Information System
Ethical Hacking
Discuss the Importance of Ethical HackingThe paper should have:Title pageIntroductionBodyConclusionReference page
Managing Markets
Managing Markets: Cloud ComputingIn this assignment, you will examine the effect of management innovation on a firms ability to effectively adopt an emerging technology. Using the example of cloud computing, you will apply the ideas you learned in Week 2 to discuss the adoption patterns for new technologies and opportunities to deploy them.Tasks:From the South University Online Library, read the following paper:Management Innovation and Adoption of Emerging Technologies: The Case of Cloud ComputingOn the basis of your reading, address the following:Discuss the objectives and main findings of the paper. Discuss the background, decision-making goals, and challenges addressed in the paper.Describe the architecture, methodology, and features that pertain to the technology in the paper.Identify the most important barriers to greater use of the technology.Discuss whether a firm would create more strategic value by developing and deploying this technology or whether it would do so by pushing the barriers of a known, more conservative technology.Discuss the forces shaping a commercialization strategy for this technology.
Designers Work
Discuss: For your first post: Step One: Watch the Thomas Heatherwick TED Talk video, link. If you have any troubles opening the link, you can also find it at the address provided here:Thomas Heatherwick: Building the Seed Cathedral(Links to an external site. (Links to an external site.)Here, too, is also the website for the firm: http://www.heatherwick.com/Step Two: After watching the video: Post about one (1) of the following four prompts:Write one paragraph that describes the work of Heatherwick and his design firm that is featured in the video: where is his design firm located, where has the firm completed projects, what is unique about the work? ORWrite one paragraph provide a brief description of how Heatherwick and his team of designers work. What is unique about their approach to making? Hint: it relates to questions. ORWrite one paragraph describe one project featured in the video or website. In your description, include the MEDIA, three VISUAL ELEMENTS, and the dominant PRINCIPLE OF DESIGN. What is the purpose or function of the project? ORWrite one paragraph, summarize your thoughts and opinions about Heatherwicks work in general. What are your own questions you have about the projects you see in the video?
Visual Art
For your Final Project, you will have four steps – two discussions, one PowerPoint and one research Paper. Detailed instructions and examples are available in the Week Nine Module. For the first step, please review the list of artists below and look at the art21 website (Links to an external site.).Discuss: For your first post, choose an artist (from the list below) to research for your Power Point and Paper assignments. Your first post is simply the name of the artist you have selected.SPECIAL NOTE: BEFORE YOU SUMBIT YOUR FIRST POST: Make sure and check the discussion to confirm that no one else has chosen the artist you are choosing. Only one (1) student per artist is allowed and the selection will be awarded on the basis of who made the selection first. If you do not participate in this discussion, I will assign an artist to you and you will lose points for not completing the assignment. I will confirm your selection by adding you name beside the artist you have chosen or been assigned. .For your second post, please identify why you have selected this artist? What drew you to their work?Art 21 List of Contemporary Artists(These artists are selected from a nationally televised show on contemporary artists called Art21. The website for review and research is www.art21.org (Links to an external site.). Once you are on the site, you can open the artists section and scroll through the Index to preview their work.)1. Ai Weiwei-2. Diana Al-Hadid-3. Ida Applebroog-4. Mark Bradford5. Layla Ali6. Cai Guo-Qiang-7. Nick Cave-8. Michael Ray Charles-9. Leonardo Drew -10. Thilo Frank-11. Katharina Grosse-12. Ann Hamilton-13. Elliot Hundley-14. Arturo Herrera-15. William Kentridge-16. Margaret Kilgallen-17. Liz Larner-18. Maya Lin-19. Trenton Doyle Hancock -20. Sally Mann-21. Elizabeth Murray-22. Ernesto Neto-23. Damian Ortega-24. Pepon Osorio-25. Marin Puryear26. Mary Reid Kelley-27. Mariah Robertson-28. Doris Salcedo-29. Avery Singer-30. Do Ho Suh-31. Shahzia Sikander-32. James Turrell-33. Ursula von Rydingsvard-34. Kara Walker-35. Carrie Mae Weems -26. Fred Wilson –
Predictive Analytics
Part 1:Discuss the possible data request scenarios in a distributed database environment.Part 2: Respond to a post belowLet’s discuss the data request scenarios one by one:1. Single request accessing a single remote database:This is a basic scenario in which a single SQL statement is directed to a single remote DBMS, also known as a remote request.2. Multiple requests accessing a single remote database:In this scenario, a single unit of work consists of multiple SQL statements directed to a single remote DBMS. The user can define blocks of the work using commit, rollback and save, but the remote DBMS managed the processing of this unit of work.3. Multiple requests accessing multiple remote databases:In this case, a unit of work may be composed of multiple SQL statements directed to multiple remote DBMSes. However, any one SQL statement may access only one of the remote DBMSes. Similar to the second scenario, the local user defines the units of work using commit, rollback, etc., but the remote DBMS to which the SQL statement was directed manages the unit of work’s processing. In this scenario, a two phase COMMIT must be used to coordinate COMMIT processing for the multiplelocations.4. Multiple requests accessing any combination of multiple remote DBMSes:In this scenario, a unit of work now may consist of multiple SQL statements addressed to multiple remote DBMSes, andeach SQL statement may address any combination of databases. Similar to the previous scenario, the local user defines the units of work using commit, rollback, etc., but the remote DBMS to which the SQL statement was directedmanages the unit of work’s processing. A two phase COMMIT must be used to coordinate COMMIT processing for the multiple locations.Part 3:1. How does data mining work? Discuss the different phases in the data mining process.2. Describe the characteristics of predictive analytics. What is the impact of Big Data (social media) in predictive analytics?Part 4: Watch the video below and answer the questionsPlease view the video associated with this threadBased on what the presenter shares during the video, please share your idea of the following:1) a future one-way ANOVA investigations possibility that may provide additional insight to this discussion. In your post, please may specific references to the presenter’s remarks.2) one experimental design component that you noticed. Be specific by stating what specific aspect of experimental design you are referencing and the specific example presented in the videoPart 5: Respond to a post below:The speaker explored the concept of “reasoning” Interpreting why is an important design component of this experiment. When interviewees are asked to explain their choices, they tend to reconstruct and fabricate the reasons for their original choices without realizing that the answers have been replaced. The shift in interviewees’ decisions was done by magic to manipulate the consequences of people’s choices – and then to measure why and how people felt about those changes. The conclusion can prove the hypothesis of the experiment, which has implications for the nature of self-knowledge and how people respond to manipulation.
Authoritative DNS Servers
What is the purpose of maintaining two separate DNS servers, one internal to the organization, and one external for customers? Explain recursive versus authoritative DNS servers and the potential issue with maintaining your corporate DNS server outside the organization?
How Steganography Works
For this assignment, you will write an essay on the video for this week:SteganographyIn this essay, you will explain how Steganography works in the world of data security. Discuss the many benefits as well as challenges or drawbacks in using steganography to secure data. Provide a real-world scenario on steganography. In addition to the video, choose one other scholarly reference to support your discussion.Requirements:Submit in a Word document.Include cover pageMust be a minimum of two pages (excluding references and cover page)Appropriate APA format is required.Properly cite and reference any borrowed resource(s)
Connecting Computers Responses
Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.RESPONSE 1:Briefly summarize the history of RC4 and what it tells us about the development of secure encryption algorithms.Chapter 9 Section 2.2 The RC4 StoryA man named Ron Rivest developed the stream cipher RC4 (otherwise known as Rivest Cipher 4 or Rons Code 4) algorithm in 1987. Even in 2021, older servers and wireless networks are still using RC4. RC4 was offered as a trade secret when introduced by Rivest, who at the time was the cofounder of the company RSA Data Security. This company was responsible to backing and marketing the algorithm. The RC4 was offered exclusively to venders who could pay a fee for the product but where restricted from extending this exclusivity to non-paying members. In being a trade secret, RC4 was never protected from patent protection rights. Meaning if someone outside of a lender paying a fee to use the algorithm were to get ahold of it independently, then Rivest is unprotected.During those years, the United States International Traffic in Arms Regulation (ITAR) considered encryptions as a threat to national security. Do not be alarmed however, because just a few years later not only did the National Security Agency allow the use of RC4, they also adopted Ron Rivests second block cipher creation known as RC2 on two conditions. Condition number one stated that secret contents of the secret key could not exceed 40 bits. Condition two stated that a trade secret algorithm had to remain if not a secret, then at least unpublished (Chap. 9 Sect. 2.2).In 1994, his algorithm was leaked anonymously to the Cypherpunks internet mailing list and from there it was history. Over the years, people are still in awe at its speed and simplicity. It tells us that both software and hardware are going to continue to develop more complicated and crack proof encryptions but maybe by the team we actually here about it, it would have been around and utilized by titan mogul companies for years.AnthonyResourcesSmith, R. E. (2016). Elementary information security, 2nd edition. Subury, MA: Jones & Bartlett Learning.RESPONSE 2:In this weeks discussion we are talking about RC4 and the development of secure encryption algorithms, network attacks, and three techniques for transmitting information on communication networks. RC4 was created by an MIT professor named Ron Rivest in 1984 (Smith, 2016). It was created to protect messages to secure websites and it generated a key stream in 8-bit bytes (Smith, 2016). RC4 eventually was used with WEP in 1997 and WPA in 2003 and was used in these applications because of its simplicity and speed. The key size has also increased to 64 or 128 bit.There are six types of network attacks. The first type of attack is physical theft. This occurs when network hardware like wires and hubs are physically stolen (Smith, 2016). The second type of attack is called subversion. This is when someone modifies the network in order to take over part of it (Smith, 2016). The third type of attack is called disclosure. This type of attack is when an attacker intercepts copies of network data which then can be used to discover secret information or two learn passwords or other data that will let the attacker gain even more access to the network (Smith, 2016). The fourth attack is called forgery. This attack allows someone to construct fake messages or modify legitimate ones as part of an attack (Smith, 2016). The fifth attack is called a masquerade. This attack is when a person tricks the network into sending messages claiming to be originated by someone else (Smith, 2016). The final attack is called a denial of service attack. This attack either restricts or completely blocks the use of the network by any users.The first form of transmission by communication networks is called message switching. Message switching sends one single piece of information that is passed from one place to another until it reaches its destination (Smith, 2016). This type of transmission will deliver either the entire message or nothing at all. It also is limited by the size of information that it can send as well as longer delays in transmission (Smith, 2016). The second form of transmission is called circuit transmission. This type of transmission sends information as one steady stream from one point to another (Smith, 2016). This type of connection is almost instantaneous with very little delays in the transfer of information (Smith, 2016). The downside of this type of transmission is that one sender cannot send to another until they are done receiving a message from the other. Another issue is that if there are any delays in the transfer, the receiving person will not receive parts of the message. The final form of transmission is called packet switching. In packet transmissions, data is packed into packets (either single or several packets depending on the size of data) and transferred to another user. Once the data reaches the destination it is put back together so that the receiver gets the entire message. The disadvantages of packet transmission is that the receiver must have additional features to guarantee reliable transmissions (Smith, 2016). Another disadvantage is that packets travel at different speeds depending on size.-KenSmith, R. E. (2016). Chp. 7 & 10. In Elementary Information Security (2nd ed.). Burlington, MA: Jones & Bartlett Learning
Modern Multimedia
Explain the origin and evolution of modern multimedia.
Advantages of Thunderbolt
Explain the three main advantages of Thunderbolt over other interfaces such as USB.
Use Promo Code: FIRST15