Discuss in 500 words or more the use of blockchain for the protection of medical, financial, or educational records.

Discuss in 500 words or more the use of blockchain for the protection of medical, financial, or educational records.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.

Note:-

Please use my prompts as a starting point for your discussion posts.  What I am looking for is for each student to find something different to say not to recycle the same pablum. This is a graduate program so simply writing definitions is not what we are after. Use your higher order cognitive skills (analysis, synthesis, evaluation, etc).  A solution is to find something that happened at work to explore and write about (You could, for example, explore the ransomware attack that happened at one student’s office. His solution was to encrypt the data but is that really a protection against that sort of attack? And, how did they get hacked, anyway? I wanted to know as soon as I read it ).  You could also find something at work that you want to know more about and explore that. Or, maybe, something specific in your reading or in the news attracts your eye. For example, the Russian hacking of election systems or the Chinese hack of the US navy. Lately, I’ve been intrigued by stories of people hacking the hackers. Find something that makes you want to do the research and writing.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion reply.

 Provide a 50-75 word discussion reply to the following post below.  

 

Organizations should take extra precautions when setting up wireless networks. The Federal Trade Commission (n.d.) recommends changing the router name from the default, changing all preset passwords, consistently updating the router software, and turning off any “remote management” features. All of these options provide an additional security feature to reduce the vulnerability of an organization’s wireless network to hackers. One additional security feature that should be included is encryption so that hackers and other outside parties cannot understand the communications transmitted across your wireless network.

In December 2013, Target Corporation was subject to a data breach of credit/debit card and customer information of close to 110 million people. The breach occurred through hacker access through the point-of-sale (POS) system and gateway servers; compromising the data and financial security of over 70 million of its customers by January 2014 (Armerding, 2018). The negative impact of such a large breach at a major retailer resulted in an $18.5 million settlement and the resignations of top executives at Target Corporation. “As part of the settlement announced on Tuesday, Target is required to adopt advanced measures to secure customer information such as employing an executive to oversee a comprehensive information security program as well as advise its chief executive and board” (Reuters, 2017). The problem with this particular situation is the reactive nature of the Target Corporation. Although the organization had some security features in place, it was later determined that the security features were not monitored at an executive level thus increasing the exposure to hackers. By utilizing a proactive response to security on their network including consistent monitoring, testing, and updates, future attacks will be mitigated.

References:

Armerding, T. (2018). The 18 biggest data breaches of the 21st century. CSO. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html

Federal Trade Commission. (n.d.). Small business computer security basics. Retrieved from https://www.ftc.gov/tips-advice/business-center/guidance/small-business-computer-security-basics (Links to an external site.)Links to an external site.

Reuters. (2017). Target settles 2013 hacked customer data breach for $18.5 million. MSNBC. Retrieved from https://www.nbcnews.com/business/business-news/target-settles-2013-hacked-customer-data-breach-18-5-million-n764031

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

9.9 User-Defined Functions: Even/odd values in an array

Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. The input consists of five integers.

Ex: If the input is 2 4 6 8 10, the output is:

all even

Ex: If the input is 1 3 5 7 9, the output is:

all odd

Ex: If the input is 1 2 3 4 5, the output is:

not all even or all odd

Your program should define and use two functions: 

Function countEvensInArray(integer array(?) userVals) returns integer numEven
Function countOddsInArray(integer array(?) userVals) returns integer numOdd

countEvensInArray should return 5 if all integers in the array are even. countOddsInArray should return 5 if all integers in the array are odd.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Requirements Management & Engineering

everal phases of the requirements project have now been completed; however,

 it will be critical to inform the customer of your requirements management practices and plan.

 Additionally, the customer must verify that your team did follow the requirements management standards 

implemented by Software Engineering Institute Carnegie Mellon.

In a PowerPoint presentation, provide the following to illustrate the actions taken to implement 

requirements management:

Title slide

Topics of Discussion slide

Summary of IEEE Standards used during the requirements

 management process (i.e., IEEE Std 1233 – 1998; IEEE Std 830-1998, SEI CMMI)

Introduction and Purpose of Requirements Management (REQM) within CMMI

Goals and Practices used during REQM for your project

Identification of at least 1 Requirements Management tool or software, 

which would be used in support of your project at a major corporation

 (i.e., DOORs, Requisite Pro, CASE Spec, Open Source RM, CORE)

Use of requirements management to produce metrics

Summary slide

Reference slide in APA format

Each major topic presented from the Summary of the IEEE Standards to the Goals and Practices

 used during REQM should have 2–3 sentences of explanation or expansion placed in the speaker notes of 

each slide. References must be placed either on the slide or in the speaker notes in APA format.

 The overall length of the presentation should be 8–11 slides in Power point

Attachment is history of assignment as of this week

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C language Homework

I have submitted the C file and a PDF, Download the C file then Read the instructions in the PDF and work on the C file.

AT THE END there should be ONE zip file ( the code ) and ONE text file ( you will read it in the PDF instructions were mentioned as ” TASK FIVE “

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Essay 9

 Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your essay as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For the essay you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. The citation should be in APA format. It should be 3 to 4 pages.

 

2.  (a) Describe some concerns involving pornography in cyberspace. (b) Why was the Communications Decency Act (CDA), sections which were designed to protect children from concerns about pornography on the Internet, so controversial? (c) Why was it eventually struck down? (d) Why were both COPA and (portions of) CPPA struck down as being unconstitutional? (e) Should they have been declared unconstitutional? Defend your answer.Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

3   (a) What is sexting, and what challenges does it pose for prosecuting current child pornography laws?  Recall the examination of the sexting incident at Greensburg Salem High School, PA (in Scenario 9-3). (b) Should the teens involved in that case have been subject to felony charges under existing child pornography laws?  Explain.  Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)

4   (a) Describe some of the issues underlying the free speech vs. censorship debate in cyberspace. (b) What is meant by “free speech”? (c) Describe the differences between what Catudal calls “censorship by suppression” and what he calls “censorship by deterrence”? (d) Is this distinction useful for understanding some of the complex issues surrounding censorship? Defend your answer and please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension) LO 9 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cyber Security Questions

Please give APA formatted answers to all questions even the fill in the blanks you have to explain in words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Security

  

Information Security Planning

Instructions

This project requires that students work with the VirtualBox installation of Microsoft Windows Server 2012 R2 Standard 64-bit that was developed in Project 1.

I. Access Control Implementation

Within the VirtualBox Microsoft Windows Server 2012 virtual server that was developed in Project 1, determine and implement a minimum of five Defense in Depth Access Controls.

II. Microsoft Baseline Seucrity Analyzer

Download the Microsoft Baseline Security Analyzer: http://www.microsoft.com/en-us/download/details.aspx?id=7558 or retrieve a copy of the software from the ‘C:\Software’ folder.

Following the instructions outlined in the following video, execute a scan and Analyze the Security Report that is generated: https://www.youtube.com/watch?v=iUWLUsCLNs8

Mitigate any results that were flagged with a ‘Severe Risk’ score and then re-run the Microsoft Baseline Security Analyzer tool until all ‘Severe Risk’ results have been mitigated.

III. Validation

· Part I: In a Microsoft Word document, paste screenshots validating that each outlined controls was fully implemented within the virtual server installation.

· Part II: Within the same Microsoft Word document as utilized for the previous validation requirements, add the Security Report from the Microsoft Baseline Security Analyzer software.

Attach the Microsoft Word document to the Blackboard Submission for this assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Policy Intranet Project

    

Objective:
1. Modify information security policies for an imaginary company or organization. 2. Create an imaginary Intranet site. 

Overview:
To fully understand why information security is important, one needs to understand both the value of information and the consequences of such information being compromised. At the very least, businesses hold sensitive information about their employees, financial results, and business plans for the year ahead. They may also hold trade secrets, research and other information that gives them a competitive edge. As more and more information is stored and processed electronically and transmitted across company networks (to include the Intranet and Internet), the risk of unauthorized access increases and companies are presented with growing challenges of how best to protect it. One key is an information security awareness training program. The other key is to ensure that a company’s information security policies are up-to-date. The purpose of this project is to provide students first-hand, real-world experience with modifying information security policies and creating an Intranet to display this information. 

    

Software Required 

Web Development Tool WIX.COM 

Key Information
1. Partial work for this project will not accepted. 2. Late projects will not be accepted. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write and Call Three Functions

 

Instructions

You will write a flowchart, and C code for a program that does the following:

Call three functions from main(). The functions are named first(),  second(), and third(). Each function prints out its name (“first,”  “second,” “third.”). After all three functions are called, the main()  function should print “End of program.”

Here is what the program looks like.

Submission Instructions

Upload your Flowgorithm file, your .c file, and a screenshot of your code output saved in a Word document 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now