In order to complete assignment #5 you will need to answer the below questions

 
In order to complete assignment #5 you will need to answer the below questions

 
In order to complete assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
Chapter 8Review Question #4 on page 261 and then answer the following question:The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?Chapter 9Apple, Inc. and Major League Baseball (MLB) signed an agreement for the broadcast of games. MLB will offer two live games per day, subject to black-out restrictions. Then MLB plans to roll out an entire offering of out-of-market games currently offered only through its premium live streaming video service. Identify some other, extra features users want. Identify restrictions that MLB will want to see in the agreement. 
Question 4  
The new age of technology presents much opportunity for litigation. The Internet is no exception. When operating Internet websites, an important part of it is owning the domain name (www.example.com). Anyone in the world can own any domain name that is available and the facts of this case arise from this concept.
The plaintiff in this case, Weather Underground Corporation (Weather Underground), a Michigan corporation, is a commercial weather service. It owns and operates several domain names so that people can access their company through their websites. Defendants in this case, Navigation Catalyst Systems, Incorporated (“NCS”), a Delaware corporation, owns many domain names that are similar to the plaintiff’s company name (some would result from people misspelling the correct domain name for Weather Underground). NCS profits from consumers going to one of these websites and clicking on links that are on them.
Plaintiff filed suit against NCS and several of its companies in the District Court for the Eastern District of Michigan. As defendants were not incorporated in Michigan, the issue of personal jurisdiction arise. The courts of appeals have held that in order to establish specific personal jurisdiction (showing that this company has established contacts with the forum state), one must show three things: (1) the defendant purposefully availed himself of the privilege of acting in the forum state, (2) the cause of action arises from the defendant’s activities there, and (3) the defendant’s acts were so substantial as to make the exercise of personal jurisdiction there reasonable.
The district court is considering whether the exercise of personal jurisdiction is proper. What should it decide and why?67

 Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targete

 Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targete

 Secure Hash Algorithm (SHA-1) calculates a 160-bit hashed value for the targeted message. Message Digest 5 produces calculates a 128-hash value. MD5 is now considered obsolete because of the “birthday problem”. Notice the increase from 160-bit to 128-bit. Do you think more bits for the hash value makes the algorithm better? Explain your position. 
The second question must be on a Word document.
The hash value of a message is a one-way “unique value” that can be extracted from the message using algorithms like MD5 and SHA-x. In this paper, you are going to use a hash calculator (the best way to find one is to google hash calculator). Cut and paste the message below into a hash calculator and compute the MD5 or SHA-1 hashed value. Once you have the hashed value, store it in a text file (notepad). Now, search for an AES encryption tool on the Internet (google: AES encryption tool). Paste the hashed value into the AES tool (note that you will need to create a secret password/key to use the EAS Encryption tool. Once the encryption is completed, explain the resulting value (what is it?). 

Define and describe cloud-based collaboration.    Google Docs is a cloud-ba

Define and describe cloud-based collaboration.   
Google Docs is a cloud-ba

Define and describe cloud-based collaboration.   
Google Docs is a cloud-based tool used for document sharing.  
Discuss pros and cons of using Google Docs for business-based documents.   
Compare and contrast the use of Google Docs with Microsoft 365 Word Docs for business-based documents.
Research Paper Requirements:  
Paper should be approximately four to six pages in length, not including the title page and reference page. . 
Use Times New Roman, size 12 font throughout the paper. 
Apply APA 7th edition style and include three major sections: the Title Page, Main Body, and References. See the Paper Elements and Format section of your APA manual for details. 
A minimum of two scholarly journal articles (besides your textbook) are required. See UC Library Tutorials. 
Writing should demonstrate a thorough understanding of the materials and address all required elements. 
Writing should use exceptional language that skillfully communicates meaning to the readers with clarity and fluency and is virtually error-free. 
Save as a Word document. 

Instructions: Assignment Overview – Alternate Processing Site Proposal R&D Media

Instructions:
Assignment Overview – Alternate Processing Site Proposal
R&D Media

Instructions:
Assignment Overview – Alternate Processing Site Proposal
R&D Media, LLC has asked you to develop a proposal for an Alternate Processing Site. Your task is to:
Conduct research on the latest technologies and strategies for Alternate Processing Sites (feel free to use your teamwork for this part of the assignment).
Determine who the company’s stakeholders are. You can adopt the role of an internal or external consultant for your perspective.
Using the results of your research, develop a technical proposal that best addresses the stakeholder’s requirements and incorporates innovative technologies in the recommendation.
Within your proposal you must also consider cost and what R&D Media, LLC can afford.
Develop and document the requirements for R&D Media, LLC’s alternate processing site building upon the concepts addressed in class materials and discussion topics.
Assignment Checklist – Be sure that you capture the following eleven sections in your report:
The needs of R&D Media, LLC’s stakeholders are considered within the plan.
List of mission critical applications/list of non-critical functions that can be dropped and describe how data will be protected through encryption and other means.
New technologies for Alternate Processing Sites are utilized.
A plan for updating alternate processing site software during normal operation.
Documentation showing a simple rack diagram and a network diagram.
A network configuration overview (IP, DNS, etc.).
Information security architecture (firewalls, VPNs).
Network bandwidth estimates.
Power consumption estimates.
Plan for cutting over to the alternate plan during a recovery scenario.
Plan for cutting back to the main site (a.k.a. hand back) to resume normal operations.
Scenario:
R&D Media, LLC
R&D Media, LLC is a small 100-person business that produces short animation movies for advertiser clients. Their clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.
Local Area Network and Workstation Description 
The business occupies one floor in an office building which is supported by a LAN. Everybody has a work computer on his or her desk, which can contain unshared work.  There are also servers  to support web, file and print sharing, email, database services. Additionally, a small 3D render farm (consisting of a rack of 20 quad processor Xeon® servers running Red Hat® Linux) generates high-resolution video animations that R&D Media, LLC produces for its clients.
The desktop systems consist of Apple® Mac® Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange®, web server, and file and print service.
Remote Devices and External Network Connectivity
Ethernet and the network hardware are a mixture from Cisco® and Hewlett-Packard®. Employees, business partners, and clients may visit R&D Media, LLC’s office with laptop computers in order to collaborate on projects that connect with LAN. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.
R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLC’s servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.
The network has the following additional specifications:
The network is all TCP/IP based using Cisco routers and switches.
All desktop computers include email, web, database access, and office productivity software.
All server and critical network equipment are in a secure server room, with some connected peripheral devices (e.g., printers) located throughout the office.
The multimedia department uses high-end workstations for video rendering and animation with authoring software installed.
A load-balancing dual firewall connects the network to the Internet.
Security Policy Details
All email must be secured so it cannot be inadvertently sent to the wrong party or intercepted, including use of encryption for confidential information.
All network resources and equipment must be password protected.
Company equipment may not be used for personal business and only limited personal use.
All Windows-based PCs must run approved anti-malware programs.
Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.
The mail server must be configured not to forward email that originated on the Internet.
Password aging must be enforced on all servers and desktops.
All server configurations must be readily available to rebuild a failed system.
Offsite backup is required, with 24/7 access to that location.
All employees will demonstrate they understand the security policy as set by a security officer who reports to company leadership.
Requirements:
Your paper should be 8–10 pages of content, in APA and include a cover sheet, table of contents, abstract, and reference pages. Be sure to document your content with proper APA in text citations that match your reference list.
Answers contain sufficient information to adequately answer the questions
No spelling errors
No grammar errors

> Compare and contrast a product breakdown structure (PBS) and a work breakdown

> Compare and contrast a product breakdown structure (PBS) and a work breakdown

> Compare and contrast a product breakdown structure (PBS) and a work breakdown structure (WBS).
> What is a scope baseline, what are its components, and why is it important?
> Describe the differences and similarities between the cone of uncertainty and rolling wave planning.
> Give an example of each class of constraint on determining the activity sequence.
Need 3-4 pages with peer-reviewed citations. No introduction or conclusion needed.

What have researchers learned about the security   vulnerabilities in social med

What have researchers learned about the security  
vulnerabilities in social med

What have researchers learned about the security  
vulnerabilities in social media platforms, and what strategies can be employed to mitigate these  
vulnerabilities.

 Field Cyber security Instructions: Address each of the following bullet points:

 Field Cyber security
Instructions: Address each of the following bullet points:

 Field Cyber security
Instructions: Address each of the following bullet points:
Find a professional article online written for people in your field. Identify the intended reader and purpose. Write description of the article describing the elements in the article that helped you identify the reader and purpose. Be sure to include the URL of the article.
Study your school’s Web site. Imagine you are a potential transfer student looking for a new school. Analyze the usefulness of the information available and how easy it is to locate information about various majors and directions about applying for admission. Identify 2-3 features of the Web site you would change in some way. Support your answer with citations from the text.
The following bulletin at a large manufacturing company provides guidelines for the plant security supervisors in assigning duties to the plant security guards at five separate plants. Revise and reorganize to make the bulletin easier to read and more useful to the supervisors. All supervisors must be conscious of the need to reduce costs and properly use available security guards in the most effective manner. Consider staggering the start and quit times to ensure a larger force during the peak demand hours. Every effort should be made to eliminate nonsecurity service functions, such as airport pickup, mail runs, drives to banks, drives to medical centers, parcel pickup. The supervisors should regularly review the schedule to be sure the coverage meets the needs of the plant. Guards assigned to gates should advise the shift supervisors whenever they leave their posts, including for lunch break. Nonsecurity service functions should be contracted out if possible. Drives to banks should be performed by the responsible department, but a department may request a security guard escort. Guards assigned to patrols, shipping and receiving docks, and special surveillance should tell the shift supervisors when they leave their assigned task, even for the lunch break. Supervisors should consider combining spot checks with regular duties of guards. For example, if a guard must open a gate and passes the trash center, the guard can spot check the trash pickup on the way to or from opening the gate. Supervisors must know about outside employment of guards. These outside activities should not adversely affect the security arrangements at the plant. In general, security guards should not also work at racetracks or casinos, or any places associated with gambling. Guards also should not be in partnership with co-workers since that relationship could negatively affect plant security. Supervisors need to check attendance records regularly. Frequent illness may indicate the guard cannot do the physical tasks appropriately. Questionable illness reports should be checked. Guards who operate small businesses may resist the normal rotation because it will interfere with their outside employment. Security requires a 7-day operation.
Find a real-world letter, memo, bulletin, pamphlet, or report online. Identify specific style problems. Evaluate the style and clarity of the document, and identify specific areas where revision would help readers. Support you answers with citations from the text. Be sure to include a url to the document you are evaluating.
Find a Web site you use frequently and analyze how you use it. How easy is it to find the features you want to see? Has the home page changed since you began using it? Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use? How informative are the headings and page titles? Are there any distracting elements? Are the graphics helpful or simply decorative? Are there moving graphics or text? If so, do they enhance the usefulness of the site? Write a memo to your instructor, analyzing the design of the Web site. Support your answers with citations from the text. Be sure to include the url.
Find the home pages for the following: a) Ford Motor Company, b) Chrysler, and c) General Motors. Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse. Report your findings to your instructor in a memo.
Find a review of a computer product online. Using the information in the review, write a task oriented set of instructions from the review. Be sure to include meaningful tasks and graphics. Use your book as a reference. Be sure to include the URL as a reference.

What is a zero-day attack in relation to cybersecurity? What processes are in pl

What is a zero-day attack in relation to cybersecurity? What processes are in pl

What is a zero-day attack in relation to cybersecurity? What processes are in place to facilitate zero-day patching on Windows systems? What issues can arise from emergency patching of enterprise systems? What advantages are there?

 Instructions You will be required to write one term paper this semester. The sp

 Instructions
You will be required to write one term paper this semester. The sp

 Instructions
You will be required to write one term paper this semester. The specifications are as follows: 
You must write a 4-6 page term paper on a topic of your choice related to Cyber Security (ALL TOPICS MUST BE APPROVED).   Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
Papers will automatically be submitted to www.turnitin.com for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A SIGNIFICANT POINT REDUCTION.
PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.