The presentation should meet these criteria:The presentation should contain a title slide and at leat 4 content slides.The presentation should have an appropriate theme.The title slide should contain the title, Barry’s Landscaping Service, and asubtitle, Bensenville, Indiana.The presentation should contain at least one or two clips or pictures on each slide.The clips and pictures should be appropriately resized.The 7 x 7 rule should be followed throughoutthe presentation.The font size of the title text should be larger than the content paragraph text.Important text should be italicized and/or bolded.Different font colors could be used to convey meaning.Spacing between elements in the presentation should be appropriate.The presentation, as a whole, should be visually appealing.A transitions should be applied to the all slides in the presentation.The presentation should not contain spelling or grammar errors.Submit the presentation in pptx format.
Please refer to the Course Project Overview, located in the “Introduction and Resources” module of our course. For this project, you can either use an organization with which you are familiar, or a fictitious company that is need of an IRP, a DRP, and a BCP. The company should be a small-to-medium size company – about 200 employees – that is responsible for some sensitive data (employee information, customer information, etc.), with a need to be able to operate throughout a security incident or disaster, and an additional need to be fully operational as soon as possible following an incident (think retail outlets, software development companies, colleges, school districts, etc.) Describe and discuss the key components of a comprehensive Incident Response Plan (IRP) for any attack on an organization’s network and data. The plan starts with a brief descriiption of the company, the identification of possible trigger events and includes immediate actions that should be taken. In order to earn full credit, you should include the following:
o A brief overall descriiption of the company
o An descriiption of the components of an Incident Response Plan needed for this company
o A discussion of possible triggers that would indicate that an incident is or has taken place
o Immediate actions that should follow the detection of an incident
ou’ve had some practice now creating servers, VPCs, subnets, and security groups. You’ve created a simple VPC. For the Final Project in the class, you are going to create a slightly more complex VPC. This VPC will include two servers and two subnets. One subnet will be private and the other public. We will assume that one server is going to be a database server (which should be protected by a private subnet) and a web server (which can be made public).
This Final Project will require you to use most of the AWS resources that you’ve worked with throughout the course.
Read the specifications in these Instructions for Completing the Final Project (docx) closely and then work through the steps as described. There is no video to accompany the project.
Because the Final Project is more complex, you can start in Week 7. It is due by Midnight on the final Wednesday of the term.
Make sure to submit all of the following items:
A screenshot of your VPC dashboard.
A screenshot of your EC 2 dashboard.
Submit your screenshots to this Module 8.1 Dropbox.
The presentation should meet these criteria:
The presentation should contain a title slide and at leat 4 content slides.
The presentation should have an appropriate theme.
The title slide should contain the title, Barry’s Landscaping Service, and asubtitle, Bensenville, Indiana.
The presentation should contain at least one or two clips or pictures on each slide.
The clips and pictures should be appropriately resized.
The 7 x 7 rule should be followed throughoutthe presentation.
The font size of the title text should be larger than the content paragraph text.
Important text should be italicized and/or bolded.
Different font colors could be used to convey meaning.
Spacing between elements in the presentation should be appropriate.
The presentation, as a whole, should be visually appealing.
A transitions should be applied to the all slides in the presentation.
The presentation should not contain spelling or grammar errors.
Submit the presentation in pptx format.
Select two topics of a research paper:
Citation and references
Bullets and list
– What are some specific features in MW used to create the two components that you chose?
– List four different styles used in writing a research paper and discuss the virtues of each.
– What are ethical considerations to be followed when writing a research paper and their importance?
Your response can be in your own words based on your reading assignment or other learning activities.
You may use resources in addition to your textbook that support your post. You must properly cite the source using a MLA standard.
Security issues/hacking of Artificial Intelligence of maritime industry related software,
program or tools, shipping or supply chain related tools and software- the goal could be reviewing attacks, impact, securing them with best practices, critically analyzing state of the art works from the digital library articles (ACM, IEEE). Hands-on exploration on open source systems are welcome.
From my professor:
Do not use direct quotes. We are focusing on paraphrasing ideas from outside sources in this class.
The topic I am doing is discussing why technology has a negative impact on people. If you have any questions feel free to message me.
After finishing this week’s readings, please provide a summary of issues emerging from the authority to generate and share intelligence, and provide recommendations to address them.
List of Issues: [list numerically and can be more than three]
Summary of Recommendations: [1-2 paragraphs]
The assignment should at the very least be 800 words
After you read this week’s required readings, please draft a summary of issues emerging from the Biden administration’s approach to cybersecurity, and answer the following questions:
1. Are we better or are we worse as a nation in our quest for Proactive Security?
2. Is our nation dependent on social media to build consensus?
Purpose: Create paper or digital wireframes based on the provided scenario.
Scenario: The leadership team at Fast Readers, Inc. is interested in seeing an initial set of wireframes. As a reminder, the company wants to offer the ability for people to link to online content and have the app read the content at user-selected, variable speeds. Based on this scenario, draft four wireframes, each for a different screen. Provide an explanation for each wireframe.
Introduction (include mention of the tool/methodology you used)
Your document should be formatted using current APA style and consist of 4 pages, not including the cover page.