Information Security and Risk Management

 Provide a reflection of at least 500 words (or 2 pages double spaced) of  how the knowledge, skills, or theories in this course could be applied,  in a practical manner to your current work environment. If you are not  currently working, share times when you have or could observe these  theories and knowledge could be applied to an employment opportunity in  your field of study.  

Health

Imagine you work for an IT department that has weekly IT roundtables. This week you will lead one of the conversations about cloud security.

Select one of the following types of security that can be included in the cloud:

    Layering

    Least privilege

    Separation of duty 

Respond to the following in a minimum of 185 words: 

     Explain the following about your selected security type:

    A short summary about what you found to be the usage of the security type in business

    Circumstances in which the security type would be appropriate

    Circumstances that would indicate the security type would not be appropriate

    High-level steps to implement the security type

Discussions

There are 5 different discussions here and Can you send them separately 

Each two sources 

APA Style

Please add some opinion or maybe example,

relation to cloud computing

 

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Wireless Network,,

  

Quality of Service (QoS) is significant because it allows the user to prioritize tasks completed over a wireless network. When working with wireless networks, you must consider what is important when designing QoS. In this assignment, students will gain experience on how to conduct QoS in a wireless network. Refer to the topic readings, as well as your own additional research on QoS, for successful completion of this assignment. 

All Case Studies

Directions: Refer back to the Design Document. Complete the “QoS Requirements” section. Consider the following:

1. Include a plan for QoS.

· A plan for IP wireless phones.

· Plan for devices accessing applications.

2. Devices connecting to application databases.

· Why are devices connecting to an application database important?

· What kind of problems can be caused by losing the connection to the database?

3. A method to determine the QoS for each of the applications.

· Is there anything needed for different devices/applications vs. IP wireless phones?

Assignment 2: The Basics Behind Effective Police Operations

 

Assignment 2: The Basics Behind Effective Police Operations

Due Week 6 and worth 160 points

Write a four to five (4-5) page paper in which you:

  1. Select at least two (2) types of changes (e.g., public and society, law enforcement officers, police bureaucracy, standards community involvement, technology, etc.), and examine how the selected changes have affected police operations, mission and values, or goals and objectives in the 21st century in the United States. Support your response.
  2. Explain the various lines of communications present within any given local law enforcement agency. Next, determine at least two (2) challenges and concerns that law enforcement might encounter with communication and suggest your strategy to mitigate the challenges. Support your response.
  3. Examine the importance of police patrol in modern policing.
  4. Identify at least two (2) quality of life issues (e.g., panhandlers, prostitution, problems associated with bars and clubs, police interaction with individuals who are mentally ill, homeless people and civil disobedience) that permeate modern law enforcement practices. Propose a response to these issues, based on common practices as outlined in the text, and provide your rationale.
  5. Compare and contrast police reactions as they relate to violence in schools, homes, and workplaces. Provide one (1) example of each to support your response.
  6. Use at least three (3) quality academic resources as references, such as journal articles, newspapers, magazines, and publications from law enforcement associations. Note: Wikipedia, blogs, and similar websites do not qualify as quality academic resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

week 5 paper 5

Research topic: Building an economy: Government planning vs. entrepreneurial innovation,

Instructions:

  • Be approximately 3 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Plagarisim report needed 

cloud computing

Define “Anything-as-a-Service (AaaS) and discuss in detail at least one example AaaS category or implementation. For examples see https://timesofcloud.com/cloud-tutorial/xaas/.

Apply APA Edition 6 formatting. Include an introduction and summary.

Use at least three properly documented references (do NOT use wikis). Correctly cite your references using APA Edition 6 formatting.

Your paper should be 600 words in length using good grammar. Use complete sentences and paragraphs. Do not use bullets.

NO plaigarism.

graded assignment

Using a web browser,search on the term intrusion prevention systems.what are the charactertistics of an IPS?Compare the costs of a typical IPS to an IDPS.Do they differ?what characteristics justify the differences in cost,if any?