5s week 7 assignment PL

In 400 words

Watch the Movie War Games from 1983. According to the New York Times, this movie had a tremendous effect on President Ronald Reagan.  Discuss in 500 words your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include references, Do not copy paste.

positive rights table

Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:

  • The right to a higher education
  • The right to private phone conversations
  • The right to health care
  • The right of a presidential or government candidate to receive time on television

List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.

Access control assignment 7

Discuss how Access Control takes into account human nature of their employees to protect the system. 

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

IT204 Office 365 Application


400 words 

This week we will discuss copyright. In your post, explain these topics: What is copyright. What does it protect? When does an author or creator gain copyright privileges? If you want to use a copyrighted work for commercial purposes, what do you need to do or have? (Think about permissions and citations.) Reply to two of your classmates’ posts.  Cite your research references, including the reference for the photo.

Discussion

 As you meeting with a client, What are the top 3 points/topics that qualify as an assessor to perform a professional information security assessment? explain with examples  

Computer Forensics

 Assignment: Denial of Service ToolsLearning Objectives and OutcomesDifferentiate between tools that are used to create a denial of service (DoS) attack.Assignment Requirements
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:

  • Tribe Flood Network
  • TFN2K
  • Trin00

For this assignment:

  1. Search the Internet for information about these three tools.
  2. Provide a description of each of the three tools.
  3. Describe the damage or impact of denial of service attacks.
  4. Summarize the efforts used and solutions found to combat these attacks.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
  • I described each of the three tools.
  • I described the damage or impact of denial of service attacks.
  • I summarized the efforts and solutions found to combat these attacks.

Need help! due in 3 hours!

 

Assignment Content

  1. The presentation was a success, and the CIO of the organization you chose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the IDS solution. Therefore, you will provide him with the following information to consider in his planning:

    Part A
    Create 1- to 2-page summary, and do the following:

    • Identify the number of additional employees necessary to rollout and support an IDS desktop solution.
    • Explain how individuals will work with the existing desktop support and malware teams.
    • Identify the job title for those who normally perform rollout and support functions for the IDS desktop solution.
    • Outline the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution.
    • Part B
      Create an infographic displaying an organization chart, and do the following:
    • Identify job titles provided in your summary and how they fit in with the existing cybersecurity team.
    • Indicate the industry certifications the new IDS rollout-and-support-function employees should have or can work toward.
    • Format your citations according to APA guidelines.

      Submit your assignment.