Objective: The objective of this discussion is to understand the threat and vulnerability of the Microsoft operating systems and to find ways to mitigate the security breach. Microsoft operating system is widely used in various organizations and finding strategies to defend against an attack is becoming difficult.

DQ1: Therefore, your task is to read the one of  book titled security strategies in windows platforms and application and layout strategies you could use to mitigate the risk of an attack in Microsoft windows platform.

DQ2: Discuss the telnets of information security and how windows and application could be mapped into a typical IT Infrastructure that could help to secure the system?

Note: All discussions must adhere to APA 6th edition format. Please, do not post more than 200 words for the discussion. Please, don’t forget to create in-text citations before referencing any article. You may visit the content area to learn about the APA format.

 

Review in 500 words or more the video above called Cloud Security Myths.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested. 

 

CSC 15 diss

1)If you could, what would you do to help create a national security culture, in which everyone is more knowledgeable and proactive about threats to information security?

2)Your weekly course lectures contain many topics and web resources where you can find information about information and cybersecurity. Locate an article online pertaining to any topic of interest that relates to our course and provide a brief written summary (2-3 paragraphs).  A link to the article or a reference citation should be included so the work can be located.

3)Briefly summarize the article you selected for this research project in no more than one paragraph for this discussion. Explain why you thought this article was interesting enough to read for this assignment.

4)M Week 10 DS

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

5)M week 10 CS

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.
 

Write between 200 and 300 words.

Pick one of the following terms for your research: centralization, contingency, decentralization, efficiency, mechanistic, organic, organizational behavior, scientific management, stakeholder, or sustainability.

Within each module, there is a list of key terms. Each student will select one of the key terms and conduct a search of Campbellsville Universitys online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relate to the concept. Your submission must include the following information in the following format: 

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. SUMMARY: Summarize the article in your own words- this should be in the 150-200-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. 

DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the mostimportant part of the assignment. 

REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

You need to give response to the two writings (see attached file for the two writings).

Write atleast 100 to 125 words for each response (with -out counting references).

Please make two response posts substantive. A substantive post will do at least TWO of the following:

· Ask an interesting, thoughtful question pertaining to the topic

· Answer a question (in detail) posted by another student or the instructor

· Provide extensive additional information on the topic

· Explain, define, or analyze the topic in detail

· Share an applicable personal experience

· Provide an outside source (for example, an article from the university Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

· Make an argument concerning the topic.

At least one scholarly source should be used. Be sure to use information from your readings and other sources from the university Library. Use proper citations and references in your post.

Note

1. No plagiarism

2. Use proper citations

3. Use references 

4. Proper APA format

STRICTLY NO PLAGARISM 

Learn About Defending Against DDoS

Using WORD, write an ORIGINAL brief essay of 300 words or more:

Find a DoS attack that has occurred in the last six months

You might find some resources at www.f-secure.com.

Note how that attack was conducted.

Write a brief explanation of how you might have defended against that specific attack.

This assignment requires a 4-5 page review of the work on which your idea is based. The nature of this review will vary based on the type of project undertaken. A total of five works must be reviewed.
Note** Project idea is based on security Issues & Threats  in IoT Devices (IoT devices in the workplace presents a huge security risk)
Solution: Develop a manual that goes through how to properly audit and assess IoT devices.

Your projects will require a review of academic literature (min. 3) dealing with the problem: Security Issues & Threats  in IoT Devices

Your projects will necessitate a look back at the technological changes enabling the current project with at least 1 citation/review.

Your projects will need an examination of the professional environment in which the idea will be implemented with at least 1 citation/review.

The article addressing McCumbers Cube (A Model for Information Assurance: An Integrated Approach) must be included in this assignment.
You can choose which section it fits best for your project, but it is required .
You will find a copy of McCumber’s Cube in the attached file. A MINIMUM OF FOUR WORKS PLUS THE REQUIRED McCUMBERS CUBE ARTICLE MUST BE REVIEWED.
see attached file.

Required format:

Project overview

Results of literature review

Name and citation of article using APA format
Summary sentence
Summary of key ideas/information
Analysis of key ideas/information
How information will be used in report
Results of technology review

Name and citation of article using APA format
Summary sentence
Summary of key ideas/information
Analysis of key ideas/information
How information will be used in report
Results of professional environment review

Name and citation of article using APA format
Summary sentence
Summary of key ideas/information
Analysis of key ideas/information
How information will be used in report
Conclusion

 

need 2 answers 

Please, address each of the questions below, in 100-150 words (per question). Include any relevant examples and links to your sources.  

1. 1. In the context of financial management, how does the rise in shareholder wealth from 2019 benefit society?

2.  2. What is the appropriate goal for management decisions?

3.  3. How do free cash flows and the weighted average cost of capital interact to determine a firms value?

ppt(10 Slides), one-page single-spaced summary and annotated reference list. Each annotation consists of two paragraphs. The first paragraph summarizes the source and the second paragraph is your reflection (thoughts) on the source. A paragraph for this purpose consists of a topic sentence and at least four more sentences (total 5).  

The reports should each follow this format.
1.    Title/research subject area
2.    Research area: A brief description of the area (around 150 words)
3.    Relation to Computer Science in general:  What other areas in Computer Science and Science in general does the area relate to?
4.    Research questions and methods:  Identify a significant research question in this area.  What methods could be used to investigate this question.  Evaluate the effectiveness of these methods. (around 600 words)
5.    General relevance: What relevance does this kind of work have in general?  How might it be generally helpful?  Are there any possible negative implications? (around 300 words)