COMPUTER SECURITY FUNDAMENTALS -2

 

Week 2 discussion topic

1) Computer security is essential to the protection of personal information and your company’s intellectual property. Please name some common procedures companies use to prevent business assets. Make sure to use real examples and share any resources you have studied? 

2) What is NIST 800-115. Explain how it works?  

Computer Programing

In 250 words or more, answer the following.

This week, I want you to create something based on what you’ve learned so far in this course.  Preferably, I want you to visit https://corallanguage.org/simulator/ and actually write it out.  Share with us what you created.  Come up with your own program that contains your own user-defined functions and variables.  Be creative.  I look forward to running your code myself.  

IG Wk3

 Final Research paper:

12-13 pages in total excluding title and references

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 25):  How do you define big data? What are the implications from the three industry trends (Three V’s), presented in the textbook, by the Gardner Group? Three V’s presented in the textbook are as follows: Volume, Velocity, and Variety. 

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

importance of data in organization

 Considering the importance of data in  organization, it is absolutely essential to secure the data present in  the database. What are the strategic and technical security measures for  good database security? Be sure to discuss at least one security model  to properly develop databases for organizational security. Create a  diagram of a security model for your research paper. Your paper should meet the following requirements: 

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. It should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Successes of Knowledge Management Systems

The research paper must be at least 15 pages supported by evidence (citations from peer-reviewed sources).  

• A minimum of four (4) peer-reviewed journal citations are required. 

1. Chapter 1 illustrates the document details of the research report and constitutes Background/Introduction, Problem Statement(s), 

Goal(s), Research Question(s), Relevance and Significance, Barriers and Issues related to topic chosen.

2.  Chapter 2 should consist of student paraphrasing the cited research material (i.e. what happened in case study x). 

3. Chapter 3 should be the reasoning for doing a basic compare/contrast or 

advantages/disadvantage of what was stated in Chapter 2 (do not state because the professor said so). 

4. Chapter 4 is a complete analysis, synthesis, and evaluation of what was stated in chapter 2. In effect, chapter 3 is a statement of what will be done 

and chapter 4 is what was done and what the findings were. Again, thus far the writing is objective and must not contain student opinion. 

5. Chapter 5 states results, conclusion, and future work recommendations.

A mesh network is a local network topology in which the infrastructure connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to route data throughout the local network

A mesh network is a local network topology in which the infrastructure connect directly, dynamically and non-hierarchically to as many other nodes as possible and cooperate with one another to route data throughout the local. network. 1) Discuss the advantages and disadvantages of a Mesh Network AND 2) comment on the its topology comparing it to STAR, RING, and BUS Topology.

Should be more than 350 words

Exp19_Excel_Ch04_Cap_Tech_Support

 Exp19_Excel_Ch04_Cap_Tech_Support 

Exp19 Excel Ch04 Cap Tech Support 

  

Project Description:

You have been hired as a student assistant in the IT department of your University. As part of your responsibilities, you have been asked to enhance the Excel workbook used to analyze the departments performance. The workbook contains records of all support issues resolved over the past year. You will convert the data to a table, format the table, sort and filter the table, insert calculations to evaluate key performance indicators, and prepare the worksheet for printing

     

Download   and open the file named EXP19_Ch04_Cap_TechSupport.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Freeze Panes so the first row   containing column headings (Row 5) on the SupportCalls worksheet will remain   static when scrolling. Ensure that Rows 1-4 are visible.

 

Convert the data to a table,   name the table SupportCalls, and apply the Gold, Table Style Medium 12.

 

Remove duplicate records.

 

Add a new column to the table   named Duration.

 

Create a formula using   unqualified structured references to calculate the days required to resolve   the incident (Date Resolved – Date Created).

 

Add a total row to display the   Average days required to resolve an issue.

 

Sort the table by Agent Name in   alphabetical order, add a second level to sort by Description, and create a   custom sort order as follows: Will not power on, Virus, Printing Issues, Software Update, Forgotten Password. Add a third level to sort by Duration smallest to   largest.
 

  Mac users, to create the custom list, from the Excel menu, click Preferences.   In the dialog box, click Custom Lists.

 

Filter the table to only display   closed incidents as indicated in the status column.

 

Use Quick Analysis to apply the   default Data Bars conditional formatting (Solid Blue Fill) to the Duration   column (range I6:I85). Mac users, on the Home tab, click Conditional   Formatting, point to Data Bars, and under Solid Fill, click Blue Data Bar.

 

Create a new conditional format   that applies Red fill and bold font to incident (range A6:A85) that required 30 or more days to resolve. Be   sure to use relative cell references in the conditional format formula.

 

Change page breaks so page 2   begins with the Computer ID column (column E).

 

Set the print scale to 85%.

 

Add a custom footer with your   name on the left side, the sheet name code in the center, and the file name   code on the right side.

 

Save and close the workbook.   Submit the workbook as directed.