Free

Week 2 Discussion - Assignment Example

Comments (0) Cite this document
Summary
These competitions are held to know the competencies and innovative ideas of cyber professionals. Cyber competitions also reflect the interest of students in the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful
Week 2 Discussion
Read TextPreview

Extract of sample "Week 2 Discussion"

Discussion Cyber competitions are an important way to determine the skills and talent of different cyber teams and individuals. These competitions are held to know the competencies and innovative ideas of cyber professionals. Cyber competitions also reflect the interest of students in the development of cyber security mechanisms (Bardas & Ou, 2013). There are different methods and tools to score cyber competitions. My model for scoring cyber competitions would involve awarding points for display of skills and abilities related to projects, completing the tasks within time, completing the tasks with the most suitable and innovative skills, and implementing and maintaining a proper collaborative working mechanism throughout the process of project completion.
The critical services that would be kept alive include bringing new ideas in place, using the required tools and services efficiently and effectively, and keeping the ideas intact and applicable. The points for maintaining these services would be awarded based on the level of competency that the participants would in the due process. I would use periodic short interviews to monitor the progress of the participant and monitoring the services. The open source tools for the competition would include Linux (operating system), JBoss (optimization tool), MySQL (open source database), and Firefox (browser).
References
Bardas, A., & Ou, X. (2013). Setting up and using a cyber security lab for education purposes. Journal of Computing Sciences in Colleges, 28(5), 191-197. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1654997-week-2-discussion
(Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words - 1)
Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1654997-week-2-discussion.
“Week 2 Discussion Assignment Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1654997-week-2-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Week 2 Discussion

Week 2 Discussion

...deaths per 1000 person. The following discussion aims to identify the factors that act as reason behind the difference in the crude mortality rate of these countries. There are certain important factors that determine the difference between the crude mortality rates in different countries. These factors include the average age and structure of the population, the quality and standard of healthcare facilities, diet, nutrition and the level and prevalence of infectious diseases (Farmer, 2003). In case of Haiti and US, there is an obvious difference in the economic development level of both the countries and due to low economic position, the population of Haiti has little access of quality healthcare and safe drinking...
2 Pages(500 words)Essay

Week 2 Discussion Questions

...Week 2 Discussion Questions ID Lecturer What are the three project team structures? What are some of the elements that differentiate the team structures from one another? How is the project team structure related to the project manager’s authority level? The three project team structures are the process or functionally structured teams, the process structured team and lastly the resource pool structure. The process or functionally structured teams revolve around the premise that the major functional areas are taken care of by the team which are focused on that particular area. The process structured team is pretty similar to the first one. The teams are defined in order to support the business processes which are of significance... as...
3 Pages(750 words)Essay

Week 2 discussion

...on issues related to change in the organization. It must control its own budget, and have the ability to remove projects it sees insufficient for the company, and introduce new projects. It will have the responsibility of accessing all the programs of the organization, and develop new programs for implementation. This team, will be responsible for managing the expectations of the employees through constant communication, and articulation of the companies short term goals. Question 2: To sustain the relevance of an organization in its area of operation, organizations must institutionalize the process of innovation in their organization by creating an environment that encourages creativity as key to its values and...
4 Pages(1000 words)Assignment

WEEK 2 DISCUSSION

...and the findings were quite similar. Moreover, the largest percentage of the participants appeared to agree on the stressors that were being researched on. To generalize the results to other contexts, populations and settings it would be important it would be important to highlight other researchers conducted using larger and more representative samples and demonstrate the similarities and differences of their finding to those of this research. To generalize the findings to other settings, it would be necessary to describe the similarities and differences of the context of this research with other contexts. This would entail demonstrating the proximal similarities between the various contexts (Ongori & Joseph, 2008). The authors...
2 Pages(500 words)Essay

Week 2 discussion 1

...School: WEEK 2 DISCUSSION Lecturer: WEEK 2 DISCUSSION As a nation seeking to be a major competitor in the global business environment, investors in Kuwait are very poised on making investments that can be considered as globally competitive. To this end, two main assets used by investors in the country are equities and fixed incomes. By equity, reference is being made to stocks, which offer a representation of shares owned by investor in publicly held companies (Lilien and Rangaswamy, 2004). For most investors, equities are the best long term investments that guarantee returns on investment in the long term. Fixed incomes are also...
3 Pages(750 words)Assignment

Week 2 discussion 2

...NASDAQ STOCK MARKET   NADAQ stock market NASDAQ COMPOSITE INDEX YEARLY RETURNS YEAR BEGINNING PRICE ENDING PRICE GAIN OR LOSS PERCENTAGE GAIN OR LOSS 2004 2003.37 2175.44 172.07 8.59% 2005 2175.44 2205.32 29.88 1.37% 2006 2205.32 2415.29 209.97 9.52% 2007 2415.29 2652.28 236.99 9.81% 2008 2652.28 1577.03 -1075.25 -40.54% 2009 1577.03 2269.15 692.12 43.89% 2010 2269.15 2652.87 383.72 16.91% 2011 2652.87 2605.15 -47.72 -1.80% 2012 2605.15 3019.51 414.36 15.91% 2013 3019.51 4176.59 1157.08 38.32% Introduction The NASDAQ stock market is an American securities exchange that is the second largest securities exchange worldwide by market value capitalization after the New York Securities exchange. Started in 1971, the stock market has... STOCK MARKET ...
6 Pages(1500 words)Assignment

CYB Week 2 Discussion

...CYB Week 2 Discussion due: The word reconnaissance is originated from military, where it is used to denote to a mission into the enemy area to gain information. In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system. The attacker regularly uses port scanning to discover any vulnerable ports. Importance of Reconnaissance 1. Network reconnaissance is an important process as it helps to identify security threats to the system and services provided. 2. Facilitates solution to Cyber-security which is an area in which much course development is taking place and of much interest, Cyber-security training is important and necessities to be extended. 3. Help network... ...
1 Pages(250 words)Assignment

Week 2 discussion board

...behavior because it controls the physical aspects of it through the nerve cells or neurons, while, on the other hand, the human soul affects behavior that concerns making ethical and moral decisions. The brain controls the neurons that transmit neurotransmitters. In Chapter 2 of Experience Psychology, King (2013) described several neurotransmitters and their roles in people’s learning, emotions, actions, and other daily functions. Her main point is that the brain affects behaviors through the physical actions of these neurotransmitters that reflect on what people think, feel, and do. The human brain, however, is not the only one working when people make important decisions because the soul helps it make them. ...
1 Pages(250 words)Coursework

Week 2 discussion

...Week 2 Discussion Week 2 Discussion Behaviourism is a theory of learning that concentrates on observable behaviour rather than internal thinking. The theory of behaviourism operates on the principle of stimulus-response due to the belief that behaviour is caused by external stimuli. Ivan Pavlov demonstrated intellectual brilliance through his concept of classical conditioning. Pavlov offers the most compelling argument for the use of behaviourism when teaching a new subject to an adult or a child. Ivan Pavlov could use systematic desensitization to teach an adult a new skill of avoiding hydrophobia. The behaviourist would train the...
1 Pages(250 words)Assignment

Week 2 Discussion

...Bullying in Schools Bullying Biological, learning, and sociological factors are the major causes of the bully’s behavior in the school set up. There are several theories that have been put forward to explain the behavior of a bully, especially during the adolescent stage. These include; Attachment Theory This theory hypothesizes that the duration of attachment a child has to the parents or caregiver determines the development of a child and how the child relates to people subsequently in life. If a child has an insecure attachment, his or her response comes with extreme hostility levels and aggression. Such a person has higher chances of involvement in bullying due to internal working model continuity (Gabe, & Monaghan, 2013... in Schools...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Week 2 Discussion for FREE!

Contact Us