Please read question in comment section 500 words APA format

Need 500 words and APA format

  

Refer to Assurance of Learning Exercise #1 (Apple) in Chapter One of your Thompson (2020) text. Read “Apple Inc: Exemplifying a Successful Strategy” in Illustration Capsule 1.1.

Incorporate our course (Thompson text) work for the week and Develop your analysis by responding to the following questions:

· Does Apple’s strategy seem to set it apart from rivals?

· Does the strategy seem to be keyed to a cost-based advantage, differentiating features, serving the unique needs of a niche, or some combination of these? Explain why?

· What is there about Apple’s strategy that can lead to sustainable competitive advantage?

Submission Details: 

· Incorporate a minimum of at least one course (Thompson 2020 Text) and one     non-course scholarly/peer-reviewed sources in your paper to support your analysis.

· All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, and proper in-text citations using APA guidelines.

3 quotes are required, and they must be enclosed in quotation marks and cited in-line by referring to your reference list.  

No plagiarism / Need references and should be clickable.

ethics 2

 Then, write a paper in which you address the following. Use your research to support your ideas.

  • Describe codes of ethical conduct for the information technology field.
  • Explain ethical responsibilities for IT professionals.
  • Describe your personal code of ethics for the IT environment.

Additional Requirements

  • Include a title page and a references page.
  • Include an introductory paragraph and a concluding paragraph.
  • Include a minimum of three research resources.
  • Be sure to follow APA guidelines for style and formatting.
  • Your finished assessment should be approximately 3–5 pages in length, excluding the title page and references page.

Blockchain and cryptocurrency

 Think of the sensitive data that your organization collects and handles. Would you be able to provide for the security of that data on a public blockchain? If so, what changes would you have to make to your software to support security on a public blockchain? If your organization doesn’t handle any sensitive data, describe a role that you may pursue in the future, and how that role may interact with sensitive data. Use that scenario to describe whether you would be able to provide for the security of that data on a public blockchain. 

Phases of an attack (cyber security)

 

If you will remember from Week 8 you have a new CEO. They are non-technical and came to your organization from a completely different market segment. This week you’ve been charged with helping them understand computer attacks. Your text lists four general phases of attacks. Explain these four phases to the CEO, including items in each phase the attacker would consider when performing that phase. Where appropriate include how social engineering can be used. Last, list what security controls can reduce the likelihood of success of each phase of the attack.

4 Phases of an attack :

Reconnaisance and Probing

Gaining Access

Maintaining Access 

Covering Your Tracks.

Cyber security Research paper

  

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

Digital/Computer Forensics

 1)  A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.

2)   Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3 paragraphs and should include a reference citation for your source of information.

Assignment

 

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Assignment Link: http://book.visualisingdata.com/chapter/chapter-4

Assignment Length (word count): At least 500 words (not including direct quotes).