250 word discussion response cyber security and technology

Responses should be a minimum of 250 words and include direct questions. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.

Respond to Michael:

The dilemma of resolving tension between information technology and privacy is definitely complicated. John Shenefield (2010) wrote about the dilemma, exclaiming that there is a potential for great evil when powerful technological capabilities are available to fall into the wrong hands (p. 466). He expanded on this thought by writing “to ward off such a calamity, he recommends that the government make itself smart enough to take sensible steps to defend the public” (Shenefield, 2010, p. 466).

Due to civil liberty advocates opposition to cybersecurity intrusion detection systems, there has been a long difficult path to coming up with a system that can be agreed upon. According to Shenefield, the opposition pushed back resolution with developing federal intrusion detection systems for ten years (2010, p. 472-473). This shows that the nation really can prevent the government from having access to data. He suggested that a system should be created that upholds electronically enforced accountability, where the government is not restrained from access to data, but misuse can be detected and punishable (Shenefield, 2010, p. 474). If such technology was created, effective at detecting misuse, and efficiently monitored to catch unjust privacy infringements, I would say this could be of great value in the dilemma of balancing adequate information technology use and protecting privacy. The only question left after creating said software would be what defines a privacy infringement violation? Ultimately, I believe the technology mentioned by Shenefield offers great potential in satisfying both sides of the debate.

As for whether or not making technological choices at the intersection of privacy and civil liberties protection with national security requires trade-offs, Alexander Joel believes the answer is no. He wrote “the IC need not stand paralyzed by the choice between its core mission to provide security and its solemn obligation to protect privacy and civil liberties” (Joel, 2010, p. 1765). Further, he believes a lawful technological capability should be tailored to providing adequate security while protecting privacy and civil liberties (Joel, 2010, p. 1765). I agree with this point, and I feel like technologies such as the ones suggested by Shenefield could provide such a capability. If a program was created to police the use of cybersecurity capabilities and ensure privacy was not overly infringed upon, balance between security and freedom could potentially be met.

Finally, in regards to whether it’s justified to have civil liberties and personal rights interfered with for the sake of national security, Nadine Strossen provides a quote from Justice Brandeis: “Experience should teach us to be most on guard to protect liberty when the government’s purposes are beneficient…. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding” (2000, p. 21). Strossen’s conclusion upon the dilemma matches my opinion. Swaying the protection of civil liberties and privacy can become a slippery slope, and a line needs to be drawn to protect such rights. As said throughout my post, programming should be developed to protect these rights. Where technological capabilities can be developed to detect security threats, similar capabilities can equally be developed to run alongside cyber-security programs to safeguard against unlawful civil liberty and privacy infringement.

Resources

Joel, A. W. (2010). Choosing both: Making technology choices at the intersections of privacy and security. Texas Law Review, 88(7), 1751-1765. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/722461786?accountid=8289

Shenefield, J. H. (2010). A knowledgeable insider warns of the challenges in shaping counterterrorism policies. Journal of National Security Law & Policy, 4(2), 465-474. Retrieved from https://search-proquest-com.ezproxy2.apus .edu/docview /872471643 ?accountid=8289

Strossen, N. (2000). Cybercrimes v. cyberliberties. International Review of Law, Computers & Technology, 14(1), 11-24. doi:http://dx.doi.org.ezproxy2.apus.edu/10.1080/ 13600860054854

applied-system-analysis-ii-question-2

Course Project Part 2—Architecture Detail

Continuing with the course project you started in Week 1, this week, you will continue working on the solution you have envisioned so far. The work that will be added this week will increment the information you have produced so far, complementing it in a coherent manner.

Tasks
This week, you will design the architecture for the project.
Using the Microsoft Word document created in W1 Assignment 3, add to it by completing the following tasks:

  • Discuss in detail, using diagrams to support your words, how the architecture is to be used in the system.
  • Address operational, performance, security, cultural, and political requirements for the project.
  • Present three possible interface and navigation design concepts.

Submission Details:

  • Support your responses with appropriate research and examples.
  • Cite any sources in APA format.
  • Name your document SU_ITS4090_W2_PP2_LastName_FirstInitial.doc

capital-gains-tax-1

In his article written for the National Review Online, author Bruce Bartlett presents the following argument against the imposition of capital gains taxation:

Trees grow and they also produce fruit. The fruit is income and is justly taxed. But growth of the tree is an increase in capital. More capital will produce more income in the future, which will be taxed, but taxing the capital itself is counterproductive. We are taxing the tree and the fruit, when we should only be taxing one or the other. Taxing capital gains is like chopping limbs off of trees. We only end up with less fruit in the future. Not taxing capital gains—not chopping limbs—would allow the tree to grow, which will produce more fruit in the future and increase government’s take of it (Bartlett, para. 3).

In this discussion, explain whether you believe that the federal government should abolish the current capital gains taxation structure. Provide solid justification for your stance on the issue with relevant examples and appropriate citations.

final project 224

Hi ,

I need answer for the below requirement.

Project Question: Individually, students will prepare a 15-20 slide PowerPoint presentation on the evolution of retailing. There should a minimum of 4 academic research articles. All papers need to adhere to APA methodology.

Note1: Please provide me at least 5 references.

Note: Subject name is Marketing Management.

business question 5 1 or 2 pages mla

Question # 5: Power Plus Battery Company (“PPBC”) has a production plant located in Tampa, Florida. PPBC manufactures batteries for motor vehicles. PPBC has 200 employees and sells its batteries to customers in twenty-five different states in the United States. The Occupational Safety and Health Administration (“OHSA”) is a federal administrative agency that has the authority to establish safety standards, pursuant to the authority delegated to it by the United States Congress in the Occupational Safety and Health Act. These safety standards, also known as safety rules or regulations, apply to different industrial operations that have at least fifty (50) employees and are engaged in interstate commerce. OSHA proposes a new safety standard governing the handling of certain acids in the workplace. The proposed safety standard includes acids that PPBC uses in its production processes. After reviewing the proposed rule, PPBC concludes that compliance with the proposed rule will substantially increase its production costs and the proposed rule will not significantly increase worker safety. PPBC sends a letter to OSHA stating its objections and concerns to the new rule. Enclosed with the letter are independent research reports and other materials that support PPBC’s objections to the proposed rule. What procedures must OSHA follow when it adopts a new safety standard such as this one? What obligation does OSHA have to consider the objections and the materials submitted by PPBC? What options does OSHA have regarding the proposed rule? How does OSHA announce its final decision on the new rule? Once the new rule has been adopted, what source may interested parties use to find the final version of the new rule?

5-tweets-and-1-sentence

Create 5 separate tweets (articles, videos, infographics, etc.) regarding additional pros and cons of social media in K-College education or your professional setting. Each tweet must include a one sentence hook / phrase with the link to the recommended resource using the hashtag #edtechknow.

assignment in apa format

For this week’s assignment you are going to visit some job websites and look for jobs. Please search for:

  • Public policy manager
  • Public policy analyst

There are going to be a variety of different jobs that come up when you do the search. You can use jobs with different names, but they should have the words “Public” and “Manager or Analyst” in the job title. Please find at least five jobs on some of the job sites that are out there like Indeed. Please look at the entire job listing, but focus on the education and experience, knowledge, skills and abilities.

In a two page APA formatted paper, please describe what you have found. Please make sure that the following points/questions are addressed in your paper.

  • Are the skills and competencies that were described in the article match up with what the job listings description?
  • What matches between what is mentioned in the article and what does not?
  • Overall thoughts

computer-architecture-assignment-1

You have just been hired as a network administrator for a company that provides background credit checks for car dealers. They are going to be implementing a new system architecture that you will be tasked with managing. They are asking for your input on the design.

The requirements are as follows:

  1. Users in the company use laptops to access the internal systems. When they are in the office, they use a wireless network and when teleworking from home they use a VPN over the Internet.
  2. Their work, particularly the algorithms they use in the applications, as well as the individual data, is very sensitive and so they want the data to be stored and processed in an on-premise data center with very strict security.
  3. Because of the volume of usage and the need for redundancy (they guarantee response to their customers within 1 hour of the request), they are requiring at least 2 physical servers which will be mirrors of each other.
  4. Their main application is fairly complex and very computational. It uses a fat client which must be installed on the user’s laptop. The application is based on retrieving data from a large database that will reside on their machines. If the individual being assessed is not in the database, or the data on them is old, the system will go out to an outside credit bureau to retrieve data and this will be added to the database.
  5. When the analysis is complete, the system sends a report to the customer, once it has been approved by the user’s supervisor.

You will develop an architecture diagram which details

  1. The physical computer hardware that you need (e.g., types of servers)
  2. The networking hardware that you will need (e.g. wireless access point)
  3. The security hardware/software that you will need (e.g., firewalls)
  4. Any outside connections (e.g. to the customer)

In addition to the network diagram, also include any notes which show the assumptions that you have made. Options for your diagram:

You can draw in Word or PowerPoint

You can use a tool such as MS Visio

You can draw the diagram by hand and scan it in

what is the expected return on the company s equity before the announcement of the debt issue construct the company s market value balance sheet before the announcement of the debt issue what is the price per share of the firm s equity

**THIS IS A GROUP PROJECT**

I AM ONLY RESPONSIBLE FOR THE QUESTIONS I PROVIDED AT THE BULLET POINTS. MY PORTION DOES NOT NEED TO BE 1,050 WORDS, THE TOTAL ASSIGNMENT IS 1,050.

IF YOU HAVE ADDITIONAL QUESTIONS, PLEASE FEEL FREE TO REACH OUT.

The purpose of this assignment is to demonstrate to students how the issuance of debt to purchase outstanding common stock could affect the value of the company’s equity and redefine the capital structure. The problem will also allow students to explore the effect of corporate taxes through debt financing.

Assignment Steps

Resources: Corporate Finance

Scenario: Hightower, Inc. plans to announce it will issue $2.0 million of perpetual debt and use the proceeds to repurchase common stock. The bonds will sell at par with a coupon rate of 5%. Hightower, Inc. is currently an all-equity company worth $7.5 million with 400,000 shares of common stock outstanding. After the sale of the bonds, the company will maintain the new capital structure indefinitely. The company currently generates annual pretax earnings of $1.5 million. This level of earnings is expected to remain constant in perpetuity. The tax rate is 35%.

Prepare a 1,050-word memo advising the management of Hightower, Inc. on the financial impact, including the following:

  • What is the expected return on the company’s equity before the announcement of the debt issue?
  • Construct the company’s market value balance sheet before the announcement of the debt issue. What is the price per share of the firm’s equity?

Show all calculations and submit with your memo.

Format your paper consistent with APA guidelines.

Submit your assignment.