Block chain technology Reflection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Discussion

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 
  2. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.
  3. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Please be sure to engage by Wednesday at 11:59pm ET and then engage on two more days throughout the week (for a total of three days of engagement, before Sunday at 11:59pm, ET.

Global Economy

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  What are some advantages and disadvantages to this approach?  Is there another approach that might work better?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

The Software Factory

It is necessary to explore all of the stakeholders involved within a software’s development to understand the pedigree of the software from a security standpoint. This will then allow a security professional to make informed decisions toward risk management.

Explore where and how the Adobe reader software is developed. In 500-750 words, report your findings. Make sure to address the following:

  1. Where does Adobe indicate their product is located/headquartered?
  2. Where is the software really developed and by whom?
  3. How many are involved in the development of Adobe and what threat might that pose to end users?
  4. What best practices should be considered during the development of the software to reduce security issues in reference to Software Development Life Cycle (SDLC)?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Control Objectives for Information and Related Technologies(COBIT)

Research the specific domains and components of the COBIT Framework.  Discuss the levels of security architecture as they relate to the principles of the COBIT Framework.  COBIT faced a variety of criticism.  Explain one criticism of COBIT and discuss if and how the criticism was addressed (if it was)

and assessment of how COBIT criticism was addressed and offer an opposite view of the criticism

3 pages

loud computing to become multi-jurisdictional

 

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Discussion 5.1 and 5.2

Discussion 5.1

There are several steps in the remote targeting phase.  Which step do you think is the most important?  Why?  Which one do you think is the least important?  Why?

Discussion 5.2

What are some of the wireless tools discussed in the remote targeting phase?  How are they used?  Which one do you think is the most important?  Why?  Which one do you think is least important?  Why?  

Case Study 5.1

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in Phase III, Remote Targeting.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Book Review Chapters 6 & 7 

Write a three to four-page paper, explaining the Information found in Chapters 6 and 7 concentrating on Wireless systems and what hackers know about them.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Weekly Summary 5.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

This is not to be a review of the book. It is to be your personal views on the lectures and presentations.

Ethical hacking

No Plagiarism
Each answer with 250 words at least and 2 cited references

  1.  Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.
  2.  Discussing topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 
  3.  Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Reflection

 

You are encourage to use this forum to reflect on the skills gained in this course and how you may use it to improve your current position.

Internet of Things(IoT)

Need a paper with atleast 1000 – 1200 words.

you can find the deliverables in the “Final Research Assignment Doc”. 

References in the “References Doc”. 

And attached an additional DOC for the “challenges of IoT security”. 

Note: I need this paper by Friday(10/09/2020) Evening before 9pm EST.