The remote workplace has become common throughout all industries, and this aspect of the infrastructure represents another challenge for cybersecurity professionals. Remote work often requires that current security policies be adjusted to accommodate remote workers. This remote working aspect is another scenario that will prompt IT and cybersecurity professionals to review cyber policies and ensure all principles are applicable. The presentation should focus on cybersecurity issues related to remote work and be designed for upper management not directly affiliated with information technology. Please provide a PowerPoint presentation note

The remote workplace has become common throughout all industries, and this aspect of the infrastructure represents another challenge for cybersecurity professionals. Remote work often requires that current security policies be adjusted to accommodate remote workers. This remote working aspect is another scenario that will prompt IT and cybersecurity professionals to review cyber policies and ensure all principles are applicable.
The presentation should focus on cybersecurity issues related to remote work and be designed for upper management not directly affiliated with information technology. Please provide a PowerPoint presentation note.
The narrated digital presentation should address the following:
Describe eight security failures.
Relate the security failures to the principles of cybersecurity (CIA triad).
Explain specific design principles that have been violated.
Recommend the design principles needed for remote workers.
Title slide and reference slide. Include Note for Presentation
Support your presentation with a minimum of three scholarly resources.
The digital presentation should include graphics that are relevant to the content, visually appealing, and use space appropriately.

You are to write a research essay on an approved computer security or privacy to

You are to write a research essay on an approved computer security or privacy topic (see page
3 for a list of approved topics). Your essay must include a work cited page for any information
that you find from at least three sources (your book can count for one source). If you choose
to use internet sources, they must be cited correctly. The specifications for the paper are listed
below. All essays will be run through a plagiarism checking software. If any portion of your
paper is copied directly from an internet source or copied from another student, I will act as
deemed appropriate according to the Academic Dishonesty portion of your syllabus.
• You can submit the paper only once
• No late papers will be accepted
• The paper must be submitted in a MS Word format Only No PDF Allowed
Word Document – Written Essay
• Length: Must be at least 3 full pages but no more than 6 NOT including the cover page
and works cited page (that mean at least 3 pages of written text).
• References: You should have at least 3 sources and they need to be referenced
according to APA rules.
• Title page: Your header will appear on the first page only (cover page) in the upper-left
header and contain the words “Running head: TITLE OF YOUR PAPER”. Following pages
will only contain the title of your paper in the upper-left section of the header. The
page number should appear in the right section of the header and not appear on the
first page. In addition, the title should appear centered horizontally and vertically on
the page. The title should be your own unique name for your paper, not just the topic
of the essay. Under the title you should have your name and the name of the college.
• Font: Times New Roman, 12pt.
• Spacing: Double spaced, with no extra spacing between paragraphs
• Margins: All margins set to 1”
• Works Cited Page: This page should appear on a page of its own at the end of the
essay. No separate document or file will be accepted.
• No abstract is needed for this paper.
The formatting of this paper follows general APA formatting. If you need further information
on how to set up a research paper using APA format you can go to: Purdue University Online
Writing Lab-General APA Guidelines (opens new window)

This SLP assignment consists of two parts: Part 1: Software Requirements Specifi

This SLP assignment consists of two parts:
Part 1: Software Requirements Specification
One of the first tasks in the development of a software application
is to gather and document the requirements. The requirements will be
used in all other phases of the project so they are vitally important.
For this assignment, you will be creating the Software Requirements
Specification (SRS) for your Software Development Plan you started in
Module 1 (you will create the SRS as a separate document for this
assignment).
Part 2: Prepare a design for the application
Once the requirements have been completed for your Software
Development Plan, the next step is to prepare a design for the
application. The design process will vary based on the project you have
selected, but there will be some common steps. You should always select a
proper architecture, and you will usually have a user interface of some
kind that will require design. There is often some type of business
logic involved, and you may also have a database. Ultimately, you need a
good set of design artifacts for your application that will allow the
software engineers to do their job of implementation. For this
assignment, you will be adding design documents to your Software
Development Plan that you have been working on in the first two modules
of the course.
SLP Assignment Expectations
The following topics should be covered:
Requirements Elicitation
Summarization of the process used to gather requirements for your software project.
Software Architecture
Select an appropriate architecture for your application.
Describe the architecture and justify your selection based on the
strengths of the architecture and suitability to the type of application
you are developing.
Software Design
Identify the major functional areas of your application (i.e., user
interface, business logic, database, etc.). Note that your functional
areas should address the functional requirements in this module
For each functional area, prepare appropriate software design
documentation sufficient to allow software engineers to implement the
required code. Design documentation should include descriptions and
appropriate diagrams to support the design definition (i.e., UML
diagrams such as class diagrams, sequence diagrams, etc.).
Requirements Specification
Translate the informal requirements identified in the previous section to appropriate formal requirements.
Include appropriate UML diagrams such as use case diagrams to depict the requirements.
Thorough, well-organized topic coverage
Written at a college level
6-8 pages(not including title page or bibliography), double-spaced Microsoft Word document
APA Format

Assignment 6 Assignment 6 Design at least 4 screens with linked navigation (cou

Assignment 6
Assignment 6
Design at least 4 screens with linked navigation (could be one main with two secondary or a chain from main to secondary to tertiary) for an Airline site that mimics one of the large carrier’s current sites (Delta, American, SouthWest Airlines, United, etc.) with MockPlus prototype software. Recall that there are video tutorials available on the website. Please submit your project file for this question on Moodle. Please also submit screen shots of your 4 screens in a Word document (not pdf) and a link for your mockup screens. Do not use anything submitted previously for a prior assignment or class. You are required to use MockPlus (free trial version).
An airline company is designing a new on-line reservation system. They want to add some direct-manipulation features. For example, they would like customers to click a map to specify the departure cities and the destinations, and to click on the calendar to indicate their schedules. From your point of view, list four benefits and four problems of the new idea compared with their old system, which required the customer to do the job by typing text.
Provide and explain three examples of an application where menu selection and form fill-in are more appropriate than a direct-manipulation strategy.
Analyze an application you commonly use, but not Microsoft Word, and list at least 3 commands available through keyboard shortcuts (such as CTRL-P to print, F7 for spellcheck, etc.). Decide if these commands are well designed for users.

In this project, choose an idea or vision of your interest in the IoT or Distrib

In this project, choose an idea or vision of your interest in the IoT or Distributed Apps or Decentralized Systems space. This is a project to help you either understand/study a topic of your choice and/or help you develop an idea. There is no specific structure set, consider this as a research project where you re creating the material for a the topic. There is no wrong answer, there project is to see your innovative side and how well you can expand on an idea. Please keep it realistic and existent though; don’t make up stuff. You should cite the references in your report. (Minimum 4 pages excluding Title Page and References, double space is alright)
You have to submit a report on your project. Your report should include the following sections:
1) Introduction
2) IoT Communications based idea or Distributed App Idea – Finance, Gaming, Real Estate are example areas.
3) Challenges and Solutions to the idea. What are you trying to achieve/solve? Things you can develop on – Primary Market, Secondary market, Interaction between assets and components, earning method.
4) Conclusions

Software projects have a long history of failures. Many IT experts will tell you

Software projects have a long history of failures. Many IT experts will tell you such failures happen far more often than they should. There are many issues, both technical and non-technical, that can contribute to project failures.
Go to the Walden Library to find an incident where a software project failed due to a lapse in the process. You can use keywords such as “software failures,” “software crisis,” or “why software projects fail” to help locate candidates.
Write a 3 page paper about the lapse in the process. Identify what went wrong, why it went wrong, and what could have been done to avoid such a failure. Identify the key stakeholders in the software project, and assess what role they may have played in the failure of the project.
Note: Need at least 2 or 3 references in APA format.

Assignment Guidelines: This needs to be an analytical paper. Therefore, a topic

Assignment Guidelines:
This needs to be an analytical paper. Therefore, a topic needs to be chosen that can be argued for or against. The paper requires a strong thesis statement that makes an ethical claim. You can find strategies for creating an analytical paper thesis statement online.
The subject needs to be relevant to the computer science field.
The paper needs to have a title, and an author (you).
The paper needs a clear introduction that contains a thesis statement.
The paper needs a body that contains valid arguments which support the claim made in the thesis statement.
Use rules from the IEEE and ACM Code of Ethics to make your claims in the body of the paper carry more weight. You may also use other ethical rules from the realm of philosophy if you think they help support your argument.
The paper needs to have a works cited page and all of your sources need to be cited.
The paper needs a clear conclusion that mirrors the main idea of your thesis statement and also briefly summarizes your paper.
The length of the paper should be at least 5 pages. However quality trumps quantity and papers that are shorter than 5 pages may not be penalized if the quality is on par.

Chapter 10 discusses various types of policies for a business. As students, you

Chapter 10 discusses various types of policies for a business. As students, you decide to open your own business when you graduate. During the process one decision you make in order to save money and increase productivity is to allow for BYOD (bring your own device). Your security manager comes to you and discusses the security concerns with this type of service.

Your security manager explains that this decision will increase the complexity of the network. That based on your decision, the security manger recommends maintaining two separate networks; one for the business network and one for the BYOD. Based off the risk assessment from the security manager, you decide to write a BYOD User Agreement for your company.

Create a minimum of 400 words for a BYOD User Agreement on your company’s letter head. (Make up a fictitious company you want to start.) Decide on the level of service that your company will provide, the access you will allow your employees, how you will secure the network and your companies information. Keep in mind other chapters concerning insider threat, virus protection, etc. List all references and citations as required when doing your research.

my assignment in Software Engineering . ive already started it , i wrote about S

my assignment in Software Engineering .
ive already started it , i wrote about Software process Improvement .
i picked up 15 articles talking about such topic , i reviewed all of them, using IEEE format and citation .
what i need now are that :
1- Define the problem that will be tackled in this paper
the problem must be defined well from one of the used papers that i already reviewed . you could used the limitations. plz let me know what is the problem before writing about it because i have to tell my supervisor about it first
2- proposed solution > preferably using questioners and what methods u are going to use and analyze the questioners and we need to support our solution with some papers ( this is the first part which needs to be submitted in 5 days and get feed back about it to be approval ) need to support our solution
then
3- Validation
4 Write the abstract, introduction and conclusion
important note : i have to get an approval from my supervisor regarding the proposal solution and the methodology i will use first then we will do the rest of the assignment
we must use IEEE conference template in which i have already used in my assignment that you can find it in the additional materials
i have to cite author following IEEE format
i have attach an example of papers that similar to mine which might help
Comments from Customer
Plz don’t start writing the assignment till you define the problem very well and let me know about it so that I could get the approval before starting
I have sent you an example ( example 2 ) which was praised by the lecturer and he said this would help you in finishing the assignment
Plz read the example 2 I provided , see how the defined the problem and how he explain the proposal sulotion and do like what he did plz
We have to chose the problem from one of those paper I reviwed and talked about , cite some sentence from the paper u took a problem from and use IEEE CITATION AS I USED IN THE REALTED WORK OR THE Author USED IN EXAMPLE2
Is it clear ?

You have been hired as an IT expert by a small startup company to develop a tech

You have been hired as an IT expert by a small startup company to develop a technology project proposal that outlines a technology plan to set up an office for approximately 20 office staff members. Half of the office will work with desktop computers and the remaining with laptop computers using wireless networks. Employees will be permitted to use their own mobile devices on the network. The office will need at least one networked laser printer that employees can print to from the network. Each desktop computer will require access to the wired network and all the laptop computers will require wireless network access. All computers should be able to print to the network and access the internet.
include the following:
Project Beneficiaries:Write a description of all who will derive direct benefit from this phase of the project and explain how they will benefit.
Project Deliverables:Write a description of the computer-network hardware necessary to set up the computer networks and the necessary software and protocols. Include the following topics:
Routers and switches
Wireless access points
Hardware and software firewalls
Network Intrusion Detection Systems (NDIS)
Cables and connectors required for the physical network
Logical and physical network topologies
Which IP address versions (IPv4 or IPv6) will be utilized and why
IP address pool for the network
Domain Name System (DNS) and Dynamic Host Control Protocol (DHCP) solution.
Format your submission in a Word document, following the Citing and APA resources