2 pages for each research paper
Cyber Security: Kali Linux Lab
I have a Lab assignment that has to do with Kali Linux.
Youll have to watch 2 walkthrough videos:
The first video is regarding setting up Kali Linux
The second video is regarding setting up WordPress.
Once you successfully watch the two videos, you will then start the lab. The procedures of the lab are in the attachment section.
Database management systems Or DBMS (Network Security- Cybersecurity)
A database management system is an application that provides users with the means to manipulate, analyze, and query data. Almost all DBMSs in existence today are developed to be used with relational databases. Describe in a minimum 2-page essay (about 1,000 words, double spaced, APA format) a DBMS that you have dealt with at a company, or as a customer. How was it used to help you access the data?
HomeWork Assignment
This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:
- Provide a high-level overview/ summary of the case study
- Note how constructive intentionality impacts innovation implementations
- Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.
Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:
- 3-5 pages in length (not including title page or references)
- APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
- A minimum of five peer-reviewed journal articles.
The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.
bi-12
Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses.
must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Minimum 350 words
Malware detection project
Your Research Project is due this week. It must consist of:
1. 5 source annotated bibliography
2. slide presentation with 12 or more slides
3. Summary or Abstract containing at least 750 words.
The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.
Computer
You work as an administrative assistant for the President of Bass University which employs around 300 faculty and staff.Your immediate supervisor, the President, has just informed you …
YD
Scenario Summary:
This scenario covers a contract dispute situation. The contract in question is an agreement between Systems Inc. and Big Bank. Please review the contract located in Scenario Summary of the “You Decide” page to familiarize yourself with the specifics of the contract.
Your Role/Assignment:
You are the manager of a large data processing project. Your company, Systems Inc., worked very hard to obtain a contract with Big Bank to do the data conversions from their recent acquisition, Small Bank. The bank met with several companies to discuss who would do the best work on the contract. During your meeting with Big Bank, you told them that you had “never missed a conversion deadline.” At the time, your company had never missed a conversion deadline, but the company had only done three conversions. You also told them that “your data processing systems were the fastest around.” After months of negotiation, Big Bank signed the contract. The President of Big Bank said, “We like fast, and you guys are fast. We choose you.”
You started work on the data conversion immediately (ahead of contract). According to the contract, your team was responsible for ensuring that the new bank’s data was converted to Big Bank’s data processing system. The contract involved six large conversions. The first involved converting Big Bank’s savings accounts; the second, its checking accounts; the third, its investment portfolio; the fourth, its credit card operations; the fifth, its mortgage portfolios; and the sixth, its large business loans. Your team completed four of the six conversions without a problem. The fifth task, the largest and most important, has encountered numerous problems. Some problems have been based on personnel issues on your part and other issues have been based on the bank’s failure to provide you with necessary information. One issue resulted when the conversion was delayed for over one week. The data to be converted was formatted differently than the bank’s previous specifications provided. For that reason, the data conversion fields needed to be changed. A provision in the contract required your company to receive the approval of four individuals before making any changes to the conversion data fields, and one of those four people, Glenda Givealot, was out of the country doing missionary work in an area of the world that did not have cell phone reception. Another issue arose when the conversion was supposed to occur. Because of the change in the timeline, the conversion schedule had to change. The weekend the conversion was rescheduled to occur, an ice storm struck the state where your data processing computers were housed. Your facility lost electricity for three days, causing the conversion to be delayed once again.
Questions:
1. Question: (17 points)
Can Big Bank’s President rescind the contract? Under what circumstances can a contract be rescinded by either party? What facts have to be alleged and proven? What is the result of a contract that is rescinded?
Solution:
2. Question: (16 points)
Big Bank’s President also threatens legal action. What potential causes of action could you foresee him bringing in court? Would he be successful? Why or why not? What arguments could Systems Inc. raises in its defense? What are Big Bank’s potential damages?
Solution:
3. Question: (17 points)
Review the facts provided and the sample contract. What provisions of the contract could you cite to support an argument that it is not in Big Bank’s best interest to rescind the contract? What facts could you cite to support an argument that Big Bank be responsible for some of these issues and/or not in compliance with the contract?
Solution:
4. Question: (16 points)
In this situation amicable resolution of problems is greatly preferred by your company. Would this be true in all contract disputes? In what situations would you decide to litigate? Why would you decide to move to litigation rather than attempt to reach an amicable resolution?
Solution:
5. Question: (17 points)
There are 3 types of contract performance: 1)complete performance; 2) substantial performance; and 3) material breach. Describe the differences (and similarities) among the three, and explain some of the legal ramifications for one or more of these types of performances. (For example, what happens if one party performs completely but the other party performs only substantially?) Give examples from outside readings or experiences in your career or personal business life.
Solution:
6. Question: (16 points)
What are the two most important concepts from this exercise that will help you in future contract negotiations?
Solution:
Solution answers must be at least one half page each. Show each question on a separate page.
Apply: Systems Requirements Presentation
Assignment Content
- Imagine this scenario: After considering their 3 target markets, Pine Valley Furniture’s board of directors has selected the student furniture project for the WebStore. They are asking you to help them choose a method for determining the requirements.
Create a 12- to 18-slide presentation in which you:
- Compare traditional, contemporary, radical, and agile methodologies for requirements gathering.
- Outline advantages and disadvantages in your comparison.
- Recommend the methodology you think will work best for Pine Valley Furniture’s student furniture WebStore.
- Explain the figure below. It used to be “Figure 7-22: Level-0 DFD for the WebStore” of Ch.7, “Structuring System Process Requirements” from Modern Systems Analysis and Design.
-
Include detailed speaker notes.
Consider incorporating multimedia and images where appropriate.
Cite references to support your assignment.
Format your citations according to APA guidelines.
Submit your assignment.
Resources
- Center for Writing Excellence
- Reference and Citation Generator
- Grammar and Writing Guides
- The Rubric Template shows how the paper will be graded:
Week3_IA_Rubric_template.docx
Research Current Legal Rulings
Please submit your work using the table below as an example in a three to four-page report with APA cited references to support your work. You may add or remove additional columns as needed.
In this unit, you will see information about laws that have been passed several years ago, but you may not see all of the updates and changes that the government makes. To see these updates (rulings), you can search the Federal Register at https://www.federalregister.gov/. This an ongoing information source that summarizes all of the activity of the federal government that required a vote or action.
For this assignment, search the Federal Register for five cases that interest you. A list of possible search topics is listed to help you get started.
- Go to: the Federal Register. https://www.federalregister.gov/.
- Use the Search bar to find rulings related to your topic.
- Then select “rule” for Type (left side menu). This will reduce your search to only show the final rulings (not proposed solutions or public announcements).
- Read through a few of the rulings – you will see a summary of the case, which usually will describe the event that has prompted the need for this law. You will then see the resolution, These are the items that will direct you when you create a compliance plan for your organization.
- Finally, think about potential breaches and what this ruling may NOT have addressed. List a few of the questions that you may still have about this direction from the courts. (critical thinking about what else you would need to do to be in compliance with a ruling like this particular case).
Possible topics for your search:
- Anti-malware
- compliance/auditing
- forensics
- ID management
- Intellectual property
- Managed security service providers (MSSPs)
- Messaging safeguards
- Patch management
- Perimeter defenses
- Security information management (SIM)
- Security event management (SEM)
- Incident response
- Transaction security
- Wireless security
Select five of these laws and summarize the law, suggest a compliance plan, and identify possible breaches. Use the attached chart format for your summary.