3 Page Writing In Apa 6th Standard Chapter Readings Reflections Journal 19758747

Writing needs to summarize Chapter 7, 8, 9 from the attached textbook. There shouldn’t be any plagiarism and should be in APA 6th standard. 

Chapter 7, 8, 9 Reading Reflection should address the following prompts: 

1. Summarize the content of the chapter addressed. 

2. What were some of the highlights in this chapter and learning opportunities?

Read Question In Comment Section Below


Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more :

· Summarize the case

· Give your opinion of the decision.

· Describe how the case deals with the material in this chapter

3 quotes are required, and they must be enclosed in quotation marks and cited in-line by referring to your reference list.  

No plagiarism / Need references and should be clickable.

Policy Framework


An information technology (IT) security policy framework is the foundation of an organization’s information security program. Organizations use these documents to build process, determine acceptable technologies, and lay the foundation for enforcement. The security policy framework documents and their implementation express management’s view of the importance of information security.

What binds well-formed IT security policies together is a sense of shared beliefs, purpose and urgency. Within your organization these can be achieved by establishing principles that create a shared vision, by empowering others to act and by institutionalizing support processes. 

Need in 500 words no plagiarism 

App8 19490315

  Assignment Instructions

Please use files that are attachment for  work  

Please see the attachment for ( A ).

(A)    Select at least 2 of previous assignment projects, combine them
(B)    Design and develop 3 or more features and add to the combined project, including layouts, buttons, functions, and etc.
(C)    Make sure it compile and work.
(D)    Run on the Emulator.
(E)    Run on a real phone (optional)
(F)    Take screenshots of either (D) or (E), and document the new features you added. Good to add various design diagrams.
(G)    Zip the Android Studio project folder for this program.
(H)    Please have a cover sheet with your name and the name of the assignment. Name the file following naming convention “ENTD322FinalProject_First_Last.doc”
(I)    Upload the document and the zip file as attachments.

Note: for turn-ins, your project should be done using Android Studio, not Eclipse.

Mid 1


What is an  Annotated Bibliography



An Annotated Bibliography is a working list of references—books, journal article, Online documents, websites, etc. that you will use for an essay, research paper, or project. However, each reference citation is followed by a short summative and/or evaluative paragraph, which is called an annotation. ( See sample attached).
Administrative Notes:
This assignment is listed on the syllabus as “Mid-term research paper” and is worth 100 Points ( 20% of your grade). Your paper will be an annotated bibliography, specifically focusing on the “Discretion” topic (i.e. Protecting proprietary information  ) in the context of protecting National Infrastructure.

Annotated Bibliography sample attached.  Internet have many other samples of what this document should look like.

You paper must be in correct APA format, use correct grammar, and will need to include at least FIVE (5) resources (articles) related to Discretion with their respective short summaries for each article.
ALL of which must:
1) Be current. Published within the last 5 years.
2) Must be from Peer-Reviewed-Articles. ( University Library ).
3) All articles related to Chapter 7 Discretion.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers. 
Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out. 

Security Architecture 19652003

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

Identify all types of data and sensitive data the organization will store.

Define where that information is stored.

Record all hardware and software devices in your network.

Describe how the security controls are positioned and how they relate to the overall systems architecture.

Define security attacks, mechanisms, and services, and the relationships between these categories.

Specify when and where to apply security controls.

Present in-depth security control specifications.

Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.

Include the full scope of policy, procedural, and technical responsibilities.

Impact Analysis 2


 Next, gauge and evaluate your organizations current state of security and
protection protocols and mechanisms. Identify gaps, challenges
and opportunities for improvement by conducting a thorough audit making sure to:
1.Identify the industry specific cyber law in relation to inquiries and incidents.
    2.Assess the critical information infrastructure. Determine the configuration of doors, windows, logical controls, data storage and encryption, firewalls, servers, routers, switches,hubs, and so forth to be compliant.
  3.Identify key vulnerabilities points and strengths. Show compliance using a test case (pass/fail requirement). Demonstrate an actual compliance test of server, workstation, etc. that indicates what passes or what doesn’t.
  4.Indicate the legal elements and liability (costs) that the organization may 

 encounter for non-compliance. Place your findings in a report that

 will be reviewed by the CIO and System Security Authority (SSA). 

Application Security 19507381

The objective of this discussion is to understand how malicious software could violate the security of an information systems. Note that any software designed to infiltrate a target computer is know as a malicious software, and malicious software of different types are referred to as Malware.  

Therefore, you are task to do the following:

Q1:  Name  two types of Malware and  briefly describe their behaviors. As a security administrator in your organization, what are the processes you could use to detect and remove malicious software in a system? 

Note: All discussions must adhere to APA 6th edition format. . Please, do not post more than 200 words for the discussion. Please, don’t forget to create an in-text citations before referencing any article.

Db Security 19573023


Describe in 500 words the disaster recovery plan and who is responsible  at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Discussion Post 19477355

You were working on a team, how would you explain the importance of a solid design to one of your company’s clients who is in a hurry to just “get it done?” Secondly, would you like to work on a team with a person who had great customer service skills and mediocre technical skills, or great technical skills with no people skills at all?  Why?