final grad project : Ethical Hacking

 

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Web application using ReactJS

 

You are a graduating software engineer who is looking to apply to a few software engineering positions at various Fortune 500 companies. You decide to make a personal portfolio website that showcases some of your work so that you stand apart from the other applicants.

Using React, create a web application that has the following:

  1. A home page with a short description of yourself, what you are looking for in a position, and one project that you’ve worked on.
  2. A contact page with a text box and a submit button that shows a success message when the user submits a query.
  3. A navigation bar and footer.

You must use client side routing to handle page navigation.

Final Paper

1)  Surveillance state might be dangerous 

Abstract

 Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey.  

2)  Surveillance capitalism-Centered around commodification 

Abstract

 Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. 

3)   Car Hacking  

4) Disaster recovery

 5)  Do some research on Threat Response software. Find one particular software package to investigate.

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else. 

Write 200-300 of your own words 

Organizational Theory : Journal Article Summary 8

 Pick one of the following terms for your research: authority, competition, confrontation, dependency, empowerment, intergroup conflict, negotiation, organizational politics, power, or rational model. 

 

find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept.

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

introduction to information technologies

Apply the knowledge obtained in this chapter and prepare a research paper in  MLA style named:  History of cryptocurrency.

  • with at  least 4 pages long.
  • document should have an overview of how the Internet has evolved from its beginnings in the 60’s until today.
  • make sure the document complies with all MLA style standards.
  • when done upload the document.

assignment2

Assignment 2

DEVELOPING INTIMACY WITH YOUR DATA

This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest, then follow the simple instructions to download it. With acquisition completed, work through the remaining key steps of importing, exploring and examining your data to develop a robust familiarization with its potential offering:

Thoroughly examine the physical properties (type, size, condition) of your dataset, noting down useful observations or descriptions where relevant.

What could you do/would you need to do to clean or modify the existing data to create new values to work with? What other data could you imagine would be valuable to consolidate the existing data?

Using a tool of your choice (such as Excel, Tableau, R) to visually explore the dataset in order to deepen your appreciation of the physical properties and their discoverable qualities (insights) to help you cement your understanding of their respective value. If you don’t have scope or time to use a tool, use your imagination to consider what angles of analysis you might explore if you had the opportunity? What piques your interest about this subject?

(You can, of course, repeat this exercise on any subject and any dataset of your choice, not just those on Kaggle.)

Getting Started with R Tool

Complete this tutorial to assist with the assignment

· Data Importing Using R – http://www.r-tutor.com/r-introduction/data-frame/data-import

· R Data Type – http://www.r-tutor.com/r-introduction/basic-data-types

· R Data Vectors – http://www.r-tutor.com/r-introduction/vector

· R Data Frame – http://www.r-tutor.com/r-introduction/data-frame

· Data Import – http://www.r-tutor.com/r-introduction/data-frame/data-import

· Data Statistic – http://www.r-tutor.com/elementary-statistics

empowering leadership and effective collaboration in geographically dispersed teams,

 

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.
  • 3 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.