EH week5 DB

 

Hello,

i need this paper by 09/23 afternoon.

Strictly No plagiarism please use your own words.

Explain in your own words what “FOOTPRINTING” (or digital reconnaissance) is and how you would go about gathering the information you need to determine the location of a recently stolen late model car that was last seen in the parking lot of our college.

write 300 words assignment.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Countermeasures used in a Crisis Response

 

Media loves to tell the horror stories of disasters after security breaches. IS professionals must pro-actively plan countermeasures and continually study and learn from past events. Select a past news story of a failure caused by one of these events to provide an analysis of the failed system using some of the countermeasures you have learned in this unit. Recommend strategies to minimize the loss of IS services/data in those events as if you had been on the IT team during this event. Keep in mind that the focus of this assignment is the response to a crisis – after the event (not preventing the event).

Please submit a three page report with APA cited references to support your work.

Countermeasures to consider for your responses:

  • Fix known exploitable software flaws
  • Develop and enforce operational procedures and access controls (data and system)
  • Provide encryption capability
  • Improve physical security
  • Disconnect unreliable networks

Research Current Legal Rulings

 

Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.

In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action. 

For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.

  • Go to:  the Federal Register. https://www.federalregister.gov/.
  • Use the Search bar to find rulings related to your topic.
  • Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
  • Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization. 
  • Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).

Possible topics for your search:

  • Anti-malware
  • compliance/auditing
  • forensics
  • ID management
  • Intellectual property
  • Managed security service providers (MSSPs)
  • Messaging safeguards
  • Patch management
  • Perimeter defenses
  • Security information management (SIM)
  • Security event management (SEM)
  • Incident response
  • Transaction security
  • Wireless security

Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the attached chart format for your summary. 

Research Paper: Risk Management

Research Paper

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Managerial Economics D-1

using the link below write the discussion 350 words

Free Markets Didn’t Create the Great Recession

Read the attached opinion piece where the author indicates that the Great Recession of 2009 was not caused by the Free Market, but was instead caused by US Government policies.   

Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology. 

2) 2 replies each 150 words

Understanding RSA

In this project assignment, you will create a program with any high-level programming

languages as you prefer (e.g. Java/C++/Python/Go …) to implement a simplified

version of RSA cryptosystems. To complete this project, you may follow the steps

listed below (demonstrated in Java code) to guide yourself through the difficulties .

Step I Key-gen: distinguish a prime number (20 pts)

The generation of RSA’s public/private keys depends on finding two large prime

numbers, thus our program should be able to tell if a given number is a prime number

or not. For simplicity, we define both prime numbers p and q within range 0 < p, q <

10,000,000 so that a 64 bits primitive type (e.g. long in Java) should be sufficient

to handle most arithmetics calculations involved.

Therefore, your first step is to implement a method that takes such a number in range

as input and output a boolean type value to indicate whether it’s a prime number:

Technology Entrepreneurship

Que 1:  Discuss this statement: “Internationalization is a relevant strategic option for high-tech venture expansion and growth.” What makes this statement true? What facts support this statement? – Almost 1 page

Que 2:  Discuss this statement: “The application of financial theory to new venturing has uniquely defining characteristics that differentiates it from classical corporate finance.” What makes this statement true? What are the defining characteristics? – Almost 1 page

Que 3:  Read the attached case study and write 2 and a half-page summary analysis and answer the Case Study Questions.  

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. Que 3 needs to be in separate document. I have also attached APA 7th edition format for your reference. Please review and create the paper accordingly. 

Virtuous Business Model

What would your story look like if someone asked you to present the relation of the analytical view to its paradigm.

Analyze your story from the perspective of the Virtual Business Model.

400 words with 3 references.