Access Control

 Topic: Access control planning & implementation in an enterprise environment
PAPER:
write an 8-page paper that must include all of the following: Discuss the strengths/weakness of the topic and possible improvements. Discuss what you have learned from this assignment and how you will apply it moving forward in your career. Use at least one NIST resource as a reference. Use a minimum of 10 peer-reviewed resources. APA format; Times New Roman 12-point font. The title page and reference page do not count towards your 8-page minimum.

PRESENTATION:
A minimum of 10 slides. The title slide and reference slide do not count towards your 10-slide minimum. Include speaker notes on each slide. 

Research paper 6

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

Article readings: Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

NO plagiarism at any cost. 

Due on Sunday (10/04/2020)

COMPUTER

 

Below are some example good topics but any topic that can associate use of computers and technology is fair game to use for this final written paper.

  • Application of Artificial Intelligence
  • Application of Technology and Computers applied to a Field of Study
  • Biotechnology
  • Electronic Commerce
  • Electronic Monitoring
  • Management of Information Systems
  • Geometric Computation
  • Gaming
  • Green Computing
  • Hardware/Architecture
  • Human Computer Interaction
  • Informatics
  • Internet Systems
  • Knowledge Management
  • Machine Learning
  • Mobile Computing
  • Networks
  • Nursing Informatics
  • Robotics, Vision & Physical Modeling
  • Scientific Computing
  • Security and Privacy
  • Smart Cards
  • Social and Academic Networking
  • Social Commitment using Technology
  • Software/Operating Systems
  • Systems Reliability/Dependability

Assignment Expectations

Length: Minimum of 1500 words; thoroughly addressing research topic in a clear, concise manner.

Structure: Include a title page, abstract, and reference page in APA style. These do not count towards the minimal word amount for this assignment.

References: Use the appropriate APA style in-text citations and references for all resources utilized to answer the questions. Include at least three (5) scholarly sources to support your claims.

Format: Save your assignment as a Microsoft Word document (.doc or .docx).

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)

Select one industry and highlight the advancements Blockchain has had on that single industry.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the  readings from the course and at least two scholarly journal articles to  support your positions, claims, and observations, in addition to your  textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise,  and logical, using excellent grammar and style techniques. You are  being graded in part on the quality of your writing.

Discussion forum on Article readings

Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

This week’s reading introduced an overview of blockchain and its impact on business(see the attachment). 

Discussion:

 1.choose a use case from section III, and a risk for adoption from section IV. 

2.Describe a real blockchain-based product that implements your chosen use case and how your chosen risk could impact the project’s success. 

3.Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion. 

Write one page document

Assignment2020

 Follow the instructions outlined in the attached PowerPoint presentation.  Use the information to write a 5-page paper conducting a risk assessment based on the information from the presentation.  Remember proper APA formatting, cite and paraprhase your sources. 

4 discussions due in 24 hours

 4 DISCUSSIONS DUE IN 24 HOURS – 50 WORDS EACH

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 

Browsers 

All browsers can retrieve and display webpages, but their features and ease of use vary. Many factors can affect the decision to choose the browser that best fits your needs.

Many browsers are included by default with some mobile devices and smartphones. Their features vary greatly. Some allow users to zoom and use keyboard shortcuts with most websites, while others display only websites optimized for mobile devices. The more popular mobile browsers are Chrome, Firefox, Internet Explorer, Edge, Safari, and Opera Mini. 

View the below YouTube video on Alternative Browsers

 https://youtu.be/WL2YkK5dvkg 

 Research and discuss the advantages and disadvantages of popular browsers available today? 

 

INSTRUCTIONS: 

  • Respond to the following topic in a minimum of 50 words. 

 

Files and Directories

A root directory is the very base of a file system, under which all other directories are sub-directories. The root directory changes for different volumes. In other words, the root directory for the C: volume is different from the root directory of the D: volume because each volume has its own root directory. 

View the below YouTube video which demonstrates working with Windows files and folders.

  https://youtu.be/4-MF7t5KGuQ 

Why should folders be created on a hard drive instead of placing every file in the root directory?

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Protection from Viruses and Other Malware

Click the link below to view the video from TEDTalks  as computer security expert Mikko Hyppönen tells us how we can stop these new viruses from threatening the internet as we know it.  

TedTalk Video: Fighting viruses

It is impossible to ensure a virus or malware never will attack a computer, but you can take steps to protect your computer.

What precautions do you take to prevent viruses and other malware from infecting your computer? 

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words. 

 

Would You Connect to an Unsecured Network? 

View the below YouTube video on WiFi (wireless) security.

 https://youtu.be/WZaIfyvERcA 

 What would you do if you found out that someone was using your wireless home network without your permission? How should legal authorities address such abuse? What punishment should violators receive? Should those leaving their networks unsecured receive punishment, too? Why or why not?  

 

INSTRUCTIONS: 

  • Respond to the below topic in a minimum of 50 words.

Entry level networking

I have a timed packet tracer assignment that I would like to complete after 10pm this evening.  I will not know the details until I open the assignment and then clock starts.  My guess is that it will be building a small network with 7 or less devices and will involve some subnetting and will require to ping a device.  I will need somebody that can be on the phone with me for 40 minutes to help me.  I can copy and email the assignment once it is opened.