ET WK6 paper

Threat Modeling —— 5 FULL PAGES

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

dis_dsdba13

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

CALCULUS 2 WITH PROGRAMMING

I need someone who preferably hasa degree in computer science or mathematics who has can help me with an assignment that includes calculus two and programming. Please message me if you excel in BOTH programming and CALC 2

Week 8 Status Report

 

 

Use the Week 8 Status Report Template to complete this assignment.

In Week 10, you will provide a detailed project presentation for your new information system project. Because of its importance to the  organization, your presentation must be thoughtful and visually appealing. To help you stay on track for this three-week effort, the executives have assigned you a project manager. For each week leading up to the presentation, you are expected to turn in a short (less than one page) status report.

It must address just four things:

  1. What did you expect to accomplish on the project this week?
  2. What did you actually accomplish on the project this week?
  3. What issues have arisen, and what help do you need?
  4. What do you expect to accomplish on the project next week?

Please write up your responses as a series of bullet points in memo form. There is no need for a cover page

Research paper

Write 3-5 page (excluding cover page and references) APA formatted research paper.  The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.

Mastering Data Visualizations

Background: According to Kirk (2019), annotations, colors, and composition will have a significant role in your visualizations. You have to be careful with the delicate balance of each. This then leads to a functional harmony of presentability and usefulness as you master data visualizations. The harmony of annotations, colors, and composition you select during design will impact many aspects of the overall visualization.

Assignment: After reviewing chapters 8-10, write a research paper that contains the following:

  • Discuss the impact of including headings and introductions in technical presentations
  • Discuss the importance of chart labeling, captions, references, and footnotes
    • Be sure to include the applicability of each
    • Also, detail the specific instances where chart labeling, captions, references, and footnotes are required
  • Discuss typography and the importance of the appearance of text
  • Discuss the balance between functional decorations and optimizing data legibility in your charts, including:
    • Complementary colors
    • Analogous colors
    • Triadic colors
  • Discuss presentation layout, arrangement, and sizing

Your research paper should be at least 5 pages (800 words), double-spaced, have at least 4 APA references

Assignment

 

Go  to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Short research paper for PHD. Please read below before bidding. APA 6th edition format

 

You are going to write a 2-3 page research paper in APA format, with all supporting references and visuals on the following :

You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

Top 10 Internet Browsers – Most Popular Web Browsers of 2019 (Reviewed & Compared) 

https://www.toptenreviews.com/best-internet-browser-software