07)Please check question below

Question Description

In a few short paragraphs, explain which cloud services you use (Google, Amazon, iCloud, Verizon, Microsoft One, Dropbox, etc) and what type of information you store (docs, photos, music, other files?). How much space do you have and what does this cost per month?

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.

Question Description

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.

NO PLAGIARISM, ADD REFERENCES

A survey of emerging threats in cybersecurity

Question Description

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section

This assignment should be in APA format and have to include at least two references. 1000 words minimum

05)Please check question Below

Question Description

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Compare and contrast IPv4 addressing with IPv6 IP

Question Description

Two pages and with APA Citation format

Compare and contrast IPv4 addressing with IPv6 IP addressing schemes in 250-400 words. Format your document according to the CSU-Global Guide to Writing and APA (Links to an external site.) requirements.

2.5 pages DNS FLOOD PROJECT

Question Description

  1. Organization?
  • E-Commerce Vendor (Amazon)
  1. Type of Attack?
  • DNS Flood

Please write 2.5 or 3 pages about Impact: Discuss the significance and impact of the attack (technical, financial, and social, etc.). based on the file that attached

major points to talk about

  • Consequences of attack
  • Potential lost revenue
  • Angry customers
  • Bad reputation of company

Balanced Scorecard (Read Instructions)

Question Description

Review at least 4 articles on Balanced Scorecard and complete the following activities:

1. Write annotated summary of each article. Use APA throughout.

2. As an IT professional, discuss how you will use Balanced Scorecard to manage IT resources efficiently.

400 words minimum

Discuss at least three of the database processing models identifying each of their respective advantages and disadvantages

Question Description

Different DB processing models have been proposed, each of which has been proposed to handle a different problem set and environment (i.e. relational, OO, centralized, clustered, networked, cloud, gaming, robotics).

Need discussion post with Minimum 350 words and include references

Do some basic research on security certifications.

Question Description

Do some basic research on security certifications.

See https://www.giac.org/.

Write a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

Write your answers in WORD for 200 words and submit here.

computer security

Question Description

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Read and respond to at least two other students Discussions.

Post atleast 500 words.