3 Separate Discussion’s

  

Subject: Computer and Network Security

Discussion 1

Total word count must be 250 to 300 words in your posting.

Do not cut and paste, please post original work.

Please provide references for your original postings in APA format.

1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently?

2. What policies govern your behavior currently, in school, work, or in other organizations? Are those policies enforced/followed? Why or why not?

 
 

Subject: Computer and Network Security

Discussion 2:

Total word count must be 250 to 300 words in your posting.

Do not cut and paste, please post original work.

Please provide references for your original postings in APA format.

1. Who ultimately has ultimate responsibility for the computer security policies and organization implements and why? Consider the data owner, system owner, executive management, CIO, CEO, and the company’s Board members?

2. Which of the social engineering scams do you find the most interesting? Have any you ever been the victim of a social engineering scam?

 
 

 
 

Discussion 3

Subject: MBA 5013 Organizational Communication

In preparation for this discussion board, keep Chapter 9 of Brewer and Westerman (2018) in mind. On page 166 of the text, Brewer and Westerman offer a Case Study about Southwest Airlines. Read the Case Study carefully. Respond to the questions at the end of the Case Study (below). Additionally, your response should include direct connections to research within the chapter.

Please provide references for your original postings in APA format.Yourour original post should be 300+ words. Further, you should respond to, at least, two classmates’ posts.

 
 

Questions to consider:

Chapter 9:

1. Would you be happy in such an organizational environment?

2. How much structure do you need to be comfortable?

3. What do you think of the idea of employees coming first?

4. How do you directly apply research on team/group characteristics to the Southwest Airlines Case Study? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignments rst

  

1 . Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 750 words

2. Using a Microsoft Word document, please discuss the case involving the United States of America versus Ross Ulbrecht. 750 words

3. Using a Microsoft Word document, please review ONE of the following films  and tell how that film represents a contribution to the field of CyberLaw.

War Games (1983)

Citizen Four (2014

AlphaGo (2017)

Google and the World Brain (2013). 1000 words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Correlation and regression

 

  1. Let’s discuss the difference between positive association and negative association when describing the relationship between two variables. What do we mean by the least-square criterion? Give a general description of how the least-square criterion is involve in the construction of the least-square line.  Why do we say the least-squares line is the “best-fitting” line for the data set?  
  2. Use the Internet and find a magazine or journal article in your field of major interest wherein the content of this chapter (Correlation and Regression – chapter 6) could be applied.  List the variables used, method of data collection, and the general type of information and conclusion drawn.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity Planning

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/

https://www.techrepublic.com/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Audit Procedure Guide

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly

scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the

basic security for all of your Windows computers, and use OpenVAS to perform vulnerability scans.

Tasks

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no

known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 2 to 4 pages

Self-Assessment Checklist

▪ I created a procedure guide that provides clear instructions that anyone with a basic technical

knowledge base can follow.

▪ I created a well-developed and formatted procedure guide with proper grammar, spelling, and

punctuation.

▪ I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation.

 Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed.  Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Lesson learned from safety video

please, I need to watch the safety video than extract and answers these questions below

Also I need to help me and write introduction and conclusion for email to my boss ..

1- What are the Applicable Violated SHEMs in this Video?

2- What are the observed behaviors leading to incidents?

3- Top 2 Lesson Learned.

4- Can similar incident happen at your area and where?

5- Other Highlights by the team

https://www.csb.gov/evergreen-packaging-paper-mill—fire-during-hot-work/

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 15- Legal

Assigned Readings:Chapter 19. Management of Employee Welfare.Chapter 20. Management: Employment Discrimination.Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain what OSHA is, its purpose, and what responsibilities there are under the law. Additionally, explain how it can be violated, and the penalties for any violation.
  2. Peter Plaintiff had his constitutional rights violated by a county sheriff’s department.  What steps would Peter Plaintiff need to take to seek damages under 42 U.S.C. § 1981?

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]

Text

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Edition

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Activity 7A- Project Process

Part 1:Answer the following questions: 

  1. Why it is important to close out a project even if the project was closed early by management?
  2. Why should Project Managers capture lessons learned?
  3. What are some ways that the project team members, project managers, and the organization can use lessons learned?
  4. What benefits come from celebrating project accomplishments? Do you believe that rewards and recognition can serve as motivators for staff?
  5. If you are running an Agile project when are lessons learned captured? 

Part II

  1. Planning for Agile, Extreme, and Hybrid projects happens just in time, rather than at the beginning of the project as in Traditional projects.  Because of this do you feel that traditional projects take longer?
  2. Using the lens of planning, what are some benefits of planning using a traditional project management approach? 

Text

Title: Effective Project Management ISBN: 9781119562801 Authors: Robert K. Wysocki Publisher: Wiley Publication Date: 2019-05-07 Edition: 8th Edition 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

br-1

Please view the 1956 film The Forbidden Planet (Wilcox)and write an at least 1,000 word response using
APA formatting to the content of the film. Please address the technological issues as well as the morality
and ethics of the characters’ decisions as seen through the lens of one or more of the Saint Leo Core
Values. Please submit your  to the Core Values drop box by April 15th, 2022.
Please be sure to include a “Works Cited” section which includes at least an entry for the film.
Please also be sure to follow all APA formatting guidelines including a title page, running header, page
numbers, line spacing and indentation. An abstract is note required.
Since this will be submitted through “TurnItIn,” please be sure that your text is original and does not
match online sources.
Works Cited
Forbidden Planet. Dir. Fred M. Wilcox. 1956. Film.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now