Any topic (writer’s choice)

APA (edition "APA 6"), Computer science
Your research should include speculation on where the state-of-the-art will be in the near future for one of the following technologies. Your paper could include a description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future, and a discussion of how this technology will affect the choices you would make if you were making purchase recommendations for a client. Although there is room for personal opinion in your paper, you must justify your conclusions.Topic: CPU architectures
Read More

M3A1

APA (edition "APA 6"), Computer science
Physical and logical access controls can be implemented in a variety of ways. Logical controls tend to be imbedded into the operating system or security programs and physical access controls are typically built into the structure of the establishment. Logical access controls can be in the form of biometric scanners or other means to identify an individual uniquely. Review the following document and analyze the model detailed within it.Ultra, J., & Pancho-Festin, S. (2017). A simple model of separation of duty for access control models. Computers & Security, 6869-80. doi:10.1016/j.cose.2017.03.012Using the following template please develop a security awareness program detailing any physical or logical access control you wish. You can assume that you are playing the role of a CIO in a small company (200-300 employees). The Security Awareness plan…
Read More

threat the university faces and what response it would require from your institution

Computer science, Undergraduate
Briefly explain what the university should do about the vulnerability, and what effect any changes required might have on the institution or its students, employees, graduates, or other populations. The summary should include what the vulnerability is, how dangerous it could be, what its effects are and how it can be countered or remediated. You should address communication of the issue, such as who would need to be made aware of it and how.
Read More

WEB INQUIRY DESCRIPTION

Computer science, High School
This task requires each student to perform a web inquiry (find authentic information from the web). You need to search for technology topics covered in Unit 1 and search the WWW for articles and news on this technology. Based on your search you are required to answer some questions to reflect on your learning.STEPS TO FOLLOW:INDIVIDUAL WORKEach student from the group will find an article on topics from Unit 1.Topics to Choose from: NanotechnologyNano Robots, Nano Parts, or Smart Materials. The Internet and Internet of Things Smart Devices, Smart Homes, Smart City Applications, Smart Agriculture,Robotics and Artificial Intelligence  Voice Assistants, Google Search, Sophia, Cleaning Robots, Cooking Robots, Cobots, Marketing on Social Media.3D  and 4D Printing 3D printing in; construction, automobile manufacturing,  production, prototyping in design, 4D printing.RESOURCES:MIT has a list…
Read More

Asymmetric encryption

Computer science, Undergraduate
180 words Limit onBob and Alice need to send each other high-definition video files. These need to be encrypted but they are concerned that asymmetric encryption might prove too slow. However, they live too far apart to be able to safely share a symmetric encryption key.Explain how Bob and Alice might use an asymmetric encryption system to produce a session key and whether that will solve their problems. Can they re-use the session key?
Read More

Completing the Proposal

Computer science, Undergraduate
Assessment InstructionsNote: Developing a business proposal requires specific steps that need to be executed in a sequence. The assessments in this course are presented in sequence and must be completed in order.PreparationOnce you have added the global considerations to your proposal, add the key points from your proposal to your PowerPoint presentation. Make sure you have reviewed the project components and have addressed all of them. Use the reading materials and any additional resources you find helpful to create a business architecture proposal with descriptions and diagrams.InstructionThis assignment has two deliverables: Part 1) the proposal, and Part 2) the presentation. These deliverables are a coordinated communication package aligned with your project. The intent of this package is to help stakeholders make informed decisions regarding the proposed IT solution. The final…
Read More

General Data Privacy Directive

APA (edition "APA 6"), Computer science
Review an article that focuses on the EUs General Data Privacy Directive. In addition to reviewing the article, discuss the implication of the article as it relates to privacy protection. Take this opportunity to describe and discuss the following points with regard to the chosen article:Article name, author, and publication informationSummary of the articleHow can the article apply to an organizations strategy to protect sensitive privacy data?What are an organizations responsibilities and what are the penalties for non-compliance?Describe any challenges that you see with the article. Do you agree with all of the information that was presented in the article?
Read More

Enterprise Architecture

Computer science, Undergraduate
PreparationAfter reviewing the material provided on TOGAF and enterprise architecture, consider if you have everything necessary for the proposed project. For example, does the current architecture of the IT infrastructure within the company allow for ease of integration? Do you have the appropriate personnel to work on the project? Does a budget exist for the project? Can security standards be met? Can users be trained properly? What other IT systems need to be included as part of your proposal?InstructionsReview your proposal that you created for your course project. Using TOGAF, address how can you strengthen the project proposal to ensure that both the business and technology stakeholder needs are met?This assignment has two deliverables: Part 1) a paper, and Part 2) the revised presentation. You will use elements from these…
Read More

LAN and WAN Firewall

Computer science, Undergraduate
For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you will outline, address, and discuss your overall physical and network security strategy where you plan, design, and implement your security strategy around the organization's global network infrastructure. Use the suggested resources, the Capella library, and the Internet to research the subject matter.Describe at least three threats and vulnerabilities associated with physical security.Define at least two physical security strategies for protecting each of the following categories in the company:Data.Human resources.Hardware.Describe strategies for protecting the company's network perimeter from external threats.Describe strategies for protecting the company's internal and external network traffic and identify at least two network security tools you would consider…
Read More

Security Policy Ethics

Computer science, Undergraduate
Briefly detail the appropriate business requirements, IT goals, and parameters for your selected organization, and then analyze the security framework and cryptography strategies, physical network security strategy, and operating system and application security strategies you developed in the prior assessments. Finally, develop and design your overall security policy ethics strategy.Describe security vulnerabilities and threats found in an IT infrastructure and controls to mitigate the risks.Identify a complete list of security standards that must be addressed in a comprehensive solution for the organization.Discuss legal and regulatory issues that must be considered in relation to the management of information assets.Identify the steps that you took throughout the quarter to ensure that your security solution will succeed internationally and describe how do you addressed globalization in your security design.Review the feedback that your…
Read More