Find a peer reviewed article pertaining to Blockchain and HR. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow […]
Archive for the ‘Information Systems’ Category
Discussion – 2 to 3 paragraph with references
Your responses are to be at least two paragraphs long and four sentences per paragraph. Update can include information about methodology, new literature discovered, or even questions regarding current progress. Topic selection is Cyber Security in Industry 4.0: The Pitfalls of Having Hyperconnected Systems can be found at https://www.jstage.jst.go.jp/article/iasme/10/1/10_100103/_pdf. APA citation is the following. Dawson, […]
week 11
Week 11: Do a bit of research on penetration testing techniques. Investigate and document the following Five network penetration testing techniques Advantages and disadvantages of each One notable social engineering test Possible negative implications of penetration tesing Please write between 200 and 300 words
Week 10:
Week 10: You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider: Who is likely to attack your site? When are attacks likely to occur? What sort of attacks might take place? How can you best minimize attacks and protect the […]
week 8
Week 8: You are the web master of a college website. You share a server with other school departments such as accounting and HR. Based on this chapter, create at least five rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. […]
week 7
Week 7: Use the Web to search for methods to prevent XSS attacks. Write a brief description of more than one method. Use your own words and supply references. Read and respond to at least two other students Discussions. Post your initial response by the end of day on Thursday and reply to at […]
week 6
Week 6: Do a bit of research on JSON and AJAX. How do they relate to the the Same-Origin policy? Using WORD, write several short paragraphs on each. A total of 200-300 words. Use your own words and do not copy the work of another student. Attach your WORD document here.
week 5
Week 5: Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords: 1. Prohibit guessable passwords o such as common names, real words, numbers only o require special characters and a mix of caps, lower case and numbers in pws 2. Reauthenticate before changing passwords user must […]
Week 4:
Week 4: Read the section in this week’s reading assignment on secure passwords. Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t Read and respond to at least two other […]
Week 3:
Week 3: Do a bit of research on CWE, Common Weakness Enumeration. Write a brief overview of their scoring system. Pick one of common weaknesses identified on their site and describe it. Your assignment should be 200-300 of your own words.