Uncategorized

week-4

 pick three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure 

week-4 Read More »

MGT311: Engineering Management

Analysis of Supervisor/Management Job Descriptions The purpose of this exercise is to have you view some actual job descriptions for supervisory/management positions as listed by real organizations. Instructions: 1. Think about a supervisory/management position that interests you. The position must be a first-line supervisor/manager position of your choice. In addition, you may include the type

MGT311: Engineering Management Read More »

Discussion

  Discuss the benefits of virtualization software. Do you agree/disagree with these benefits? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. Please make your initial post and two response posts substantive. A substantive post will do at least two of

Discussion Read More »

Computer crime

 In order to complete Assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to

Computer crime Read More »

Technical Summary

  Title – Executive Order (EO) on Improving the Nation’s Cybersecurity MAY 12, 2021   Link to the document – https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/Links to an external site. Write a 3 page (Times New Roman, 13pt, Single Spacing) technical summary (2/3 pages) of the changes in cyber operations mandated by this EO. Which mandate do you think is most

Technical Summary Read More »

Discussion with 500 words

  In 500 words or more, d iscuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. Use at least three sources.  Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosed in

Discussion with 500 words Read More »

Access control w4discussion

 Assignment Requirements Read the worksheet named “Mapping Business Challenges to Types of Control” and address the following: Question Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business. Instructions: Initial post with 250-300 words two peer

Access control w4discussion Read More »