your spouse wants you to take a disk image of Zane’s computer and find out whether the rumors are true. Write a report outlining how you would tell your spouse and school administrators to proceed. Also, explain why walking into Zane’s office to acquire a disk image wouldn’t preserve the integrity of the evidence.

8 pages article about artificial intelligence and business

The theme is Artificial Intelligence (AI) and Business. For this assignment, you must think about the future of business, considering current trends toward automation of business processes. You must research current trends and summarize your research as a report. Also the structure of this assignment has been attached.

10

Using Chapter 10 topics as a reference(File identification, Metadata, Data hiding places), explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Research Papers

First & Second Question:

Topic is Cybersecurity and Data Management.

Need Qualitative and Quantitative Research Paper. (5 pages each which is total 10 pages)

Use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? 
  • References 

Third Question:

Look at some of the frameworks that are used to manage risk within organizations and enterprises. As with anything, there are going to be strengths and weaknesses to all approaches.

Address the following in a properly formatted research paper:

  1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization· 
  2. Are there other frameworks mentioned has been discussed in the article that might be more effective?
  3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  1. 4.5 pages in length, not including the required cover page and reference page.
  2. Follow APA 7 guidelines. Paper should include an introduction, a body with fully developed content, and a conclusion.
  3. Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations.
  4. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

MatLab Project

I have a MatLab project I provided the entire project I only need Exercise 6 done (not the entire project). I highlighted the section that needs to be done as well. Please look over the entire project to see how exercise 6 fit in with the entire project. This project is due project on Sep 27.