CIA Triad

describe and discuss ways, if any, we can safely share security data.Are there precautions we can take, technical solutions we can use, e.g., like using the CIA triad, or should we just not share these kinds of data? Feel free to argue for and against, just make sure to back up your statements with scholarly support.

  

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source 
  • Make an argument concerning the topic.
  •  At least one scholarly source should be used in the discussion 

Computing Baggage Charge

A small airline company needs a program to compute baggage charges. Write a program that asks the user to enter the weight of a passenger’s baggage. The program should display the baggage charge, which is calculated as follows. If the baggage weight is 50 pounds or less, the program should display “No Charge”. If the baggage weight is greater than 50 pounds, the baggage charge is $5.00 plus $0.95 for each pound over 50.

Research Report

Research Report / Individual Project 

Write a scholarly research report on a topic related to Cyber Security (see Appropriate Topics). Please see Important Notes and Document Details for detailed specifications. 

Appropriate Topics:

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

· The research paper must be at least 3,500 words supported by evidence (citations from peer-reviewed sources). 

· A minimum of four (4) peer-reviewed journal citations are required. 

· Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter).

· Extra white space use to enhance page count will negatively affect student grade. 

· The research paper must only include materials derived solely from peer reviewed journals or peer reviewed conference proceedings.

· Long quotations (i.e. paragraphs) are NOT permitted. Only one quoted short sentence (less than 14 words) is permitted per page.  

· Footnotes are NOT permitted.

Document Details

This area provides additional details about the content of each of the needed Research Report Chapters (5). The final submission should include DETAILS of each of following: 

1) Chapter 1 – Introduction

2) Chapter 2 – Literature Review

3) Chapter 3 – Methodology Specifics (comparative analysis)

4) Chapter 4 – Findings and Results

5) Chapter 5 – Conclusion and Future Recommendations

6) References – APA

7) Appendices

Your grade will be based on adequately presenting all 5 chapters in a Master’s level manner. 

Chapter 1 Introduction

1 Background/Introduction

In this section, present enough information about the proposed work such that the reader understands the general context or setting. It is also helpful to include a summary of how the rest of this document is organized. 

1.1 Problem Statement 

In this section, present a concise statement of a research-worthy problem addressed (i.e., why the work should be undertaken – don’t say required for the class). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. 

1.2 Goal 

Next, include a concise definition of the goal of the work (i.e., what the work will accomplish). Aim to define a goal that is measurable.

1.3 Research Questions 

Research questions are developed to help guide the authors through the literature for a given problem area. What were the open-ended questions asked and why did the student find (or not find) them adequate. 

1.4 Relevance and Significance 

The student should consider the following questions as they read through an article stating how the author(s) supported, or left unsupported the evidence, relevance, and significance of their research literature: 

Why is there a problem? What groups or individuals are affected? 

How far-ranging is the problem and how great is its impact? What’s the benefit of solving the problem? 

What has been tried without success to correct the situation? Why weren’t those attempts successful? What are the consequences of not solving the problem? 

How does the goal of the study address the research problem and how will the proposed study offer promise as a resolution to the problem? 

How will the research add to the knowledge base? 

What is the potential for generalization of the results? 

What is the potential for original work? 

1.5 Barriers and Issues 

In these paragraphs, identify how the problem is inherently difficult to solve. How did the solution the author(s) propose address the difficulties? 

2 Chapter 2 Literature Review

In this section, it is important to clearly identify the major areas on which the student will need to focus the student research in order to build a solid foundation for the study in the existing body of knowledge. The literature review is the presentation of quality literature in a particular field that serves as the foundation and justification for the research problem, research questions or hypothesis, and methodology. The student will develop a more comprehensive review of the literature as part of the research. 

3 Chapter 3 Approach/Methodology

This chapter includes a summary of how the student is going to proceed with the evaluation of the problem statement and associated research question(s). Given the short time of this course, a compare / contrast or advantage / disadvantage analysis is recommended 

4 Chapter 4: Findings, Analysis, Synthesis

Include an objective description and analysis of the findings, results or outcomes of the research. Limit the use of charts, tables, figures to those that are needed to support the narrative. Most of these illustrations should be included as part of the Appendix.

The following topics are intended to serve as a guide: 

4.1 Data analysis 

4.2 Findings & discussion

4.3 Analysis

4.4 Synthesis

4.5Discussion 

Chapter 5: Conclusions

5.1 Conclusions – Clearly state the conclusions of the study based on the analysis performed and results achieved. Indicate by the evidence or logical development the extent to which the specified objectives have been accomplished. If the research has been guided by hypotheses, make a statement as to whether the data supported or rejected these hypotheses. Discuss alternative explanations for the findings, if appropriate. Delineate strengths, weaknesses, and limitations of the study.

5.2 Implications – Discuss the impact of the work on the field of study and its contributions to knowledge and professional practice. Discuss implications for future research.

5.3 Recommendations – Present recommendations for future research or for changes in research methods or theoretical concepts. As appropriate, present recommendations for changes in academic practice, professional practice, or organizational procedures, practices, and behavior.

Managing Risk in information system

 

Your lesson discussed several compliance laws, standards, and best practices (see the Lesson 2 activities, under the Rationale tab).  The Department of Health and Human Services (the agency responsible for managing HIPAA compliance among healthcare providers) lists recent breaches at https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf  – think of it as their “Wall of Shame.” Find an article online that discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA. You can also look at Federal Agencies and discuss those that have not had sufficient controls in place (think of the breach that the Office of Personnel Management had). Summarize the article in your own words and address the controls that the organization should have had in place, but didn’t, that facilitated the breach. What were the ramifications to the organization and the individuals involved?

Do NOT post the article or include word document of your write-up – post only your summary discussion directly and a link to the article. Please follow proper APA style with a minimum of two references

Database security

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Practical connection

  

My Job Role: UI Developer (Front end Developer) 

Skillset:  HTML, CSS, Javascript, Backbone JS, Vue JS, Angular JS, Angular versions from 1 to 8, React,  Redux, Jqurey, Bootstrap, Json, XML, YML, DS5, DS6. 

Please help me how these attached 15 subjects from my PhD in IT each are how they are helpful in my work environment as a UI developer also What I Learned from this course.

security architecture 9

 Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 

bi13 assignment

 

1. Some people say that chatbots are inferior for chatting.Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

5. Research the role of chatbots in helping patients with dementia

6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

APA format with 2 references.
2 pages