Reflection

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course “Enterprise Risk Management” have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

cryptographic hash

Assignment Content

  1. In this assignment, students will expand on the information provided in the course.

    Answer the following in a 2- to 3-page paper:

    • Define cryptographic hash function (CFH).
    • List and define the main properties of an ideal cryptographic hash function.
    • Give at least 2 applications or uses for a CFH (example: password verification) and a brief description of how it is used.

Write about OAuth.

Write  500 words or more explaining why this “OAuth” is important for your peers to understand. Be focused and specific. You should do a deep dive into a topic.

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Gap in Current Market

  

Determine where there is a gap in the current market. Next, determine what market you want to research (For example, gaming, networking, system security, etc.). You can choose any market you like.

Using APA 7th edition formatting In a Word document, submit a one-page research proposal, including the following information (The page count does not include the cover page and reference page):

  1. Identify the market you have chosen
  2. Include the name of your proposed company
  3. Explain why you feel there is a niche or area for you to       succeed in the market
  4. Research other companies in the same market and identify why       they fail to provide the goods or service you are offering and contrast       them to the goods or services your company is going to offer.

Topic name: The vision of Airport Security.

Thesis statement: We Believe Artificial Intelligence is going to be the future of security at the Airport. It will immensely reduce human interaction thereby enhancing protocols.

Requirement :  

Your research should include speculation on where the state-of-the-art will be in the near future for one

of the following technologies. The group paper could include a description of the state-of-the-art in

physical security technology, a discussion of where the sources that you read believe the physical

security technology is heading in the near future, and a discussion of how this technology will affect the

choices you would make if you were making purchase recommendations for a client. Although there is

room for personal opinion in your paper, you must justify your conclusions.

The team needs to consider all the possible roles that need to be supported in this organization that

includes Access Control with CCTV Cameras, Surveillance cameras, Facilities Security Plan, Biometrics,

Glass, Window, Fences, Chain-Link Fence Standards, Floor Plan, and customer support.

The overall assignment is to develop a comprehensive plan for this fictitious organization in a form that

would be appropriate for a Word Document and as a PowerPoint slideshow for management. You may

consider this as the means of presenting your conceptual plan.

Physical Security -Reflection paper

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Note :Please write based on the attached Textbook

Assignment

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of examining, transforming and exploring your data to develop a robust familiarisation with its potential offering:

Examination: Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

Transformation: What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Exploration: Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Assignment Link: http://book.visualisingdata.com/chapter/chapter-4

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.