Week 2 discussion 1

The Department of Defense Directive (DoDD) 8140 (formerly 8570) provides guidance and procedures for training, certification, and management of all government employees who conduct information assurance functions in assigned duty positions. In some career positions, DoDD 8140 impacts those with access to DoD information system performing assurance (security) functions.

As an independent contractor considering a move into the DoD contract arena, discuss additional considerations you would add to your compliance plan to meet DoD requirements. Assess the pros and cons of adding DoD contracts to your portfolio. 

Reflection Assignment

Provide a reflection of at least 600 words (or 2-4 pages double spaced) of how the knowledge, skills, or theories of this course (Enterprise Risk Management) have been applied or could be applied, in a practical manner to your current work environment (Hadoop Environment). If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide at least 600 words (or 2-4 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. The paper should NOT resemble your official resume!

This assignment asks that you reflect on how the knowledge and skills obtained by meeting course objectives were applied or could be applied in the workplace.

Discussion

 

A typical DMZ is a network virtualization schema when a particular network connects to at least two different networks with different security levels. 

What would be the Cloud Based DMZ Architectures’  Challenges? Support your answer with Examples

Cyber security Assignment

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?

WEKA lab

Produce a hierarchical clustering (COBWEB) model for iris data. How many clusters did it produce? Why? Does it make sense? What did you expect? Change the acuity and cutoff parameters in order to produce a model similar to the one obtained in the book. Use the classes to cluster evaluation – what does that tell you?

Operations Security

 In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.
(250-Words)

                                                              &
For this Work, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

Discussion (300 words)

DESCRIBE IN LAYMAN’S TERMS, WHAT DIFFERENTIATES POSITION Software Developer Engineer in Test(SDET) FROM OTHER RELATED POSITIONS THAT DO NOT REQUIRE A BACHELOR’S DEGREE

Also few words on training (INSERT DESCRIPTION OF TRAINING) that requires for role like Java, SQL, Cloud knowledge.

Articlee writing

please discuss the case involving the United States of America versus Ross Ulbrecht.

Words: 500 words APA format

Web Link

Word Assignment

 

  • Update your MS Word Assignment #3 by incorporating  the feedback you received on that Assignment 3 (the initial draft) to arrive at your final draft: your MS Word Assignment 4.
    Ensure to format your paper according to the APA formatting style.  It should include:

    • Title page
    • Table of Contents
    • Abstract
    • Body of paper with sources credited parenthetically
    • References page (having at least 6 sources in APA style)
    • Submit this final draft document (one Word file) by clicking on the MS Word Assignment 4 link.
  • Web LinkHow to create a table of contents in Word
    How to create a table of contents in WordFollow the steps on this Web page on how to develop a table of contents.
  • ItemExample APA FormatAttached Files: