Computer Science

describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:

1.  What is that project? Provide complete description. Consider using PPM.

2.  What was the scoop, deliverable, and results of the project?

3.  What constraints did you experience and how did you handle them?

4.  If you had to do the same project again, what changes will you recommend?

1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count) and please use APA format.

Research Paper and discussion

Part 1 : Research paper 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Part 2 : discussion ( 500 words including 2 responses )

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

Disuccsion

 describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.

ApA format 250words

Emerging concepts & Tokenization

**RESEARCH PAPER**

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

Be approximately six to eight pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

Assg

ResearchPaper

Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

Cloud computing

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

week research paper

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

 

Chapter 1 Journal articles

BSW W9

In 200 words,

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Digital Certificates and Encrypted Messages

 

You have recently been hired as a Tier 1 cybersecurity specialist working on the Network Administration Team at HU Investment Firm.

During the course of your work week, you are often called upon to present technical information to non-technical people in your Firm.

This week assignment has 2 parts, a presentation and an additional step-by-step guide for the incoming tier 1 support staff.

Digital Certificate Presentation 

  • Create a slide presentation on Digital Certificates with a minimum of 12 slides. 
    • Use screenshots or graphics when appropriate, minimum of 2
  • Define digital certificates and explain how they are used
  • Describe the reasons for using digital certificates and why they are important to HU Investment Firm
  • Demonstrate how to create certificates and apply them to messages using MS Outlook
  • Provide at least 2 references on your last slide in APA format

Instructional Guide

  • Write a help document including step-by-step instructions for the Support Team’s Knowledge Base wiki
    • Include at least 2 screenshots as references
  • Describe the process that encrypted MS Outlook message go through and explain why
  • Explain the problems that  can arise from encryption and how to troubleshoot for those problems
  • Include at least 2 external resources that technicians can use for more information