Category: Information Systems

Week 4:

  

Week 4:

Read the section in this week’s reading assignment on secure passwords.

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t

Read and respond to at least two other students Discussions.

Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.

Post between 200 and 300 word

Week 3:

  

Week 3:

Do a bit of research on CWE, Common Weakness Enumeration.

Write a brief overview of their scoring system.

Pick one of common weaknesses identified on their site and describe it.

 

Your assignment should be 200-300 of your own words.

Week 2:

  

Week 2:

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

Respond the discussion board

They are 2 discussion boards post below. read and Reply to each discussion post 100 words per each response so total 200words.  Responses should demonstrate critical thinking and comprehension of the discussion topic and are strengthened when they are supported by additional research. You are expected to provide supporting details for your response; that support may come from the points covered in the readings and additional external research all source must be cited and listed  (appropriately cited) in APA   

Disaster Recovery

6 files are attached for this assignment, please refer to those files as needed. 

QUESTION:

 

Module 3 Assignment: Titanic Disaster

Download all of the attached files to your local computer.

Start with the Tableau-Tutorial for Beginners file. Read that first.

Next try the Tableau Lab exercise

Finally, complete the Titanic exercise and submit it here by the end of the week.

The Tableau activation key (license) is: TCFQ-92C0-B6B0-AF0E-8C8C 

Disaster Recovery

 Search “scholar.google.com” for a company or school that has reported  issues, problems, concerns about their backup procedures. Discuss the  issue of securing backups. There have been several incidents lately in  which backup media containing personal customer information were lost or  stolen. How should backup media be secured? What about off-site storage  of backups?    

ethical hacking

 https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/ 

 https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/ 

Review and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment. 

Week 3 :- Discussion

Remember to review the syllabus expectations for initial discussion posts and peer replies!

Discuss the following: 

1. How has blockchain been successfully applied in industry and government? 

2. What barriers exist in the adoption of blockchain technology. 

You are required to cite this weeks assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain a minimum of 500 words. Your response should be formatted in APA style and reference each of this week’s readings.

Also, two peer replies should contain a minimum of 150 words each and should be submitted no later than Sunday before 11:59 pm EST.  The initial post is worth 20 points and the peer replies are worth 2 points each (4 points). 

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources do not provide just the home page, but the EXACT LINK I check all sources
  • No abbreviations, no contractions write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

contingency plan

 ompany or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? 

PowerPoint

 

You will complete several steps for this assignment.

Step 1: You will become familiar with an assessment tool (AChecker) to examine Web accessibility for a couple Web sites. This is a freely available tool that you can learn about by reviewing the tutorial found here.

Step 2: Select two Web sites that are somewhat similar in functionality. Find one that you think is good and one that you think is bad. Whether or not the Web site is good or bad is based upon your own personal perspective.

Step 3: Examine the Web sites regarding your suggestions as to how they might be improved.

Step 4: Create a PowerPoint presentation that includes 1012 slides with voice recording that presents your recommended improvements. Discuss the good and bad factors of each Web site. Discuss how a sample task is supported on each of the Web sites. Describe how the Web site can be redesigned or revised to achieve better results.

The requirements for the presentation are as follows:

  • Title slide
  • Introduction to the 2 Web sites
  • Comparison of the 2 Web sites
  • A summary of AChecker’s findings for each site
  • Explanation of how to improve the sample task
  • Listing of recommended improvements
  • Information regarding anticipated localization and globalization factors
  • Summary and conclusions
  • At least 35 references

Be sure to consider the following:

  • Patterns
  • Wizards
  • Interactivity
  • Animation
  • Transitions

Screenshots may be used in your slides to support your explanations.

Remember, your presentation must include both the slides and the audio to present the content.

Include a title slide and APA format on citations used in the presentation with a closing references slide. Use proper design regarding elements (fonts, color, images, etc.) on your slides.

Use the Record Slide Show option to present the information on each slide and record your verbal explanations for each item. Please refer to the following for more detailed instructions on recording your voice on a PowerPoint slide:

Use AChecker, research literature, and your textbook to support your redesign or revision recommendations.