BSWP Week 3

 

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words.

How might blockchain technology impact labor relations and employee safety?

 

Discuss the following: 1. How might blockchain technology impact labor relations and employee safety? You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Conclusion, References.

 Your response to the discussion prompt should contain a minimum of 500 words

 

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for all Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

IRM

 

Prior to or when security measures fail, it is essential to have in place several response strategies.
Create  an incident response plan that can immediately protect digital assets  in the event of an attack, breach, or penetration. The incident response  plan should include (but is not limited to):

  1. Procedures to initially identify and document an incident
  2. Procedures that will inform tactical operational managers, internal and external stakeholders, and/or individuals affected
  3. Procedures to investigate the breach, to mitigate harm to individuals, and to protect against further breaches
  4. Enforcement mechanisms for breaches and non-adherences
  5. Procedures to assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts
  6. Procedures to review response and update policies
  7. Solid academic writing is expected.
    Refer to Incident Response Management Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

Python

Explain the pycache, include, lib and scripts folders in Python Programming(When creating projects)

6-1 Discussion: Cloud Service

 

For this discussion, pick one of the following topics associated with the cloud and research it accordingly. Your main post should describe how you would evaluate the cloud service as a business tool and customer benefit.

Focus on the following capabilities needed for a company that is just deciding to get into the cloud services world.

  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • All slides must be narrated by you, the student.

How Will My Work Be Evaluated?

As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.1: Articulate the main idea and purpose of a communication.
  • 1.1.2: Support the main idea and purpose of a communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
  • 2.3.1: State conclusions or solutions clearly and precisely.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.2: Gather project requirements to meet stakeholder needs.
  • 10.1.3: Define the specifications of required technologies.
  • 13.1.1: Create documentation appropriate to the stakeholder.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Assignment 5 business intelligence

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Concept Paper

In other words, in week 4 you are going tell the reader (the instructor) why you think your topic for your final project is worth doing. You are going to justify this as a proposal. Here is the purpose of writing a concept paper:

Purpose of a concept paper

The topic for your week 4 concept paper will be the same as your final project; they are linked together. The week 4 concept paper justifies the writing of your final project.

 

Requirements

Submit a 3 page concept paper IAW APA format on an approved topic (see pre-approved topics in the syllabus). Paper organization will include (use as headings):

 

Coversheet

Introduction.

Problem Statement.

Relevance and Significance.

References (at least five).

Pre-approved research topics:

 

Authentication/Digital signatures

Data collections tools (hardware & software)

E-business/e-commerce security

End user security issues.

Government vs. commercial organization security issues.

HIPAA

Identity Theft

ID&IH Management and Legal Issues

Instant Messaging security.

Intrusion detection.

Sarbannes Oxley

Security Threats & Vulnerabilities

Wireless technology security

A6

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.