Cyber Security : Discussions

PS: Please provide at least 2 references at the end of each discussion.

4. What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so? 

5.  Many believe that cloud computing can reduce the total cost of computing and enhance green computing (environmental friendly). Why do you believe this to be correct? If you disagree, please explain why? 

6.  Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization. 

7.  Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it. 

8.  What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer. 

9.  In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

10.  Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a persons eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not? 

11.  Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encryptedthat all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 

13.  A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? 

14.  If you could, what would you do to help create a national security culture, in which everyone is more knowledgeable and proactive about threats to information security? 

One Pege

https://www.cnn.com/2019/01/16/us/gm-toledo-racismlawsuit/index.html then read the following article: http://planphilly.com/articles/2017/07/25/in-2017- is-white-supremacy-still-alive-and-well-in-this-philadelphia-building-trades-union Note: GM Powertrain is a unionized facility who votes for their union officers of which some of the union officers get paid $50,000 to $100,000 Now answer the following questions: 1. Define the problem that GM Powertrain and Philly is experiencing as it relates to diversity and inclusion. 2. If the employees with power (the ability to influence due to either large numbers or protection by the union) are doing the harassing and they vote for union memberswho will the union protect and why? Will they protect the harassed employees or those doing the harassing, why? 3. What does this scenario have to do with the following statements: Having a certain identity that society values can provide you power. Belonging to a group with power can provide you protection in the workplace. 4. Now read the following: https://societyfordiversity.wordpress.com/2012/06/12/dont-let-ahanging-noose-surprise-you/ Based upon this reading, state three things that GM Powertrain and Philly should have done and three things they should not do as the scenario plays out. 5. Do you think that diversity training of the employees would help with these scenarios, why or why not? 

Pyschology

 

 Methodologies 

1. Phenomenological Research.”

2.”Grounded Theory Research.”

3.”Ethnographic Research.”

Revise the topic you submitted for Unit 4 Assignment 1 based on the feedback you received:

  1. Select three of the five methodologies presented in Unit 3.
  2. Identify the three methodologies selected as well as the research question you proposed for those methodological designs.
  3. Write one to two paragraphs which presents a purpose for the research based on that methodology.

Note that the purpose of research is to answer the research  question and obtain new knowledge related to the topic based on the  direction set by the research question.

Make sure that you do the following:

  1. Clearly identify three of the five methods described in Unit 3.
  2. For each of the three methods, include one research question that  aligns with that methodology (three research questions each of which  align with a particular method).
  3. In 12 paragraphs, provide a rationale for the purpose of utilizing each method to answer the research question.

The assignment should be formatted as follows:

  1. Section 1: Your revised topic.
  2. Section 2: Identify the first method, as well as the research  question that aligns with that method. Then, present the 23 paragraph  rationale that describes the purpose of the research.
  3. Section 3: Identify the second method, as well as the research  question that aligns with that method. Then, present the 23 paragraph  rationale that describes the purpose of the research.
  4. Section 4: Identify the third method, as well as the research  question that aligns with that method. Then, present the 23 paragraph  rationale that describes the purpose of the research.
  5. Section 5: APA formatted reference page. (The content of your  assignment should be supported with appropriate academic sources and  include both citations and references in APA format.)

Foreign Exchange Option

We will use the Garman-Kohlhagan model (Links to an external site.) to price our options in this assignment. We will write a function that takes the option contract parameters (type–call or put, strike price, and expiration date) as well as market observations (spot exchange rate, volatility, and interest rates in both the domestic and foreign currencies) and returns the fair market value of the option contract.

The work will be decomposed into several functions and the pricing function will use these lower-level functions to calculate its result. The functions you will write are:

fx_option_price(call, strike, expiration, spot_date, spot, volatility, domestic_rate, foreign_rate)
fx_option_d2(term, volatility, d1)
fx_option_d1(strike, term, spot, volatility, domestic_rate, foreign_rate)
discount(rate, term)
years_apart(date1, date2)