Air force missile

For this assignment, you will also need to read the 2 papers that are saved as:

15 sept-lights-out.pdf and 15 sept-HPEM.pdf, which can be found on Canvasor at the links:

https://breakingdefense.com/2012/10/new-air-force-missile-turns-out-lights-with-raytheon-microwave-t/

https://defensesystems.com/articles/2017/10/18/air-force-hpem.aspx

2.Read the 2 articles about Raytheon’s new missile.  What does this missile do?  Explain very clearly.[4 pts]

3.From an Information Systems standpoint, explain the impact of what this means, i.e. if this missile was actually used, what is the impact to any and all information systems –impact to anything else??  Give this deep thought and be VERY complete! [8 pts]

4.Does this concern you? (Think hard about this before you answer!)   How?  STRONGLY Support your answer with specific examples of your concerns or likewise be very supportive of why this does NOT concern you.[8 pts]

5.Next, research SDI (Strategic Defense Initiative) or “Star Wars”, which was a President Reagan term and initiative.  What is this(be very clear)?  Could this help the current (potential use of EMPs) situation?  Explain thoroughly.[8 pts]

6.Lastly, imagine that you have been hired to protect your company against these Raytheon missiles.  What options do you have?  Be very clear and thorough.Think through ALLpossibilities. (feel free to be creative!))[8 pts]

Not to exceed two pages.

Project-new

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

emerging threats and counter measures wk12

 

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

W11

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words

Reflection paper 3

 

Reflection Paper:

For each assigned presentation,  you must write a “Reflection Paper”.  This paper is to be a write-up of your learning, observations and reactions to the presentation and must demonstrate both your reflections about and your understanding of the topic(s) presented by our guest speakers.  Your write-up must meet the following criteria:

  • Content Demonstrates understanding of the topic(s) covered by speaker(s) and includes reflections upon these content areas:
    • Three new things that you learned from the speaker.
    • Two reasons why (each) functional role of IT presented is important to the business.
    • One question that you have regarding the area of IT that the speaker covered.
  • Adherence to Excellent Writing StandardsAttendance Criteria Met
    • Between 300 – 400 words
    • 12 Point Times New Roman Font, 1.5 spacing, standard 1″ margins
    • No spelling or grammar errors
    • Well written – concise and coherent
  • Well Formatted, easy to read and grade (meaning – easy to find your required content)
    • Visual cues that aid reading, such as: paragraphs, bullets, section headings, etc.
    • A readable reflection that presents organized thoughts and ideas

block chain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

security architecture 17

 

Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier
  • Other reputable sources are OK.

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page. 
  • Each source should be cited in the body of the paper to give credit where due. 
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 4 pages in length. 
  • The Title and Reference pages do not count towards the page count requirements.

cloud computing service

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.