Executive sponsorship

 – Question 1 

Executive sponsorship is critical to project success. There is no substitute. Without it, a project is at risk of failure. What do is your opinion?

 – Question 2

 In policy development, program Controls, Monitoring, Auditing, and Enforcement, we must gather metrics to determine the level of employee compliance, its impact on key operational areas, and progress made toward established business objectives. What are those types of metrics you will need to gather and how will you measure them? 

Please write each 500 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

quiz 11 cyberethics

 

Chapter 11 – Quiz 11

Instructions:  There are three (3) topic areas listed below that are designed to measure your knowledge level specific to social issues of community and identity in cyberspace.  You must respond to #1 and select any other one of these topic areas providing appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our textBe sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question.  Be sure to include your name on the quiz.  Only the first two (2) questions with answers will be graded.   Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date.   Do well.

  1. Compare Brey’s arguments regarding misrepresentation and bias in virtual environments, especially in virtual reality (VR) applications, to Buchanan’s argument in chapter 10 concerning gender bias in the representation (or lack of it) in video games. (Brey’s arguments can be found in the 4th edition of the textbook on page 349.  Go to Doc Sharing to download the 4th edition in PDF format.How are their arguments similar? How are they different? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)
  2. Describe some pros and cons of online communities. What does Mitch Parsell mean when he says that online communities with an “extremely narrow focus” contribute to social polarization?  Assess his arguments for that claim.  Do you agree with Parsell?  On balance, have online communities enhanced or threatened community life?  Explain.  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  3. Evaluate the argument by Cocking and Matthews for why true friendships in pure virtual (or online-only) contexts are not possible.  Assess the counterargument by Briggle.  Does Briggle succeed in making the case for the possibility of genuine friendships in purely virtual contexts?  Whose argument do you find most convincing? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Security Governance

 

iscuss Information Security Governance.  Discuss ISG.  Discuss how ISG moves information security beyond technical decisions and makes security a strategic decision.  How and why does ISG move information security from the technical arena to the business arena.  Discuss why this is necessary.

Answer the question with a short paragraph, between 150 and 250 words.  Brevity is a virtue.  That is why you are limited to 250 words.  If you can’t present your hypothesis in 250 words or less then it is too complicated.   Remember that when you state a fact if you don’t provide a reference, it is not a fact but rather an opinion.

You can type your response in Word and use the word count button to see how many words you have typed.  Do not include the references in your word count.  No headings or title page, etc.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Access Control and Cloud Security

  • 5.1 Provide a brief definition of network access control.
  • 5.2 What is an EAP?
  • 5.3 List and briefly define four EAP authentication methods.
  • 5.4 What is EAPOL?
  • 5.5 What is the function of IEEE 802.1X?
  • 5.6 Define cloud computing.
  • 5.7 List and briefly define three cloud service models.
  • 5.8 What is the cloud computing reference architecture?
  • 5.9 Describe some of the main cloud-specific security threats.

Complete your answers on a WORD Document,

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Read Chapter 3 of the textbook and answer question 08 and responses 1&2

1- Read Chapter 3 of the textbook 

 Question 08

What characteristics of IT (and the internet) change the environment for plagiarism and plagiarism detection? 

2- responses this two 

 1- There are four key points made to assert that the Internet is inherently democratic. The Internet allows users to be producers of information, it provides open forums that are moderated differently than mass media, it allows access to a wide variety of information, and it encourages the formation of relationships and associations that go beyond geographic space. More or less, the key point on which all of these arguments hinge is the ability to communicate easily with many people. The free flow of information and the ability for any individual to communicate come across quite easily as “democratic” concepts, as they encourage every individual to be able to contribute to discourse and discussion, regardless of any traits they might have. The basis of democracy is that political power rests in the hands of many, rather than few. The Internet very much embodies this ideal by giving every individual the ability to state their beliefs. While there is no guarantee that anybody else will heed or even listen to this individual’s words, the Internet undeniably makes it much easier for anybody to produce and distribute their thoughts, their beliefs, and their information. 

  2- Reproducibility in the IT world is basically the ability to copy electronic information to be used by someone or something else. This is significant because electronic information is not so easily deleted like information that is transmitted in the real world. Also, in many cases, when a piece of electronic information is copied there is no evidence left behind that the original information was copied which can definitely complicate things when it comes to property rights and crime. Reproducing electronic information is much more permanent in the sense that when someone copies information they may never delete it and always have access to it. The words that are sent online may very well last forever, unlike in the real world where words are spoken and then basically disappear. Plagiarism is another problem with the reproducibility of electronic information because many people steal the work of others and claim it as their own. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Malware Protection Procedure Guide

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources Course textbook: Security Strategies in Windows Platforms and Applications Book by Michael G. Solomon

Submission Requirements

 Format: Microsoft Word (or compatible)

 Font: Times New Roman, size 12, double-space

 Citation Style: APA

 Length: 2 to 4 pages

Self-Assessment Checklist

 I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

 I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

 I followed the submission guidelines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Questions and Exercise

  

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?( 250-300 words.)

Discussion Questions

1. Explain the relationship among data mining, text mining, and sentiment analysis.

2. What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Exercise 3

Go to teradatauniversitynetwork.com and find the case study named “eBay Analytics.” Read the case carefully and extend your understanding of it by searching the Internet for additional information, and answer the case questions. (200 words)

Exercise 4

Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining. (200 words)

When submitting be sure to include at least two APA formatted references with in-text citations to support the work this week.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Key features of Data Visualization

  

Key features of Data Visualization Interactivity are Events, Control, and Function. Write a two-page paper discussing the features with examples using the tool of your choice.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Stack Overflow

 

Paste the code into MIPS 

Next, please comment each line of code in the .text section. Please do this FIRST! It will make tracing through the code much easier. 

Once you understand what the code is doing, you’ll notice there is a ‘print_a’ function that is not reachable through the execution path of the code as it’s written. Your job is to devise an input that overflows the call stack and overwrites the $ra register causing the program to execute the ‘print_a’ function. Please provide the successful input that triggers the overflow, a screenshot of the successful execution of your attack that prints the A+ message, and a detailed description of how you figured out how to exploit the buffer overflow and how you devised the proper input. 

Code used for the assignment above

.data

    str: .asciiz “You’ve earned an A+!”

    buffer: .space 28

    

.text

    li $v0,8

    la $a0, buffer

    li $a1, 28

   move $t0,$a0

    syscall

    

    move $a0, $t0

    jal print

    

   li $v0, 10

   syscall

    

    print:

     addi $sp, $sp, -20

     sw $ra, 16($sp)

     sw $a0, 12($sp)

    

     addi $t4, $sp, 0

     la $t1, ($a0)

    

     load_str:

   lbu $t2, ($t1)

   slti $t3, $t2, 1

   beq $t2, 48, null

   

   resume:

        

         sb $t2, 0($t4)

         addi $t4, $t4, 1

         addi $t1, $t1, 1

         bne $t3, 1, load_str

    

        li $v0, 4

        syscall

    

        lw $ra 16($sp)

        lw $a0 12($sp)

        jr $ra

    

        null:

     addi $t2, $t2, -48

     j resume

print_a:

    li $v0, 4

    la $a0, str

    syscall

Link to the code as well: https://github.com/jkovba/jhu_sp20_comporg/blob/master/overflow.s

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

202010

Final Assignment – Project Plan (Deliverables):

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

1) Address each of the FOUR IoT security steps listed above in terms of IoT devices by explaining in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

2) If you owned a large company like RING, SimpliSafe, MedicalAlert or NEST that experienced a data breach due to faulty security settings on one of your IoT devices (such as a video doorbell or medical alert bracelet or a similar device) what would you tell your business partners and customers? Prepare a letter to send to your customers explaining the situation and what you plan to do about it. Keep in mind you want to do all you can to avoid losing business over this breach.

Question 2:

Your Research Project on “Cloud computing” topic the surveillance state consists 750 word research paper with at least 3 sources. 

You must include at least 3 quotes from your sources enclosed in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. 

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now