Discussion

 

The author proposed one methodology as an example of how risk can be understood and rated fairly easily.

However, there are other methodologies, would you use the proposed methodology at your organization and explain why in comparison to other methodologies

Hash Techniques

MD5 and SHA Functions have been used for years to verify files and messages. Discuss how they have used it.  What is the difference between a one-way hash value and other cryptographic functions? Why is “salt” important? 

Please write 750 words with proper APA format with at least three references cited. STRICTLY NO PLAGIARISM

Information Security Fundamentals, Security Policies, and Operations Life Cycle

 

  • This week we learned about Information Security Fundamentals, Security Policies, and Operations Life Cycle. Based on the week’s objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions of Network Security and Business Priorities. Research these topic areas on the internet to support your information and provide links to the resources cited in APA format.

Discussion on Blockchain best practices

Required text book:

Gaur, N., Desrosiers, L., Novotny, L., Ramakrishna, V., O’Dowd, A. & Baset, S. (2018). Hands-On Blockchain with Hyperledger: Building decentralized application with Hyperledger Fabric and Composer. Packt Publishing. 

This week’s reading(see attachment)  discussed some of the challenges to implementing enterprise blockchain applications, along with a discussion of best practices.

Discussion Topic:

  • Choose one of the best practices presented in the paper assigned as this week’s reading that you find most interesting (and clearly state which best practice you have chosen).
  • Explain why you chose this best practice as the most interesting.
  • Describe how implementing your chosen best practice (from the assigned research paper) will increase the probability of implementation success.   

Other requirements:

Think of three questions you’d like to ask other students and add these to the end of your document. 

  • The questions must be taken from material you read in Chapter 12( The Future of Blockchain and the Challenges Ahead), and each question should start a discussion topic.

Ethical hacking

Required material: https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment. Keep in mind that there should be minimum of four or five sentences in a paragraph.

Questions

In 500 words please answer below 2-3 lines for each Question.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO the UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM? 

US HISTORY PAPER

History 1376 Expansion Paper Assignment

DUE DATE: OCT 26
NO PLAGARSIM
ONLY USE DOCUMENTS PROVIDED WITH PROPER CITATION
SHOULD USE ATLEAST 3 DIFFERENT SOURCES TO CITE (ex. Textbook, article and documentation) Address 2 different context

Citations: Throughout your paper, you must indicate the source of your information and evidence. Since the entire essay is about American Progress, you don’t need to cite the painting every time you analyze a piece of it. Other than American Progress, please cite your sources with the following parenthetical citations at the end of a sentence. If you cite:

  • Lecture: (lecture)
  • Article: author’s last name, shortened title in parentheses: i.e., (Ramos, “Alamo is a
    Rupture”)
  • Podcast: episode title, podcast title: i.e., (“Trail of Tears,” This American Life)
  • Primary document: shortened title/description: i.e., (T. Jefferson letter) or (Cherokee map)
  • Painting: shortened title/description: i.e., (casta painting) or (Alamo)
  • U.S.: A Narrative History: title and page number: i.e., (U.S.: A Narrative History, 40)
    Requirements:
  • 1,000-to-1,250 words
  • Double-spaced, one-inch margins
  • You must use at least three (3) different sources
  • You must cite your sources
    The purpose of this paper is to analyze art as a historical source. The assignment is due by 11:59 pm on Sunday, October 26. Your papers must have your name at the top, and they must be double spaced
    Assignment: In 1872, John Gast produced his famous painting, American Progress, for a popular publishing house specializing in travel guides. The image was reproduced extensively in guidebooks and therefore reached masses of Americans. (The assignment prompt is on the next page.)

page1image28905024 page1image28908288 page1image28905216page2image22631296

Using materials from readings, lectures, and lab discussions, answer the following question:

• Is this painting a realistic or unrealistic representation of U.S. westward expansion to 1872? How so?

Things to consider: what is and is not depicted; how the artist depicts westward-expansion scenes and the various individuals; how the scenes may reflect history and how they may not; how the scenes relate to one another; the overall message this painting conveys.

This is an argument-driven essay. You will state a clear argument at the beginning of the paper and use the body of your essay to back up your argument. You may only use materials from class to build your argument. Take your time with this assignment. Please be sure to keep your paper focused, clear, and concise.

Case study about a company

For this assignment, pick a company of your choice and describes your findings and recommendations by using information learned from the concepts learned from ALL assigned chapters

Cyber security Discussion

  

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?