Cyber Security

 VBA has played a special and notorious role in the cyber security world for several years.  Conduct research into VBA and its role in malware, and identify some techniques for using VBA in a secure manner.

  • Prepare a quality, substantive journal post that addresses the objectives of the assignment and the expectations set forth in the grading rubric. 
  • 300 words minimum is required. 
  • Use APA format
  • Use at least two credible sources.

IT531-GL-M6 week 8 assignment

 Prepare a one page paper explaining the mechanism of sending and receiving emails. Use may use the internet for more sources. Please double space your paper and cite your sources. 

Discussion Team Mgmt

 

Lesson 7 Discussion Forum

Leadership Paradox and Inter-team Relations

A.     What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.

B.     Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.

C.    What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.

Big Data Analytics

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

 paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Module 8 – Discussion Questions

1.  There are a number of professional certifications for those with a Bachelor of IT Security degree.  Some are related to very technical careers and others are related to administrative type careers.  Research the various professional certification programs available, select one and provide a description of the certification and the requirements to obtain and retain the certification.

2.  Discuss the pros and cons of professional certifications.  Are they worth the time and effort to obtain and maintain?  Are they an enhancement to career objectives?  

Note: Please don’t use books or jounals as references. Please only use online sources. 

Perception Critical Thinking Question

Describe your current environment. What is going on around you at this moment? Is there noise in the room? Noise outside the room? What do you see? What can you smell? Are you being distracted by technology — TV, radio, iPod, cell phone, etc? Are there other people around? What are you attending to most closely? What sensory input are you selecting? Are you perceiving other things that you are able to ignore or tune out? Explain. 

Please respond to this prompt in 200 words or more. 

Access Control – Discussion

 Discuss below three components of Access Control and their importance to business.

 * Policies: Defined from laws, requirements, and industry guides

 * Subjects: People who need to access or are restricted from accessing

 * Objects: Resources or information that need protection

 It must be at least 500 words and should have references. APA format.

3 questions 300 words each

  

1) Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals. 300 words

2) Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.

Link : https://learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com/5b75a0e7334a9/572494?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%277-CEHv9%2520Module%252005%2520System%2520Hacking.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200630T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20200630%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=89cfc17a7faee2b1f98092f72cc4ab5736466b848309b92115d17cfcd0217a80

3) Describe some ways that an organization can recover it’s IT resources from a disaster.  What controls should have been in place in order to be able to retrieve this data? 300 words

DFTT week8 P8

 

Hello,

i need this paper by 07/01 afternoon.

Strictly No plagiarism please use your own words.

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a 300 WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Strictly No plagiarism