Article Summary

 

– Find 2-3 recent peer-reviewed articles (within the past 3 years) that  ‘closely relate to Impact of Mobile Computing on Businesses’  

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.

Question 2

   

https://cacm.acm.org/news/238978-22-texas-towns-hit-with-ransomware-attack-in-new-front-of-cyberassault/fulltext

https://cacm.acm.org/news/238978-22-texas-towns-hit-with-ransomware-attack-in-new-front-of-cyberassault/fulltext

https://cacm.acm.org/news/238987-app-allows-inspectors-to-find-gas-pump-skimmers-faster/fulltext

https://cacm.acm.org/magazines/2019/9/238974-inspired-by-the-home-of-the-future/abstract

https://cacm.acm.org/magazines/2019/9/238964-an-interview-with-andrew-odlyzko-on-cyber-security/fulltext

https://cacm.acm.org/magazines/2019/9/238961-can-you-locate-your-location-data/fulltext

a. Select an article from the above list, preferably one that details ethics in technology-related concern or one that explains a new technology or service. 

b. Summarize the article (3 paragraphs) and include a concluding paragraph that explains how you as IT professionals would use this information.

Wk 3 Discussion – Security Planning

 

Resource: The following Week Three videos: 

  • “Contingency Planning” 
  • “Risk Assessment” 
  • “Risk Control” 

Research the potential vulnerabilities and threats faced by a non-profit 

Discuss the steps involved in security planning for the organization. 

How important is risk management in the security planning process for the organization? 

How do the existing vulnerabilities and threats impact the importance of risk management? 

175 words.

Research Paper

  

The final project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. 

Ø Start your paper with an ABSTRACT and introductory paragraph.

Ø  Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Ø   Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Ø  Prompt 3 “Green Computing” (1-2 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link.

Ø Conclude your paper with a detailed conclusion section. 

Ø  The paper needs to be approximately 5-8 pages long, including both a title page and a reference page (for a total of 7-10 pages). Be sure to use proper APA formatting.

Cloud computing Project

  

1) Choose a business of your own online business

2) Use Google cloud platform to build your online business by using the GCP products that mentioned in the below document.

3) create a mind map what all the departments and divisions are there in the business like security, storage, database, networking and etc.

  

you can refer this site to create a mind map:

Some thoughts on chronological mind maps

Facebook Group: Dementia Mind Maps

https://www.biggerplate.com/mindmaps/jNZaz36J/facebook-marketing-strategies

https://blog.mindomo.com/your-mind-map-on-facebook/

Information Governance discussion 4

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 

Q1: With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?

Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.  Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.

Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out

 As a computer investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that received a bomb threat in an anonymous email. The detective already has information from a subpoena sent to the last known ISP where the anonymous email originated, and the message was sent from a residence in the school’s neighborhood. The detective tells you the school principal also stated that the school’s Web server has been defaced by an unknown computer attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence the ISP identified. Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out.  

Cybersecurity

 Note: check plagarisim 

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/
https://www.techrepublic.com/

Discussion

 

What is the history of the network models? What are four layers of the TCP/IP Model and how are they used? How does the networking protocol work?

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect.