Ethical hacking

 

For this week’s discussion, please identify a latest technological development associated with your research topic.

Provide a link to an appropriate resource (news or journal article) that highlights this technological development and discuss how it might impact your research topic.

Research repot

Please check the attached documents and select one topic and follow the guidelines, there is a draft to follow.

Discussion

 

Information technology security policies are the foundation upon which an organization builds good security habits.  IT security policies define what business and technology risks will be controlled.  Will-implemented security policies build brand confidence and help an organization achieve its goal.  

1. What technical and/or nontechnical barriers do YOU foresee in YOUR organization when it comes to implementing IT security policies?

Bus Cont Plan&Disas Recov Plan 111

 Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting. 

Discussion_Clustering_Algorithms

Many partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case.

Need 250 words with references. No APA format required.

Information Assurance Plan Introduction: Twitter Hack

This assurance plan will be a plan to mitigate those issues that led to the Twitter Hack of 2020 

You will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? 

Bugs vs. Feature Requests

There is no such thing as a bug-free IT project. Because bugs are a fact of IT project life, IT project managers must articulate a process for identifying, tracking, and handling the bugs that will inevitably occur. In addition, because technical and business requirements change frequently, IT project managers must also plan to log and track requests for new features and functionality. 

Read the following linked documents: 

• “Visual Studio – Manage Bugs” https://docs.microsoft.com/en-us/azure/devops/boards/backlogs/manage-bugs?view=azure-devops&tabs=new-web-form&viewFallbackFrom=vsts This article describes the process of tracking bugs in Visual Studio, a popular .NET development suite created by Microsoft®.

• “What Is a Bug and Issue Tracking Tool?”: https://www.atlassian.com/software/jira/bug-tracking This article describes the process of tracking bugs in Jira, a popular bug tracking and project management tool created by Atlassian. 

Create a 3-page Microsoft® Word document of a bug tracking process for the project you created in the individual assignments in Weeks 2 and 3. Be sure to differentiate between bugs and feature requests. For this assignment, you will only be tracking bugs. 

Your tracking process must include: 

• Description of software you propose using for bug tracking (in-house developed or third-party)

• Description of issues that will be considered bugs (vs. feature requests)

• Description of who will use the system to track bugs

• Description of who will monitor the system, follow up with the requestor as necessary, and implement the bug fixes

• Description of bug-related information (such as a unique tracking number, description, assignee, etc.) necessary to identify, fix, and log bugs 

Submit your completed document.