1 ) Do a bit of research on penetration testing techniques. Investigate and document the following
Five network penetration testing techniques,
Advantages and disadvantages of each,
One notable social engineering test,
Possible negative implications of penetration testing. Please write between 200 and 300 words.
Building Secure Web Applicants
2) Write a Paper on Security and the Cloud with atleast 750 word research paper with at least 3 sources. Your paper must describe something related to secure web technologies. There should be no lists. Write in essay format not outline format. Include a meaningful title. You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. There should be no lists – bulleted, numbered or otherwise. Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs. Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. And also Write down the bibliography for the sources.
Policy, Legal, Ethics, & Cmplc
3) Write a Paper on the surveillance state with atleast 750 word research paper with at least 5 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title. You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. There should be no lists – bulleted, numbered or otherwise. Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs. Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software.
The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.
Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases
View this before embarking on your Project Research
https://learn-us-east-1-prod-fleet02-xythos.content.blackboardcdn.com/5b75a0e7334a9/1237028?X-Blackboard-Expiration=1611360000000&X-Blackboard-Signature=xrKLRHPPwCDDXmyuQYmfyjnYvSc7JkYyrAsTKccJBJo%3D&X-Blackboard-Client-Id=136444&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Zuboff.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20210122T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PL5SJBSTP6%2F20210122%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=f5380dbb98d7c7b397bba0fa22b8c51ef52256503b7e6fdcd6cb9dd1509e4d8d
The post 1 ) Do a bit of research on penetration testing techniques. Investigate and docu appeared first on The Writer.