I have one full course for cyber security. There are 16 weeks and have to do the discussion papers and response and final week. Please do placed your bid after reading the attachment.
Discussion question, 300 words and 2 references.
Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.
Project Management
Read an article or watch a video about a recipient of PMI’s Project of the Year award.
Search online for information from PMI’s website.
- Write a two page paper summarizing a winning project, focusing on how the project manager and team used good project management practices.
- A minimum of 500 words excluding the title page and references is required.
- Use APA format – Refer to APA Style
- Cite your source, must have been written within the last five years.
PLEC Week 7
In 500 words
Watch the Movie War Games from 1983. According to the https://www.nytimes.com/2016/02/21/movies/wargames-and-cybersecuritys-debt-to-a-hollywood-hack.html, this movie had a tremendous effect on President Ronald Reagan. Discuss your opinion on whether it should be required viewing in social studies classes in high school. Do not repeat the story. Discuss it’s use in school
Case Study
Complete the attached case study.
Follow all directions and answer all of the questions located at the end of the case study.
Download the attached risk analysis template to use as your complete your case study.
Cloud Computing
Write a paper discussing the obstacles, difficulties, and other criteria that should be considered when migrating infrastructure and data from a private data center to a public cloud provider.
Apply APA Edition 6 formatting.
Use at least three properly documented references (do NOT use wikis).
Correctly cite your references using APA Edition 6 formatting.
Your paper should be at least 500 words in length using good grammar.
Use complete sentences and paragraphs. Do not use bullets.
Be sure and use a spelling and grammar checker.
There is a APA Word template in week 1 with default font and spacing.
Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.
Cyber security planning and management
It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters?
300 Words
DISCussion
In 300 – 450 words, and using the Jamsa (2013) textbook as your ONLY source, respond to the following:
Using each as a level 1 heading, list and describe three of the most common forms of virtualization IN YOUR OWN WORDS. Then, choose two you would use in a new business.
Why did you choose these two? Would your choices change if you had a different type of business? Why? Why not?
DQ
http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf
Computer science Racket project
instructions, requires all in the attachment