Detailed instructions attached! No directly quoted material may be used in this

Detailed instructions attached!
No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page
1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.
2. If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)
3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.

Detailed instructions attached! No directly quoted material may be used in this

Detailed instructions attached!
No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page
1. Explain what Cloud storage is, how it works, and what challenges and remedies are presented when attempting to acquire data from the Cloud.
2. If you had to explain to someone how and why they should protect their data on their computer, what would you present (remember to think about some key steps from intrusion, issues such as ransomware, how incidents occur, etc.)
3. Explain at least three ways, in detail, that a digital forensic practitioner can display their ethical practices and understanding of ethics in the profession.

This are the citations : 1- Michael Veale, and Ian Brown. “Cybersecurity.” Inter

This are the citations :
1- Michael Veale, and Ian Brown. “Cybersecurity.” Internet Policy Review, vol. 9, no. Issue 4, Alexander von Humboldt Institute for Internet and Society, 2020
2-
Taeihagh, Araz, and Hazel Si Min Lim. “Governing Autonomous Vehicles: Emerging Responses for Safety, Liability, Privacy, Cybersecurity, and Industry Risks.” Transport Reviews, vol. 39, no. 1, Routledge, 2019

Data governance is a key concern for organizations both in terms of security, bu

Data governance is a key concern for organizations both in terms of security, but also in terms of high integrity to fuel work based on data analytics. It is extremely important to know the strength and limits of database management systems and their governance policies. Organizational investments in databases of even modest scope can easily go up to seven figures; it is crucial to understand information provided by product or service vendors to make informed decisions. Describe how you will evaluate data governance policies to select the best data infrastructure to power the organization’s data analytics for business decision making.

BMIS 665 At least 500 words with at least 2 scholarly citations in APA format. C

BMIS 665
At least 500 words with at least 2 scholarly citations in APA format.
Complete the following requirements for this Discussion:
1. This phase of the project develops the methodology and begins analysis of the information security solution. Following the project assignment instructions, summarize the most important concepts of the project.
2. Project summary should have an introduction, capture the approaches to information security design, discuss how data is to be gathered to analyze the solution, capture project limitations, as well as adding a conclusion, scope of the plan, rationale of the plan, and a conclusion paragraph.
Project summaries must include the following:
 A summary of the project phase requirements
 The most important concepts of the project
 The project summary is captivating and vivid
o A consistent and unique theme exists
o The message is articulated clearly from introduction to conclusion
o Information flows from section to section
o Long paragraphs or sentences are avoided
o From the introduction to the conclusion, the summaries are purposefully designed
to illuminate the audience

Answers 2 of the 7 questions below. Each answer must contain at least 250 words

Answers 2 of the 7 questions below. Each answer must contain at least 250 words for a total of 500 words altogether with 2 unique and relevant scholarly peer reviewed journal articles / references.
Discuss 2 of the following:
1. Is link encryption useful to individuals, or is it only for organizations having many users? Explain your answer.
2. What are the disadvantages of employing both link and end-to-end encryption?
3. Explain why the names “symmetric” and “asymmetric encryption” are appropriate.
4. Explain why encrypting with a sender’s private key demonstrates authenticity.
5. Explain why encrypting with a receiver’s public key achieves confidentiality.
6. Can a symmetric encryption algorithm be used to implement integrity? Explain your answer. Can an asymmetric encryption algorithm be used to implement integrity? Explain your answer.
7. Breaking encryption by cryptanalysis is quite difficult; performing a physical wiretap is, in comparison, less difficult. Give other even less difficult ways to obtain sensitive data.

Please pick one topic from the below term paper topic options. and write a 4000

Please pick one topic from the below term paper topic options. and write a 4000 word paper about it.
1. Malware and social engineering attacks
2. Cryptography
3. Networking and server attacks
4. Network security devices, design, and technology
5. Administering a secure network
6. Wireless network security
7. Client and application security
8. Mobile and embedded device security
9. Authentication and account management
10. Access management
11. Vulnerability assessment and data security
12. Business continuity
13. Risk mitigation

Assume that you are given a task to design a system for a vehicular network (or

Assume that you are given a task to design a system for a vehicular network (or any cloud
computing system). Briefly discuss security requirements for such a system. Outline a
security architecture that could achieve the specified security goals in your system. You
must include in your discussion of the security limitations of your approach.
Note that this is intended to be an open-ended problem and your alternative security
architecture may or may not exist as a specific product or system, so you are expected to
think creatively about this solution. It is likely that you will need to undertake some
research to assist in answering this part of the problem.

Team investigative research on Adrian Lamo. I need full research on his biograph

Team investigative research on Adrian Lamo. I need full research on his biography about who he is birthdate, where his from, what he did for a career, and interesting findings of him his family and friend relationship(it’s an investigative presentation for cyber investigation.). My two partners will research about what he did and other information. I am tasked with this section.