SlideShare a Scribd company logo
1 of 8
1. Write a four page paper discussing the effect of Globalization
on the Liberian Health Care System. Draw out the Merits,
Demerits, Challenges and the way forward.
2. The Liberian Government has introduced a Community
Health Assistant Program geared toward reaching out to the
people who do not have access. The entire program has been
supported by Donors, there is a donor fatigue, and the program
ends September 2019.
As a student of Health Sciences, what were the missing links,
what should have been done in the past, and suggest the way
forward to the Ministry of Heath as a Technical Advisor on
Program. 2pages
Note: The government of Liberia has serious economy crisis
that the Economic growth is declining. Write your perspective
on this.
Use: Harvard style format with references and citations. Check
for plagiarism as a no, no
· NCBI
· Skip to main content
· Skip to navigation
· Resources
· How To
ITNE2002
Network and Information Security
Assignment 2
July 2018
ITNE2002 Assignment 2
Copyright © 2015-2018 VIT, All Rights Reserved.
2
Instruction
In this assignment, you are asked to writea
report on a topicof your choice and upload
it in
Moodle by the due date mentioned in the
Teaching and Assessment Plan or as per
Lecturer’s
instruction.
Report Writing and Presentation
• A one-page description of a topic(choose one
from following list provided below)
you want to report and present:
– Only one student can select one topic(i.e., first
come first serve basis)
– No team work allowed
– You have to prepare a 5-minute presentation of
the major ideasof the topic
in your report
– An in-depth survey on the major topics in
recent developments of
information security
• The content and depth of your surveys will be
considered in the final score.
• Topics should focus on selected parts in recent
developments in information
security, for example,
– Cloud security or privacy (e.g., cloud storage
security and cloud computing
security)
– Social network security or privacy (e.g.,
Facebook privacy issues)
– Smart phone security (e.g., Android “Fake-ID”
problem and iCloud security)
– Recent security bug: “Shell Shock” for bash,
“heartbleed” for OpenSSL,.
Class Presentation: 5-minute presentation per student
Word limits: 1250 to 1500
Reference Style
In this course, the Harvard reference style is
preferred. Please familiarize yourself with the
style. Yourability to use proper academic style
will form part of the assessment.
Plagiarism
Note that plagiarism or Copy/Paste from Google or
any source is NOT acceptable. Yourworks
will be checked with special software. The source of
all material must be clearly cited, whether
ITNE2002 Assignment 2
Copyright © 2015-2018 VIT, All Rights Reserved.
3
it be published or unpublished, and all
assistance, whether in writing or orally, must
be
acknowledged.
Topics to choose from
1. Google Play - Wallet security
2. Mobile Device / Smart Phone Security
3. USB has become hacked pipeline, the well-known
USB virusintroduced
4. Cloud security and privacy
5. Security of network DropBox Cloud Drive
6. DDOS attack Network
7. Cyber warfare
8. SALITY (malware)
9. OpenSSL Heartbleed Loophole
10. SQL Injection
11. Social network security/privacy proposal
12. Facebook privacy issues
13. OpenSSL: The Heartbleed Bug
14. Smartcard security authentication mechanism
15. Mobile payment systems security
16. Android broadAnyWhere bug
17. Improving App Privacy
18. E-mail- phishing
19. iCloud Vulnerability
20. iOS Masque Attack
21. TOR - Often referred to as the ‘Dark’ or
‘Deep’ Web. Anonymous Access is Good
or
Evil
22. Teamviewer Privacy and security Encryption
23. Bring your own device security model
24. Line Communication Security Event
25. Bitcoin
26. Instagram privacy
27. Shellshock vulnerability
28. Internet of Things Security
29. Extortion Hacks
30. Embedded Hardware Hacking
31. Advanced Persistent Threat
32. Chip-and-PIN Innovations
33. Symantec Endpoint Protection(SEP) Loophole
34. Heartbleed for OpenSSL
35. Driverless cars and data security
36. POS software and malicious attacks
37. Concerns about Cloud Storage
ITNE2002 Assignment 2
Copyright © 2015-2018 VIT, All Rights Reserved.
4
38. Biometric data security
39. Cyber Insurance
40. Threatassessments / Penetration Testing
41. Legacy technology security issues
42. Authentication in distributed systems
43. Identity and Access Management / Federated
Identity
44. Federated Identity Standards
45. SSL 3.0 security
46. Information Security Management / ISO 27001
47. Region (malware) analysis
48. Audit Trail
49. Web spamtaxonomy
50. Malicious Insiders
Assessment Criteria
Following is the criteria.
Criterion Marks
Clarity of ideas, discussion and examples
(coherent and well-structured piece of writing)
/2
Relevanceto selected topic /5
Documentation
(accuracy of referencing and relevance to topic.
Use of
primary data)
/2
Presentation
/6
Total
/15

More Related Content

Similar to 1. Write a four page paper discussing the effect of Globalization .docx

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarickjamesjarick
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking BadNUS-ISS
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxannettsparrow
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computingJorge Sebastiao
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptAkfeteAssefa
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in webMaher Alshammari
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trendsSsendiSamuel
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 

Similar to 1. Write a four page paper discussing the effect of Globalization .docx (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Etl523 pres jj jarick
Etl523 pres jj jarickEtl523 pres jj jarick
Etl523 pres jj jarick
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computing
 
Network Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.pptNetwork Security for Computer science and Engineering.ppt
Network Security for Computer science and Engineering.ppt
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 

More from braycarissa250

1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docxbraycarissa250
 
1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docxbraycarissa250
 
1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docxbraycarissa250
 
1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docxbraycarissa250
 
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docxbraycarissa250
 
1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docxbraycarissa250
 
1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docxbraycarissa250
 
1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docxbraycarissa250
 
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docxbraycarissa250
 
1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docxbraycarissa250
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docxbraycarissa250
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docxbraycarissa250
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docxbraycarissa250
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docxbraycarissa250
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docxbraycarissa250
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docxbraycarissa250
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docxbraycarissa250
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docxbraycarissa250
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docxbraycarissa250
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docxbraycarissa250
 

More from braycarissa250 (20)

1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx1.Does BPH predispose this patient to cancer2. Why are pati.docx
1.Does BPH predispose this patient to cancer2. Why are pati.docx
 
1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx1.Do you think that mass media mostly reflects musical taste, or.docx
1.Do you think that mass media mostly reflects musical taste, or.docx
 
1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx1.Discuss theoretical and conceptual frameworks. How are the.docx
1.Discuss theoretical and conceptual frameworks. How are the.docx
 
1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx1.Discuss the medical model of corrections. Is this model of c.docx
1.Discuss the medical model of corrections. Is this model of c.docx
 
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
1.Discussion Question How do we perceive sacred spaceplace in Ame.docx
 
1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx1.Cybercriminals use many different types of malware to attack s.docx
1.Cybercriminals use many different types of malware to attack s.docx
 
1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx1.Define emotional intelligence. What are the benefits of emotional .docx
1.Define emotional intelligence. What are the benefits of emotional .docx
 
1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx1.Define Strategic Planning and Swot Analysis2.List and define.docx
1.Define Strategic Planning and Swot Analysis2.List and define.docx
 
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
1.Choose a writer; indicate hisher contribution to the Harlem Renai.docx
 
1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx1.Being sure that one has the resources necessary to accomplish the .docx
1.Being sure that one has the resources necessary to accomplish the .docx
 
1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx1.Based on how you will evaluate your EBP project, which indepen.docx
1.Based on how you will evaluate your EBP project, which indepen.docx
 
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx1.Be organized. 2.   Spend less time doing a summary, but more o.docx
1.Be organized. 2.   Spend less time doing a summary, but more o.docx
 
1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx1.After discussion with your preceptor, name one financial aspec.docx
1.After discussion with your preceptor, name one financial aspec.docx
 
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
1.A 52-year-old obese Caucasian male presents to the clinic wit.docx
 
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
1.1Arguments, Premises, and ConclusionsHow Logical Are You·.docx
 
1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx1.4 Participate in health care policy development to influence nursi.docx
1.4 Participate in health care policy development to influence nursi.docx
 
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
1.5 - 2 pages single-spaced. Use 1-inch margins, 12 font, Microsoft .docx
 
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
1.5 Pages on the following topics Diversity, Race and Gender Equity.docx
 
1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx1.0. Introduction Effective project management is consid.docx
1.0. Introduction Effective project management is consid.docx
 
1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx1.1 What is the OSI security architecture1.2 What is the differ.docx
1.1 What is the OSI security architecture1.2 What is the differ.docx
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

1. Write a four page paper discussing the effect of Globalization .docx

  • 1. 1. Write a four page paper discussing the effect of Globalization on the Liberian Health Care System. Draw out the Merits, Demerits, Challenges and the way forward. 2. The Liberian Government has introduced a Community Health Assistant Program geared toward reaching out to the people who do not have access. The entire program has been supported by Donors, there is a donor fatigue, and the program ends September 2019. As a student of Health Sciences, what were the missing links, what should have been done in the past, and suggest the way forward to the Ministry of Heath as a Technical Advisor on Program. 2pages Note: The government of Liberia has serious economy crisis that the Economic growth is declining. Write your perspective on this. Use: Harvard style format with references and citations. Check for plagiarism as a no, no · NCBI · Skip to main content · Skip to navigation · Resources · How To
  • 2. ITNE2002 Network and Information Security Assignment 2 July 2018 ITNE2002 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 2 Instruction In this assignment, you are asked to writea report on a topicof your choice and upload it in
  • 3. Moodle by the due date mentioned in the Teaching and Assessment Plan or as per Lecturer’s instruction. Report Writing and Presentation • A one-page description of a topic(choose one from following list provided below) you want to report and present: – Only one student can select one topic(i.e., first come first serve basis) – No team work allowed – You have to prepare a 5-minute presentation of the major ideasof the topic in your report – An in-depth survey on the major topics in recent developments of information security • The content and depth of your surveys will be considered in the final score. • Topics should focus on selected parts in recent developments in information security, for example, – Cloud security or privacy (e.g., cloud storage security and cloud computing security)
  • 4. – Social network security or privacy (e.g., Facebook privacy issues) – Smart phone security (e.g., Android “Fake-ID” problem and iCloud security) – Recent security bug: “Shell Shock” for bash, “heartbleed” for OpenSSL,. Class Presentation: 5-minute presentation per student Word limits: 1250 to 1500 Reference Style In this course, the Harvard reference style is preferred. Please familiarize yourself with the style. Yourability to use proper academic style will form part of the assessment. Plagiarism Note that plagiarism or Copy/Paste from Google or any source is NOT acceptable. Yourworks will be checked with special software. The source of all material must be clearly cited, whether ITNE2002 Assignment 2
  • 5. Copyright © 2015-2018 VIT, All Rights Reserved. 3 it be published or unpublished, and all assistance, whether in writing or orally, must be acknowledged. Topics to choose from 1. Google Play - Wallet security 2. Mobile Device / Smart Phone Security 3. USB has become hacked pipeline, the well-known USB virusintroduced 4. Cloud security and privacy 5. Security of network DropBox Cloud Drive 6. DDOS attack Network 7. Cyber warfare 8. SALITY (malware) 9. OpenSSL Heartbleed Loophole 10. SQL Injection 11. Social network security/privacy proposal 12. Facebook privacy issues 13. OpenSSL: The Heartbleed Bug 14. Smartcard security authentication mechanism 15. Mobile payment systems security 16. Android broadAnyWhere bug 17. Improving App Privacy 18. E-mail- phishing 19. iCloud Vulnerability 20. iOS Masque Attack 21. TOR - Often referred to as the ‘Dark’ or ‘Deep’ Web. Anonymous Access is Good
  • 6. or Evil 22. Teamviewer Privacy and security Encryption 23. Bring your own device security model 24. Line Communication Security Event 25. Bitcoin 26. Instagram privacy 27. Shellshock vulnerability 28. Internet of Things Security 29. Extortion Hacks 30. Embedded Hardware Hacking 31. Advanced Persistent Threat 32. Chip-and-PIN Innovations 33. Symantec Endpoint Protection(SEP) Loophole 34. Heartbleed for OpenSSL 35. Driverless cars and data security 36. POS software and malicious attacks 37. Concerns about Cloud Storage ITNE2002 Assignment 2 Copyright © 2015-2018 VIT, All Rights Reserved. 4 38. Biometric data security 39. Cyber Insurance 40. Threatassessments / Penetration Testing 41. Legacy technology security issues 42. Authentication in distributed systems 43. Identity and Access Management / Federated
  • 7. Identity 44. Federated Identity Standards 45. SSL 3.0 security 46. Information Security Management / ISO 27001 47. Region (malware) analysis 48. Audit Trail 49. Web spamtaxonomy 50. Malicious Insiders Assessment Criteria Following is the criteria. Criterion Marks Clarity of ideas, discussion and examples (coherent and well-structured piece of writing) /2 Relevanceto selected topic /5 Documentation (accuracy of referencing and relevance to topic. Use of primary data) /2 Presentation /6 Total
  • 8. /15