Emerging threats

Discussion:

Describe and discuss ways, if any, we can safely share security data. Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support. 

Note: Answer should be a minimum of 300 words and 2 APA references of Scholarly articles

NS-10-D

describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network.300 WORDS

Research Paper & Discussion..

**RESEARCH PAPER**

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet these requirements:

Be approximately six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

Discussion and Assignment

Discussion::

Resistance to change is a normal everyday aspect in the workplace.  Note what happens to the organizational climate when this resistance occurs and any tactics to reduce negative connotations when dealing with change. 

Need 250+ words and no APA format required.

Assignments:  

  

Assignment1:

Chapter 1 – study questions 1-5, Exercise 3 (Information Systems for Business and Beyond)

1. What are the five components that make up an information system?

2. What are three examples of information system hardware?

3. Microsoft Windows is an example of which component of information systems?

4. What is application software?

5. What roles do people play in information systems?

6. What is the definition of a process?

7. What was invented first, the personal computer or the Internet (ARPANET)?

8. In what year were restrictions on commercial use of the Internet first lifted? When were eBay and Amazon founded?

9. What does it mean to say we are in a “post-PC world”?

10. What is Carr’s main argument about information technology?

Exercise 3:

We all interact with various information systems every day: at the grocery store, at work, at school, even in our cars (at least some of us). Make a list of the different information systems you interact with every day. See if you can identify the technologies, people, and processes involved in making these systems work.

Chapter 2 – study questions 1-10, Exercise 2 (Information Systems for Business and Beyond)
1. Write your own description of what the term information systems hardware means.

2. What is the impact of Moore’s Law on the various hardware components described in this chapter?

3. Write a summary of one of the items linked to in the “Integrated Computing” section.

4. Explain why the personal computer is now considered a commodity.

5. The CPU can also be thought of as the _____________ of the computer.

6. List the following in increasing order (slowest to fastest): megahertz, kilohertz, gigahertz.

7. What is the bus of a computer?

8. Name two differences between RAM and a hard disk.

9. What are the advantages of solid-state drives over hard disks?

10. How heavy was the first commercially successful portable computer?

Exercise 2:

Review the timeline of computers at the Old Computers website. Pick one computer from the listing and write a brief summary. Include the specifications for CPU, memory, and screen size. Now find the specifications of a computer being offered for sale today and compare. Did Moore’s Law hold true?

The above assignments should be submitted in a single Word document. Quotes are not allowed, paraphrase your source. A title page and references are required. APA formatting is required.

Assignment 2:

Chapter 1 – Review the Key Lessons from Chapter 1 – Explain the five key lessons and note the importance of each key lesson from chapter 1. Also, note why is it important to understand these basic concepts. (Information Technology and Organizational Learning Textbook)

Chapter 2 – Note why the IT organizational structure is an important concept to understand. Also, note the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook). 

The above submission should be two pages in length and adhere to APA formatting standards. Quotes are not allowed, paraphrase your source. A title page and references are required. APA formatting is required. 

**Remember the APA cover page and the references are required but do not count towards the page length**

Text Book: 

Information Technology and Organizational Learning by Arthur M. Langer, 3rd Edition, 2017.

simulated disaster

A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure?[600 words]

Cyber Security Project

  

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete in APA format.

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Data visualization project paper and PPT- COVID topic

1- i need help with data visualization project paper with 10 papers on COVID topic.
2- Paper should include – 

– Situation analysis 

– Tools used and how you use them to achieve visualization 

– Data set explanation (what are data column included, types, )- depends on this data set links.

     https://www.kaggle.com/therealcyberlord/coronavirus-covid-19-visualization-prediction/?select=country_wise_latest.csv

     https://www.kaggle.com/therealcyberlord/coronavirus-covid-19-visualization-prediction/?select=day_wise.csv

– Data validation (what is missing, what can be included for effectiveness)

– Data examination ()

– Data Transformation(visualize can be any form of chart)

– Country wise analysis

– Region wise analysis

– Future pattern and prediction

3- Power point presentation- 10- slides