Week 7 Discussion – ITM capstone

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. 

Please add references in APA format. Answer should be in 250 words. 

 

css210

Technical Report-

Your report should consist of the following sections.

  1. Cover Page: Include the course title, project title, submission date, and name.
  2. Introduction: State the objective of the case studies, and provide some background information.
  3. Network Design: Summarize the background for Case Study I. Provide a diagram of your network and the class diagram. Describe in detail the research/changes/suggestions.
  4. Security Implementation: Summarize the background for Case Study II.  Discuss the strategies you proposed for securing your network as well as any added to the class network.
  5. Hacking: Summarize the background for Case Study III. Discuss the methods you suggested to test the security strength of your network  (i.e., attempt to hack into your network) as well as any added to the class network.
  6. Results and Discussion: Discuss overall results of the final network and any additional insights and information related to your findings.

Encryption:

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

CLoud_Computing_Research_paper

 Heartland Payment Systems 

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 800 words and to label which section below written about.

Include:

I. Company Name- Heartland Payment Systems—type of company—brief history—Industry—Customers (consumer, business, or both)

II. Type of threat

III. What or (who) caused the threat

IV. How the threat was discovered

V. How the threat was resolved

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded. – THIS IS MY QUESTION TO WORK ON. PLEASE START WRITING ON THIS QUESTION.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Body

· Conclusion

· Reference page

· Minimum 3 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted

password standard

 

Write a password standard for CSI documenting your password recommendations.  Your paper should look like a real policy document and not an academic paper.

At the end of the standard, cite one reference for your recommendations.  Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule.  If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument.  Your citation does not need to be in any formal citation style.  Ensure that your citation is good enough to find the reference.

This must be an original work.  Do not rely on publicly available templates to fill in.  Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool.  It is common for subject headers to match previous submissions. You may get a match score in the 30% range.  Don’t worry about that.  I’ll be looking for original work in the body of the paper.  Bottom line – you’re a creator, not an editor.

Read examples of password standards online.  Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together.  You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology).  Happy Googling.

RDBMS CONCEPTS

 

The use of keys are instrumental in database management. Primary keys  allow for distinct records and foreign keys tie records together to  create unique relationships between two or more entities and/or tables.  In Blockchain, we know that a hash is the equivalent to a key – and  makes the chain secure and indisputable (or so we think). Why is it then  that with an RDBMS, a primary key and foreign key can still create  redundancy, thereby causing data anomalies? Can the same be said about  blockchain?

Instructions

  • This is a required assignment, worth 15 points. The assignment  must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of  others. Use in-text citation and list the reference of your supporting  source following APA’s style and formatting. Points are deducted per the  rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet  and claim that is your work. It will be considered Plagiarism and you  will receive zero for your work. A second offense results in a zero for  the course. A third is termination from the university.

EH week15 DB2

 

Hello,

i need this paper by 01/06 afternoon.

Strictly No plagiarism please use your own words.

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. 

The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized. 

Discussion/Research Questions (300 words)

  1. Briefly explain your views on what the zero trust architecture is attempting to solve? 
  2. How do you build a Zero Trust Architecture?

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism