cyber security

 1.”Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

2. Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?” (Ciampa 649). 

Final Project Paper

  

Topic: Home Automation Security and Vulnerabilities

Need to write 600-word paper (excluding References and Title page) written in APA format, showing sources/References and one page with bibliography

 Abstract:

We all recognize that the home technologies are designed such that it makes our lives easier, comfortable and also more convenient. But new conveniences should not mean to bring new problems but that indeed the case is in most of the cases in the current world. The issues of using automation in everything are most often discussed on social media or any blogs etc. For example, connecting home appliances/devices to the Internet makes you dependent on the connection quality and the servers they operate on. In parallel, cybercriminals are waiting on a poor link where they can use those points of entry gain control on the equipment that is open and vulnerable for attacks and use it to their own advantage in most cases. Many studies recently have revealed that number of ways are still there to take control of a smart home equipped and connected with smart devices. One such issue for example, could be a vulnerability in the cloud server with the help of which the home owner controls the house remotely using the controls that operates the devices, or even something seemingly innocuous like a smart light switch. In this paper, we will get in to more details of what devices are currently used as smart home safety/convenient devices and how vulnerable they are with some examples which happened in the real world. Safety measures that can be put in practice if equipped with this technology and other safety practices when decided to use this smart/convenient devices at home.

Regarding big data 2 pages 500 words

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Technical Acceptance Model & Leadership

The attached journal articles are focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

Write a paper and address the following key concepts:

1. Define TAM and the components.

2. Note how TAM is impacting educational settings.

3. Give an overview of the case study presented and the findings.

Format Requirements:

1. The paper must be minimum 3 pages excluding title and references pages. 

2. Include references of at least 5 peer reviewed papers supporting your case study. 

3. The paper must comply APA Format and include a cover page, an  introduction, a body with fully developed content, a conclusion and  references.

Microsoft Access Discussion Easy

 

Let’s Pause and Reflect on your journey with the MICROSOFT ACCESS relational database management application.

Please identify at least one new feature/function discussed this week in the application and explain why you feel it may be useful to you and/or others.

You’re almost there!!! You should be able to see the ‘light at the end of tunnel’ with your journey through Microsoft Office…Are you planning for future use of these applications?
Please share how you plan to regularly and practically utilize the skills acquired in this class moving forward. How will you keep up your practice in using these applications?

ASSIGNMENT RUBRIC – Wrap Up Extra Credit: Participating in this week’s wrap up thread and satisfying all the criteria of the assignment rubric listed below is worth 0.50 points towards the overall course grade. Click on the Reply link below to make your post.

Points

Identifies and explains a useful feature/function of the application covered in the current week

0.20

Shares substantive response to additional Wrap Up questions

0.20

Satisfies minimum word count requirement = 100 words

0.10

Total Points

0.50

bharg research paper

 

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research Paper

 “There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

 Task 1:

 Any one of the below topics

 1. Cloud Computing 

2. Big Data Analytics

 3. Database Security 

4. Enterprise Architecture 

5. Data Warehouses

 6. Ethics in IT 

7. Web 2.0 

8. E-Commerce 

 The research paper must be at least 10 pages but no more than 12 pages.

 • The paper needs to be supported by evidence (citations from peer-reviewed sources). 

• A minimum of four (4) peer-reviewed journal citations are required. 

• No references should be more than 5 years old.  

Task 2:

  • Your PPT should reflect a summary of your Individual Research Report.
  • You should have 12-15 slides.

 

Penetration Testing

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

1. One page on describing the strengths and weaknesses of RC4. 

2. One page on identifying a wireless threat and how to mitigate it.