Week 5 Assignment

   Week 5 Written Assignment This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions: How do geographically dispersed      teams collaborate effectively? Please find at least three      tools on the market that teams can use to collaborate on a geographically      dispersed team.  Please note the … Read more

4/4 Assignment

Paper on Mitigation Strategy Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4. As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name). Conduct Internet … Read more

4/3 Discussion

Read Chapters 14–17 in your textbook. Using the discussion link below, respond to the following prompts and questions: What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)? How can threats from Internet-based activities, such as the use … Read more

4/2 Reading

Read Chapters 14–17 in your textbook. Using the discussion link below, respond to the following questions: What was the most useful takeaway for you from this workshop’s reading? What concept from the reading is the most applicable to you now in your profession, and how might you implement it?

4/1 Devotional

The scriptures suggest that you “train up a child in the way they should go, and even when he is old he will not depart from it” (Proverbs 22:6, ESV). Training is considered important in maintaining a healthy perspective in life. So too can training of employees provide many benefits. A security awareness program provided … Read more

INT 1010 3

 . Evaluation MatrixCreate an Evaluation Matrix Chart in MS Excel comparing 3 technology careers for each criterion. What should be in the matrix: Three technology careers from Chapter 8. (i.e. system analysis, software engineer, help desk technician) to evaluate. Three criteria (all students must use these criteria).   Salary – Look up the criteria for each of … Read more

Mobile User Interface Design

People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online.  In no less than five written full pages of content (5), discuss in scholarly detail the points below.  … Read more

Vulnerability Memo

 Your task this week is to check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.   Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices. For each device, … Read more

CYA assignment

 – write and submit a lab report  of a minimum of 3 pages on what you learned in the lab, with screenshots and analysis of the following labs in testout. Please follow the attach instructions.