Assignment

 

To  successfully run any business or operation, one must have and utilize a  business strategy. Company leaders utilize business strategies  to achieve their organizational goals (Jamsa, 2013). The author lists  seven plans that may comprise an organization’s business strategy.

(1) List FIVE of Jamsa’s plans that business executives may use to achieve their business goals. 

(2) In 450 – 600 words (excluding Title Page and Reference List), explain some possible benefits of using EACH of the FIVE plans you choose and possible issues if each plan is not used.

  • List each of the five plans as a Level 1 Heading
  • Title page required
  • Abstract required
  • Write in third-person only
  • Proper APA 7 referencing is required 
    • in-text citation
    • References List

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

What did the authors investigate, and in general how did they do so?

Identify the hypothesis or question being tested

Summarize the overall article.

Identify the conclusions of the authors

indicate whether or not you think the data support their conclusions/hypothesis

consider alternative explanations for the results

Provide any additional comments pertaining to other approaches to testing their hypothesis -logical follow-up studies to build on, confirm or refute the conclusions The article you use must be at least 3 pages long and be a primary or original research article.

  • The relevance or importance of the study
  • The appropriateness of the experimental design 

Evaluation should be an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) and a photocopy of the article when you turn in your evaluation.

paper

 https://us-lti.bbcollab.com/recording/43bad645d5784320ade99e142ecb3352

 

After reading the required articles , please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately five pages in length.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Active Directory & DNS (Windows Servers)

 

Describe the basics of Active Directory including domain, tree, and forest. What domain model would you recommend to an organization (make and list your assumptions)?

Discussion Question 2:

Describe in detail some of the aspects of DNS related to Windows Server 2016 including zones, records, commands, etc. Explain how DNS is installed and configured on Windows Server 2016.