Recap

Week 16 Discussion — Recap For your initial post, discuss the topics in the list below. Write a couple of sentences for each.  Attached is the thesis used. Q1. Why did you think it was important to study/research this topic or conduct this project? Q2. What are other studies in your literature review suggesting about this topic? … Read more

Chip Set Security

Week 15 Discussion – Chip Set Security For your initial post,  discuss the topic below. Respond to posts from other students. Supply Chain Security Describe security vulnerabilities for manufacture and distribution of chipset supplies

Meta-Data

Week 13 Discussion – Metadata For your initial post, discuss the two topics below. Respond to posts from other students. Metadata collection Compare Government and the Private Sector policies for collecting and using metadata Describe how metadata might be used to protect future national security, and for boosting retail commerce and economic growth.

Drones and Mobile Computers

Week 12 Discussion – Drones and Mobile Computers For your initial post, select and discuss two topics below. Respond to posts from other students who have chosen different topics. Drones and Computers that are Mobile Describe possible legal legal and liability challenges related to Civilian Drones, Driverless Cars, and Autonomous Robots.  Is it right to hold software designers … Read more

Protection of Intellectual Property

Week 11 Discussion – Protection of Intellectual Property For your initial post, discuss the two topics below. Respond to posts from other students. Protection of Intellectual Property: Describe the possible effects 3-D printing may have on Copyright and Patent.   How might pirated 3-D digital designs affect future innovation? Explain how 3-D printing of biological DNA and replacement organs in … Read more

Security in a Complex World

Analyze network security threats, risks, and solutions presented by mobile devices in BYOD workplaces. Do the following: Analyze three common security threats for enterprises employing a BYOD policy. Explain the risk factors associated with mobile device security threats. Analyze how two significant features of a specific mobile OS keep their devices secure.

Cybersecurity

  7.2 Literature Review Funnel/Organizer Overview: While the literature review funnel is not necessarily a part of the actual dissertation, the purpose here is to think about the most logical way to organize your future lengthy chapter 2.Directions: View the rubric to make sure you understand the expectations of this assignment. DSRT 837 Rubric Adapted … Read more

Discussion board

  Terrorism preparedness and response (and attempts to prevent terrorism altogether) have added significant strain to already stretched state and local budgets. If local governments determine their own level of risk/vulnerability and act accordingly, other programs will suffer as a result of budget reallocations. Should local governments establish minimum standards and levels of preparedness, regardless … Read more

Supply Chain Security

Week 7 Discussion – Supply Chain Security For your initial post,  discuss topics below. Respond to posts for other students topics. Supply Chain Security: Describe roles and responsibilities within an organization that help assure proper security when purchasing hardware, software, and network equipment from external suppliers.  What types of cybersecurity vulnerabilities can a supplier of computer services introduce into a … Read more