I need writing papers

I have one full course for cyber security. There are 16 weeks and have to do the discussion papers and response and final week. Please do placed your bid after reading the attachment.  

Discussion question, 300 words and 2 references.

Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

Project Management

 Read an article or watch a video about a recipient of PMI’s Project of the Year award.

Search online for information from PMI’s website.

  • Write a two page paper summarizing a winning project, focusing on how the project manager and team used good project management practices.

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

 

  • Cite your source, must have been written within the last five years.

Case Study

Complete the attached case study.

Follow all directions and answer all of the questions located at the end of the case study.

Download the attached risk analysis template to use as your complete your case study. 

Cloud Computing

 

Write a paper discussing the obstacles, difficulties, and other criteria that should be considered when migrating infrastructure and data from a private data center to a public cloud provider.  

Apply APA Edition 6 formatting.

Use at least three properly documented references (do NOT use wikis).

Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar.

Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

There is a APA Word template in week 1 with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Cyber security planning and management

It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters? 

300 Words

DISCussion

  

In 300 – 450 words, and using the Jamsa (2013) textbook as your ONLY source, respond to the following:  

Using each as a level 1 heading, list and describe three of the most common forms of virtualization IN YOUR OWN WORDS. Then, choose two you would use in a new business.

Why did you choose these two? Would your choices change if you had a different type of business? Why? Why not?

DQ

http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf