EH2DB

in 300 words.  

Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice.

Python Homework

After running the code I upload, write a code using numpy and panda to sort the stock data by date(month) in recent five years.

Emerging Threats

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Case Study 5 – Dianrong

 

Please read the Dianrong case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the trade offs that Dianrong is facing? How should the company prioritize its objectives? What should Soul Htite do?

2. As detailed in Exhibit 1 of the case, there are different collaboration models that Dianrong has adopted in working with various parties on technological development. How should the company decide on the nature of collaboration for technological developments in the future (via organic and in-house developments, partnerships, joint ventures, or acquisitions)?

3. Assuming that the company manages to raise an additional US$100 million, how should Dianrong allocate the capital across its many business units to maximize value in the long run? Should the company spend the money on internal R&D initiatives or M&A pursuits? Or both?

4. How should the company work with the local regulations in China? Should the company focus on reviving the P2 industry in China in the process? If so, how?

5. Are there other technologies that Dianrong should consider adding to its already expansive portfolio of technologies? In contrast, are there technologies that may seem redundant at the firm at the moment? How should Dianrong manage this to improve its competitive edge with its “technology DNA?”

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

week 6 group

  

This assignment should be in APA format and have to include at least two references.

1. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? 

Disaster recovery

Select a major organization that was located in the Hurricane Katrina disaster area.  Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.[500 words] 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

CEO Challenge

 

The CEO’s C

Use the Week 3 Assignment Template to complete this assignment.

Choose a company to base this paper on. You may use a current or  former employer, but do not disclose anything confidential. Or, you can  pick another organization if you are familiar with their internal (not  customer-facing) information systems. You can disguise the organization  and populate it with famous names. Made-up companies are problematic  because of the amount of detail and realism they require.

You’ve just left an all-hands meeting at this company. The CEO was  very upset at the rise of shadow IT projects, a major indicator that the  company’s internal information system has failed to meet its  needs. Because the current information system is inadequate,  inefficient, and outdated, the CEO is inviting everyone in the  organization to propose a new operational, decision support, or  enterprise information system to replace it. The executives have  allocated $5 million to fund the most promising idea.

This is your chance to make a difference in the company (not to  mention your own career). Write your proposal as a memo that the entire  C-suite will review. Include at least these points, in your own words,  to be persuasive:

  1. Identify the main functions of your proposed information system and why they are important to the business.
  2. Describe what types of data your information system will hold and how data quality will be ensured.
  3. Explain how the old information system handles the functions you  mentioned, the problems that occur, and why your information system will  handle things better.
  4. Offer evidence of feasibility: Show that similar information  systems have been built successfully and that they save more money than  they cost.

The executives are busy, so keep your memo to 1–4 pages and avoid any extraneous content.

Firewalls

   0. write 2 paragraphs on Firewalls

                                                   And

  • 1 List three design goals for a firewall.
  • 2 List four techniques used by firewalls to control access and enforce a security policy.
  • 3 What information is used by a typical packet filtering firewall?
  • 4 What are some weaknesses of a packet filtering firewall?
  • 5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 6 What is an application-level gateway?
  • 7 What is a circuit-level gateway?
  • 8 What are the common characteristics of a bastion host?
  • 9 Why is it useful to have host-based firewalls?
  • 10 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 11 What is the difference between an internal and an external firewall?