Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Intro To Data Mining – Discussion

  

Raw data is often dirty, misaligned, overly complex, and inaccurate and not readily usable by analytics tasks. Data preprocessing is a data mining technique which is used to transform the raw data in a useful and efficient format.

The main data preprocessing steps are:

•          Data consolidation

•          Data cleaning

•          Data transformation

•          Data reduction

  1. Research each data preprocessing step and      briefly explain the objective for each data preprocessing step.  For      example, what occurs during data consolidation, data cleaning, data      transformation and data reduction?
  2. Explain why data preprocessing is      essential to any successful data mining.  Please be sure to provide      support for your answer.

Module 4 – Discussion Questions

1.  Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers.  Include the reasons why you chose each of the five risks. 

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.  

PLEASE CHECK FOR GRAMMATICAL ERRORS. DON’T USE BOOKS OR JOURNALS AS REFERENCES.

PHD interview questions UC

 

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Wireless Technology 3

Wireless Technology

Overview

There are a number of cellular phone companies, each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons of 3G and 4G technologies and their roles in today’s applications.    

Instructions

Write a fully developed paper in which you:

  1. Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today’s applications.
  2. Describe how an enterprise would use 3G, 4G, WWAN, and WiAMX to improve business. Explain why they would use one solution over the remaining three.
  3. Analyze the changes in 4G technology since the printing of the textbook in 2013 and identify those of importance for a user of 4G technology.
  4. Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence.
  5. Use at least three quality resources in this assignment.

Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Justify a position on the necessity for wireless application protocol using evidence from research on enterprise use and evolution of relevant technology.

weaknesses of biometric authentication

 

  • Submit a paper on the weaknesses of biometric authentication
  • There are numerous examples of weaknesses, write about the ones which interest you the most
  • Do NOT use bullets, that is not APA format!
  • Paper MUST be submitted in APA format
  • Propose a mitigating control or controls to help overcome the weaknesses identified in your paper
  • Submit 3 pages double spaced
  • No photos or graphs
  • Reference all sources used
  • Individual work and NOT a group effort

cs-2

In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.

Research Report On Comparative Analysis Of Two Programming Languages FORTRAN And COBOL Language

Research Report on comparative analysis of two programming languages Fortran and Cobol language

Must follow the guide and instructions PDF.

Research Report Guide:

The structure of the paper MUST follow the guide & instructions. Please find attached both documents.

 Include All sections

Front Matter – Title page (with Running head), blank Approval page, Abstract, blank Acknowledgement page, Table of Contents, List of Figures  (if necessary), List of Tables (if necessary)

Chapters 1 – 5

Appendices (if necessary)

References (as per APA)

APA Formatting Guidelines:

The structure of the paper MUST follow APA guidelines. Examples can be found on this website: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

The important APA formats include the following

In text citations

References (with the hanging indents)

Page numbers

Font style and size

Tables and Figures inclusion (must add sources as per APA)

Headings and subheadings format