assignment 1143

Part A:

  1. How are browsers being used to mine crypto currency? (1 pt)
  2. Find an example of malvertising. Provide a screen shot of the malvertising. (2 pts) Provide the details on how and where you when you encountered the malvertising. (1 pts) [3 pts total]
  3. Review two Gmail-plugins (or your email provider) to help manage phishing and inbox overload. Provide the plug-in name, URL, and a two sentence description (2 pts)
  4. Compare and contrast the browsers “tails”, “brave”, and “chrome” from an Internet Security perspective. (6 pts)
    1. Create the three column table. Fill in five additional security – replace Example A-E. I have provided an example of a security feature (JavaScript Blocker) for each browser.
      1. Security Features Tails Brave Chrome
        Example A
        Example B
        Example C
        Example D
        Example E
        JavaScriptBlocker Yes Default setting – scripts blocked Plug-in required – Example – ScriptBlock
  5. How many cookies are on your computer and provide the contents of a single cookie? (1 pt)
  6. Review the advanced settings in your browser.
    1. Identify and describe two advanced settings that you were not aware of that were configurable in your browser (2 pts)

part B :

    1. Imagine you are the IT director for a company (you already are at least a sole proprietor). Create a memo for employees listing security eight guidelines for using company laptops on public wireless networks. (4 pts)
    2. Create a screen capture of your router’s login page. Attempt to login – where you successful or not successful? How could you find the username and password if you did not know the credentials? (3 pts)
      1. If you do not have access to the router, seek out the capabilities/features of the following-> https://www.verizon.com/cs/groups/public/documents…
        1. List three features you could change to improve your security
        2. List three features you could change to negatively impact your security
    3. Consider the activities completed in class, how have the activities made your re-think or update the way you use wireless networks. What are the consequences/tradeoffs for making security updates? If nothing made you re-think your mobile security, perform research to identify a security concept that was impactful. (3 pts)
    4. What is the operating system and version of your mobile phone? What features were included in the most recent update and patch? (2 pts)
      1. Example: IOS 12 (Update) and iOS 12.01 (patch)
    5. Consider the allegation that the president’s phone has been compromised. Explain six differences between a standard commercial phone and a hardened phone that a dignitary or security-official (say the NSA director) would use. (3 pts)

Part C:

    1. The chapter defines privacy and risk associated with unprotected private data. (4 pts)
      1. What do you consider private? (2 pts)
      2. What information, if stolen, would you feel violated your privacy? (2 pts)
      3. I do not want specifics – I am talking generalities to get you thinking about privacy – do not cite specific instances or examples.
      4. These should be at least 8 sentences each
    2. Try to use AES encryption (https://aesencryption.net/) on your name in all lowercase letters using “BUIS367” as the key and then try using all uppercase letters using the same key.
      1. Document your results below (2 pts)
    3. Apple recently provided a Security Overview of their Apple T2 Security Chip (https://www.apple.com/mac/docs/Apple_T2_Security_Chip_Overview.pdf). Identify three aspects of the chip that will protect your privacy. Provide at least a six sentence description for each of the identified aspects (6 pts)
    4. The previous questions were personal in nature. Consider three aspects of privacy that are pertinent to an organization (ie What does an organization need to protect)? Document these three aspects and provide strategies and/or solutions to maintain privacy.Responses should be at least six sentences each. (3 pts)

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post assignment 1143 appeared first on My Nursing Experts.

ethics in the workplace 5

Module 1 – Case

FOR A SUCCESSFUL START—BUSINESS ETHICS

Assignment Overview

This assignment provides you the opportunity to learn about ethical business behavior that is all around us.

Read Cases from the Real World: Competition and the Markers of Business Success, found in the following:

Byars, S. and Stanberry, Kurt (2018). Why ethics matter, chapter 1. Business Ethics. Rice University, OpenStax. Retrieved from http://cnx.org/content/col25722/1.3 pg. 15. CC BY 4.0 license

Also view the following interviews with Warren Buffett:

CBS Sunday Morning (2017). Sunday Profile with Warren Buffett. Retrieved from https://www.youtube.com/watch?time_continue=168&v=O665cNwMVGw. Standard YouTube license.

PBS NewsHour (2017). America should stand for more than just wealth, says Warren Buffett. Retrieved from
https://www.youtube.com/watch?v=S6irBmOnQEc. Standard YouTube license.

“It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.” Warren Buffett

What is an ethical leader? These individuals lead by example and exemplify ethical decision making and conduct focused on a common good. They are known to act with integrity and inspire respect among peers, constituents, and subordinates. Successful ethical leaders are champions of their beliefs and communicate them throughout an organization to develop a supportive culture.

In this assignment you have the opportunity to learn about Warren Buffett as well as another business leader of a well-known company or corporation of your choice that you have not had an opportunity to study yet. (Select a leader you are unfamiliar with.)

Keep in mind that all people possess virtues and vices, and while they may strive to support ethical tenets, they may fail at times.

It might be helpful for you to review the following lists of virtues and vices to see examples.

Niche Partners PTY Ltd. (n.d.). A list of the 52 virtues. http://www.52virtues.com/virtues/the-52-virtues.php

VirtueScience.com (n.d.). List of vices. Retrieved from https://www.virtuescience.com/vicelist.html

Case Assignment

Address the following in a 3- to 4-page essay, demonstrating your critical-thinking skills:

  • Discuss Warren Buffett’s approach to business dealings, especially as they relate to business ethics.
  • Apply ethical philosophies that you have learned about in this Module and state which you think apply to Mr. Buffett.
  • Bring in two of Mr. Buffett’s quotes that pertain to business ethics and discuss their meaning.
  • Compare and contrast your chosen leader’s behaviors to what you have learned about Warren Buffett.

This assignment should include third-person voice. Write a well-integrated paper with a strong introduction and conclusion, and use a few section headings (e.g., do not simply follow a Q & A format).

Bring in your Module background information. Whether or not you bring in sources outside of this Module is up to you. For all sources used, provide in-text citations and a references list.

General References Useful for Preparing Graduate-Level Papers:

For a list of general reference sources related to locating library sources, using APA formatting, applying critical-thinking skills, and so forth, see General References Useful for Preparing Graduate-Level Papers. It is not required that you read these sources page-by-page, but rather use them as guides.

Assignment Expectations

Your submission will be evaluated using the following criteria from the Case grading rubric, located in the Case dropbox:

Assignment-driven criteria: Covers all key elements of the assignment in a substantive way.

Critical thinking: Conceptualizes the problem. Multiple information sources, expert opinion, and assumptions are analyzed, synthesized, and critically evaluated. Logically consistent conclusions are presented with appropriate rationale.

Business writing: Mastery in written communications and a skilled, knowledgeable, and error-free presentation to an appropriately specialized audience.

Effective use of information: Locates relevant and quality sources of information, using strong and compelling content to support ideas, convey understanding of the topic, and shape the whole work.

Citing sources: Mastery using in-text citations of sources, proper format for quotations, and correct format of full-source information in the reference list using APA style (bibliography).

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post ethics in the workplace 5 appeared first on The Nursing Hub.

Need project management expert | Management homework help

 

This assignment consists of two (2) parts: a project schedule, and a written response. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the part of the assignment it is written for.

Part A: Project Schedule
(Submit as one [1] Microsoft Project file)

  1. Create a multi-level work breakdown structure (WBS) and detailed project schedule, using the information from the “Greendale Stadium Case” located at the end of Chapter 6, and incorporating the following constraints.
    Note: When you create your MS Project schedule, you will need to update your project per the following constraints: 
    • The project must consist of at least twenty (20) tasks.
    • Each task must have a start and finish date that matches the duration noted in the assignment. 
    • Each task must be assigned to a resource (e.g., Demolishing Crew; Construction Crew; Landscaping Crew). 
    • Assume that the crew works during normal weekdays (no weekend work) under normal conditions (8 hours per day).  
    • In terms of holidays, you can assume no work will be done the following days: New Year’s Day, President’s Day, Good Friday, Good Monday, Friday before Memorial Day, Memorial Day, the business day before Independence Day, Independence Day, the Friday before Labor Day, Labor Day, the day before Thanksgiving Day, Thanksgiving Day, Black Friday (day after Thanksgiving), the business day before Christmas, Christmas Day, the business day after Christmas Day, and New Year’s Eve.

Part B: Written Response
(Submit as a Microsoft Word file)

  1. Respond to the following questions in a one to two (1-2) page paper based on your project schedule. 
    • When will the project be completed? 
    • What is the critical path for the project?
    • How much slack / float is in your project? What activities have the greatest slack / float?
    • Identify the top three (3) activities that you believe could impact the project completion date.
    • What additional activities you would add to this project to make it more complete, from a project management viewpoint?  
  2. Format your assignment according to the following formatting requirements:
    • Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.

Describe how the survey was designed, how the questions were constructed, and how the results were tabulated. Then state, in your opinion, if there are any biases in the survey?

Surveys are common and often are effective techniques for conducting homeland security research because practitioners within the homeland security architecture are often spread over great distances. Go to the Ashford Online Library and identify a survey used in a homeland security-related article. Post an APA citation for the article you discovered that utilizes a survey to illuminate opinions or research on homeland security. Describe how the survey was designed, how the questions were constructed, and how the results were tabulated. Then state, in your opinion, if there are any biases in the survey?? questions or collection methods. Support your reasoning with appropriate resources

 
. WITH BEST NURSING TUTORS .

The post Describe how the survey was designed, how the questions were constructed, and how the results were tabulated. Then state, in your opinion, if there are any biases in the survey? appeared first on BEST NURSING TUTORS .
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.