Discussion

 

This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

two page research paper on “Security Issues with IoT Based Smart Home Devices”

  Topic- Security Issues with IoT Based Smart Home Devices

4.1.- Why did you ( “your group”) selected the topic  for your research project (50-words).

4.2.- What are the major contributions of this project “To your organization” (70-words).—Assume Service Industry (Organization)

4.3.- Can you use this process of research in a corporate setting (50-words)?

4.4.- How can you use the bibliography to further understand the benefits of your research. (50-words).

4.5.- State the summary of your finding (75-words).

4.6.- Indicate the need for future research (50-words)

4.7.- State your conclusion (75-Words).

References

Practical Connection

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

2.have to mention the current working field as etl datastage developer, and write on how you apply scenarios of data science technologies like hadoop , hive in realtime

discussion

 Task1 (Around 500-600 words)

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

discussion 08/19

 

Here is an assessment on Leadership Style. Please take this assessment and provide an analysis of the results. How does this relate to you? How does your style impact the technological tools that you will use as a leader? How would you use your style to lead your organization? 

https://www.mindtools.com/pages/article/leadership-style-quiz.htm 

You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (400  total words) and include at least one APA-formatted external citation/reference.

Assignment Avi_8

 On April 18, 2016, The United States Supreme Court denied a petition for certiorari (refused to review the lower court’s ruling) in the case of Authors Guild v. Google, Inc., 804 F. 3d 202 – Court of Appeals, 2nd Circuit 2015.

Tell me what you would do if you were the Supreme Court.

That case let stand the ruling of the Court of Appeals which can be found at the following website:

https://scholar.google.com/scholar_case?case=2220742578695593916&q=Authors+Guild+v.+Google+Inc&hl=en&as_sdt=4000006  last accessed February 9, 2019.

Word count -500 and no Plagiarism

3s week 15 assignment CC

https://www.youtube.com/watch?v=W_O7mziH3vM – Cloud Security Myths.

https://www.youtube.com/watch?v=wchkvqhVrjQ

https://www.youtube.com/watch?v=orXXxIS5p84

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include References.

Important Note: Quotes need to be done properly. (-5 marks if quotes don’t have quotation marks)

IT incident response

 

Week 6 Discussion

1616 unread replies.1616 replies.

Discuss a municipal, state, or federal law that protects individual privacy. Please provide a link to the law documentation online. Are there limitations to the expectation of provided by the law in regards to privacy at home, at work, in public, online, when using technology?

In addition, please indicate if you think the law is sufficient to protect your privacy. Yes, I am asking your personal opinion in this case.

Participate in the weekly discussion. Post your initial 250 word minimum response to the discussion question and reply with a substantial contribution to the posts of other students.

Remember to use APA citations and references if you refer to information such as statistics or information you used in your response from other sources. DO NOT directly copy from a website or other source and paste. In this course I will only accept paraphrasing not direct quotation on all work.