Answer each. No references.
We\’re probably familiar with the gig economy through services like Uber, Lyft, and DoorDash, but there are other professional services available. The text mentions Mechanical Turk, but there are others like Fiverr, Guru, and Upwork. Would you ever work a job like this? What would expect the requirements to be like in terms of meeting face to face, having high speed Internet, or having a computer with specific components? Is this a sustainable business model?
WE WRITE PAPERS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project.
Write My Essay For Me1-What are the main security vulnerabilities in cyberspace? Which of these do you think is the most difficult for security professionals to address? Why? Discuss your reasoning….
2-Read Think about it 3.1 (p. 40) and Case Study 3.2 (p. 44). Do your own research on the Russian Hacking of the Democratic Party. Use reliable sources like the CIA report or congressional testimonies….
Discuss the role of the Internet in political espionage. Should political emails be public knowledge so voters know the “whole” story? What evidence does your research provide. Debate and discuss the 2016 election and email issues….
3-What do you think??
1. Think about some emails you have received that you believe were phishing emails. Share your examples with your classmates
2. Why do people respond to emails from strangers who offer them large amounts of money?
3. What can you do to protect yourself from becoming a victim of advance fee fraud?
4-Watch the 2003 power outage video and read through \”Think About It 5.1\”
(pgs 89-90).
Discuss what you think would be the consequences in your city and your life, if power went out for several days? Why would Brazil, and other governments, deny being the victim of a cyberattack?
4-Read Case study 5.1, pg 95 and watch the Snowden documentary.
Discuss:
Views on Snowden, why did he do what he did? What should the United States do/have done? How can we prevent such leaks in the future?
5-The media often uses the term \”Cyberterrorism\” to get the attention of their audience….the textbook discusses this on pg 130 and provides examples.
Using recent (2018 and on) news articles online, find an example of a time the term cyberterrorism was used incorrectly by the media. Post this article link to the discussion board and discuss why you believe the event discussed in the article is not cyberterrorism
5-Research the darknet Silk Road (and Silk Road II and III). Explore the background of Ross Ulbricht (aka: Dread Pirate Roberts). Who is he and what is the silk road? What happened to him? WHat happened to Silk Road after this?
Discuss with your classmates the role deterrence plays in this example….as a security professional, what steps would you take to ensure the actions of Ulbright were not replicated?
SAMPLE SOLUTION
Network and Security Foundation
With the continued growth and development in web technologies, a lot of companies within the gig economy have experienced a lot of growth and changes. This has made the gig business model suitable to work in, especially at a time where many people want flexibility and freedom in their movements and not stuck in an office from morning to evening. Therefore, I would definitely work on a job like this….



