Reflective Paper

 

Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Attached the TextBook of the course.

Please write Between Chapter 1 and Chapter 8

4 Week Masters' Program Cybercrime Class

Are you able to complete the remaining 4 weeks of the class?

Mid term due by 11/8/2020- In the form of discussion question for past chapters ( will provide info)

Complete a book review by November 23rd on a Specific book? (Book Review no less than 2300 words) 

3 quizzes (requires log-in and completion by central time 6:00 p.m. Saturdays?

Discussion question weekly posted on Sunday by professor to be completed by central time 10:00 a.m. Wednesday with 450 word minimum, in-text citations and proposed class question?

Case Study

 

Answer Discussion Questions 1-2 at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.

The paper MUST BE between 600 – 1200 words (minus the cover page, abstract, graphs, and references). These grading guidelines will be STRICTLY enforced as this is a Master’s program where writing is required!

Cyber Law

Assignment 1

 1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.

Assignment 2

 A. Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.

B. Respond to two classmates’ postings. Minimum 100 words per posting.

Research Paper

Research Paper

Course – Cloud Computing

Submit your professional research paper on a current topic in cloud computing. Amend your paper based on feedback you received during the residency weekend. The paper includes your final literature review and your completed analysis of your chosen research topic. Plan on approximately 15 pages. Your literature review should include:

  • An introduction that includes: Brief explanation of your strategy for finding literature (databases searched, keywords used)Statistics on your references (Total references, percent recent, percent scholarly)
  • Discussion of the topic (themes, variables)
    • Include a separate subsection for each theme (variable)
    • Relevant studies that relate to the same topic

Do not simply summarize each article. Practice synthesis.

The paper must adhere to APA format (7th edition) and include a proper APA references list with all references provided in APA forma

2 Discussion

 Risk Mitigation

Company M designs, manufactures, and sells electronic door locks for commercial buildings. The company has approximately 1,500 employees in three locations around the United States and generates $50 million in annual revenues. Over 5,000 wholesalers and distributors access the Company M business-to-business (B2B) Web site to place orders and track fulfillment. In the past year, Company M experienced 22 information security incidents, most of which involved lost or stolen laptops, tablet PCs, and smartphones. In addition, the company dealt with four serious malware events that originated from an unpatched server, an insecure wireless network used in the manufacturing plant, an insecure remote connection used by a sales person, and a headquarters employee who downloaded a game from the Internet to her workstation. Three of the malware incidents resulted in files that were erased from the company’s sales database, which had to be restored, and one incident forced the B2B Web site to shut down for 24 hours. Explain your risk mitigation strategy that reduces risks for an organization. Include the following:

  • Identify and discuss technological and financial risks that you see Company M faces.
  • Which domains of the IT infrastructure do you see were involved during the four malware events?
  • What types of security policies should Company M institute to mitigate those risks?

Explain your answers. Submit your initial post (minimum 350 words)

Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

CPTED Continued

 Build upon your earlier post about CPTED and explain the importance of crime analysis in reference to secure architectural design.

Remember to cite at least one scholarly peer-reviewed article.  

All citations should be in APA format.

Attached previous post.