Legal-Sultan1 assignment

 In the attached article,  Sultan, Mushtaq, & Abubakar (2019) outline several security concerns associated with the rise in IoT technology. What implications might these concerns present to the future of contract law and privacy liability?  

week 3 progress log

 

Beginning in week one, you should keep track of the time that  you spend on the planning, design, and implementation of this project.  Every week you will complete the Weekly Work Log and Hands-on Progress  Report that you started in Unit 1.  

This is a living document.

Each week you will add on to the log that you had saved for the  prior week. For example, in Unit 3, you will have Unit 1, Unit 2, and  Unit 3 work activities documented. 

After completing it for the week, you will submit your work every week. 

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are social networks, how do people use them, and what are some of their practical business uses?
  • What are some of the key ethical issues associated with the use of social networking Web sites?
  • What is a virtual life community, and what are some of the ethical issues associated with such a community?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process-control systems, and consumer products?
  • What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality?
  • What are the four most common types of software product liability claims?

Infotech Global Economy

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Building Secure Web Applications

 

1) 

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

2) 

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

Your assignment should be 200-300 of your own words wth references and citations

Bus Cont Plan&Disas Recov Plan

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Assignment should follow all APA rules and include a min. of (1) citation/reference.

ns-d-11

 explain what is meant by an IDS and an IPS.  How are they different?  How are they connected to a network?  List a few examples of IDS/IPS tools that are currently on the market.  300 words

Running game

Run 3 online

Start running and jumping like there’s no tomorrow!!! The goal here is to get as far as you can in the weird corridor and avoid falling below in the deep space. Once you reach a certain distance inside the corridor, the level will automatically rise up. There are lots of missing platforms inside, and you should jump over them or walk on the sides to rotate the whole corridor. Collect power cells when you see them and use these items to buy costumes or power-ups.

 

Controls

  • Use left and right arrow keys to move.
  • Use Space to jump.

Web/Link  Run 3 online.