Ethical Hacking_Week15

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

BI Wk7

Chapter 12 & Chapter 13

Q1. Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and report your findings. – 300 words

 

Q2 to Q4 150 words each

Q2. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

Q3. Discuss the financial benefits of chatbots.

Q4. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Q5. Exercise – Compare the chatbots of Facebook and WeChat. Which has more functionalities? – 200 words

Q6-Q9 – 150 words each 

Q6. Compare the IoT with regular Internet.

Q7. Discuss the potential impact of autonomous vehicles on our lives.

Q8. Why must a truly smart home have a bot?

Q9. Why is the IoT considered a disruptive technology?

Q10. It is said that the IoT will enable new customer service and B2B interactions. Explain how. —225 words 

Q11. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities. —225 words 

written assignment

 In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work?  

Discuss the impact of cloud processing environments on application security. Be sure to define cloud computing, application security, and the various types of implications.

  

The paper is to be between 2,000 and 2,500 words. 

It must be formatted using APA style. 

A least five scholarly resources must be utilized. Scholarly resources include journal articles in peer reviewed journals, textbooks, and Educational and Government websites. Wikipedia, message boards, blogs, and commercial websites are not scholarly. While you can cite a commercial website, it will not count as one of the scholarly sources. The paper will be evaluated using plagiarism scanning technology, so be careful to include citations and follow APA procedures when dealing with direct quotes. It is expected that one of the five sources will be your text.

  

The PowerPoint should support a 10-minute presentation. 

Avoid slides with many words on it. 

One tip is to not use a font smaller than 20 point. 

Ensure that you have enough slides to address the topic, 

Do not go over the 10-minute limit.

Include a slide that discusses who wrote what, and who presented what

Technology Entrepreneurship

Que 1:  

The global economy has seen significant changes since the banking crisis in 2008. Many economies have gone through large-scale austerity programs to reduce deficits. How has this affected the business organizational structure? How has employment and personal income been affected?

Que 2: 

Discuss the differences between the common characteristics of entrepreneurship and technology entrepreneurs.

Que 3: 

Discuss the main challenges related to managing innovation.

Lab 12 Flowcharting

 

  • Follow the instructions in the Word document
  • Download the “Flow Chart Assignment” file
  • Flowchart the processes using Word and its available shapes
  • You can view a tutorial for creating flowcharts here:https://www.youtube.com/watch?v=0VR7iBImDB4&feature=youtu.be
  • Refer to figure 11-4 in your book for help on this assignment
  • Use only the symbols listed on figure 11-4
  • Upload the finished flow charts to Canvas for grading

4s week 6 assignment EH

In 300 words 

Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence-gathering process. 

Include references, no copy-paste strictly. use your own words. 

IT-project management

 

Team Mini Lecture Assignment – Due in Assigned Week by Team 

Submit Assignment

  • Due No Due Date
  • Points 5
  • Submitting a file upload

One Mini Lecture Created By Each Team

I have placed this assignment in multiple weeks to give you ample warning it is coming…

Each team will create a 10 -15 slide topic presentation.

  • The topic of the week will need to be researched to give as much information as possible.
  • Remember that you are teaching your fellow students. Please be respectful and professional. If you choose to be creative and humorous, please also be respectful of the topic and your classmates worldview and culture(s). Choose imagery wisely. 
  • Include a last slide of the Reference for your presentation.

I have included some samples of great presentations from past classes in the specific team instruction pages.  Use them as jumping off points but do not plagiarize!

Deliverables:

Presentation file submitted in the Week assigned by the TEAM LEADER ONLY.

Team E – Week 7 Topic – Troubleshooting Windows OS (hint – forensics)

theses are examples you can follow to do the presentation

Powershell TeamA-IT210W14.ppt

Team_A_Registry_Presentation.pptx

RegistryPWRPT.pptx

Powershell TeamA-IT210W14.ppt

What is Powershell.pptx

Virus & Exploits.pptx

Viruses and Exploitations F.pptx

Virus and Exploits B.pptx

1-2 Page APA 6th standard – Visualization Workflow Discussion

Create and post a graphic that illustrates your data visualization process/workflow.  Detail and describe each step in your process/workflow procedure.  Your process can/may be different than what is outlined in the readings.

REMEMBER:  This discussion should have a “graphic” and a “description”.