Discussion and response_ETC-2

Question Description

Subject: Emerging Threats & Countermeas

What are the differences between technologies that ate circuit switched versus packet switched? What are the pros and cons of each?

You must do this following:

1) Discussion topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate’s posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates’
  • postings?

Required Resources

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5810589?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25204%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190923T170001Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190923%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=635a58b90033e8461b6b9a72db36d4c1f538c1e831ef4630a904f679c360ebb6

* attached PPT

computer networks week 2 homwork

Question Description

There are four question

Excample: Reading a HTTP Request

The following string of ASCII characters represents an HTTP request. I captured them using a tool called Wireshark when my browser loaded a webpage. The rn indicates a carriage return and newline (the CRLF we discussed).

GET / HTTP/1.1rn Host: web.mit.edurn Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8rn Upgrade-Insecure-Requests: 1rn Cookie: _ga=GA1.2.1058035094.1555112797; _gid=GA1.2.1623662935.1555112797; QSI_HistorySession=http%3A%2F%2Fweb.mit.edu%2F~1555112797274rn Cookie pair: _ga=GA1.2.1058035094.1555112797 Cookie pair: _gid=GA1.2.1623662935.1555112797 Cookie pair: QSI_HistorySession=http%3A%2F%2Fweb.mit.edu%2F~1555112797274 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.1 Safari/605.1.15rn Accept-Language: en-usrn Accept-Encoding: gzip, deflatern Connection: keep-alivern rn Answer the following questions:

  • What is the URL of the document requested by the browser?
  • What version of HTTP is the browser running?
  • Does the browser request a persistent or non-persistent connection?
  • What is the IP address of my laptop?
  • Is my laptop connected with WiFi or Ethernet?
  • What browser am I using?
  • Why is the browser type needed in an HTTP request message?
  • Critical Thinking: Actors in the thesis project process

    Question Description

    In each stage of the thesis project process a set of tasks are assigned to some or all actors.

    1. Describe the role of each actor in each stage.

    2. Link these tasks to the purpose of the thesis project.

    During the project process there are a set of checkpoints that should be satisfied to start with a strong project proposal.

    3. Explain in which stages these checkpoints should be conducted and who are the actors of these checkpoints.

    4. The relevance and the originality of a project thesis topic are considered as important assessment criteria.

    Explain with an example from Computer Science or from the Information Systems domains the difference between relevance and originality.

    Requirements:

    Your paper should be 2-3 pages in length, not counting the title or reference pages, which must also be included. Include at least one scholarly reference in addition to the course textbook. Your paper must follow APA style guidelines, as appropriate

    need to select an topic and write about 5-6 pages meeting GIAC standards paper guidelines and also API style of format at the end need to write an para on the topics given in question

    Question Description

    Pick a topic for a 5-6 page paper on any topic in information security. GIAC Gold standards paper guidelines should be followed along with standard APA style. Remember the GSU writing center can be accessed for online students also.

    Title page, abstract and reference pages are not included in the page count.

    At the end you need to write a paragraph on below 2 topics

    1)Looking on the internet and all the tools available for hackers and computer technicians, post a tool and discuss if you feel safe with all your information online, in corporate databases and being sent over the Internet.

    2)The best encryption method may not always be the best. When you are discussing encryption methods this week discuss not only an encryption method and how it works but in what you might use the method to encrypt. Discuss Internet sales page, emails, hard disks….. Which method is best for the situation?

    recommendations for a proactive approach to risk management

    Question Description

    I think we can all agree, as Deloitte surmises, social media is creating a world that is more connected and networked where information (accurate and not so much) is rapidly dispersed. Disruptive mobile technologies are supporting the high-availability of this information. The convergence of social media and mobile devices, rapidly evolving societal and cultural expectations, and information that is both necessary and unnecessary is escalating the type and influence of reputation risks in our organizations.

    Do you agree or disagree with these statements? What other forces are driving this trend? What are your recommendations for a proactive approach to risk management in this context?

    Pre-requisites

    • Read the textbook Chapter 6: Strategic Risk Management at the LEGO Group: Integrating Strategy and Risk Management
    • Watch the Week 3 recorded presentation for Chapter 6
    • Watch the Content Lecture: IT Risk Management

    Chapter 6 Presentation : https://www.youtube.com/watch?v=n0K6jqN5t8I

    Week 3 lecture : https://youtu.be/6Gzd9LKN7Uk

    Complete Short Database Management Task (MORGAN)

    Question Description

    There are two students in the EXACT SAME CLASS….YOU WILL COMPLETE THIS TASK TWICE BUT IN DIFFERENT WAYS SO THAT IT DOES NOT LOOK LIKE THEY PLAGIARIZED OFF EACH OTHER….THEY NEED TO BE TOTALLY DIFFERENT FROM EACH OTHER…SEND EACH TASK ON ITS OWN WORD DOCUMENT AND SEND TWO TURNITIN REPORTS PLEASE

    In this Project (Part 1), you will gain experience on conceptual database Design.

    You need to design and develop an ER diagram based on the requirement description for the case of video shop. (See the attached file)

    An ERD must contain 4 building blocks:

    1. ENTITIES

    2. ATTRIBUTES

    3. Unique Identifiers (UIDs)

    4. Relationships (including cardinality and modality) and their corresponding relationship sentences. For example, for the relationship between VIDEOTAPE and MOVIE can be described by two relationship sentences as shown below:

    Each MOVIE may be copied in one or more VIDEOTAPEs.

    Each VIDEOTAPE must contain one and only one MOVIE.

    Submit your ERD in a timely manner.

    ERM adoption and Implementation

    Question Description

    Chapter 6 presented the approach the LEGO Group used to implement ERM, and chapter 9 presents a discussion and case study on implementing ERM in a higher education environment. Please explain how ERM adoption and implementation in the higher education environment differs from the for-profit environment. Cite specific examples from last week and this week’s readings.

    Assignment Requirements:

    Create a new thread.

    • As indicated above, explain how ERM adoption and implementation in the higher education environment differs from the for-profit environment.
    • Cite specific examples from this week’s readings.
    • In your explanation, discuss at least three points or aspects in which the implementing ERM in the two environments differ.

    Chapter 6 : https://www.youtube.com/watch?v=n0K6jqN5t8I

    Chapter 9 :https://www.youtube.com/watch?v=5EyLYpP7bnU

    I need references as citations and 0% plagiarism.

    I will cite examples from last week readings – This part you can leave it to me.

    Please let me know if you need more details.

    Information Governance question

    Question Description

    Chapter 7: The business case for information governance (IG) programs has historically been difficult to justify. It is hard to apply a strict, short-term return on investment (ROI) calculation. A lot of time, effort, and expense is involved before true economic benefits can be realized.IT governance seeks to align business objectives with IT strategy to deliver business value.

    Question: Please provide 2-3 page APA standard paper or why the business needs to drive the IG strategy and why there must constantly be an alignment. How would you approach implementing an IG strategy within an organization?


    APA format

    No Plagirism

    Valid resources

    please read instructions

    Question Description

    It is your parents’ (or grandparents, if you wish) XYZ-year wedding anniversary, and you want to buy them a 5-day vacation. You have a budget of $3,000.00

    Then, start planning! Search, research, analyze and compare, and plan a 5-day vacation for your parents. Things to keep in mind:

    Think about your parents: psychographically, how would you describe them?

    Think about what they would need, and what they would want: can you deliver both? (ex.: rest & relaxation / romance & adventure) where? Domestic or overseas? Flight or cruise?

    • Minimum of 2+ pages, double-spaced, Font 12
    • APA not required, but a minimum of 5 References is required

    flights would be from newark NJ to fort lauderdale. Stay at the W hotel in fort lauderdale on the beach. They like steak houses and relaxing on the beach. they would rent a mid budget card maybe a mustang it would be domestic trip

    short research paper

    Question Description

    Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading. This will be a detailed summary of the research paper and what you gained from the research. Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment. If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

    https://scholar.google.com/

    Once you find the article, you will simply read it and then write a review of it. Think of it as an article review where you submit a short overview of the article.

    *All outside sources must be referenced and cited in your paper. All papers will be reviewed with a plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!