write a 3 to 4-page paper (not including title and reference page), conduct additional research and come up with an email attack you would use against a company List the areas you would need access to and the methods you would use to get access using your attack method. Also, provide examples of ways you would avoid detection.
database security culture,database auditing and monitoring fit within a SOX compliance framework and cloud computing security
1. Discuss in 500 words, how database auditing and monitoring fit within a SOX compliance framework?
2.Topics: Creating a database security culture. Propose and defend this topic for the project in 500 words.?
3.Topic: Cloud computing Security: Write it’s abstract in 200 words.
Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0
Exp19_Access_Ch06_Capstone – Northwind Traders Sales Analysis 1.0
Exp19 Access Ch06 Capstone Northwind Traders Sales Analysis 1.0
Access Chapter 6 Capstone – Northwind Traders
EX19_AC_CH06_GRADER_CAP
Project Description:
Northwind Traders is a small international gourmet foods wholesaler. You will update the company’s database by increasing the price of all of the meat and poultry products. You will make a table for archiving older order information. You will also summarize quantities sold by category and identify customers who have no orders.
Steps to Perform:
Step
Instructions
Points Possible
1
Start Access. Open the downloaded Access file named Exp19_Access_Ch6_Cap_Northwind. Grader has automatically added your last name to the beginning of the filename. Save the file to the location where you are storing your files.
0
2
Using a select query, you will identify all of the products with a category of meat or poultry, and then use an update query to increase the prices of the products.
Create a select query that includes the CategoryID from the Categories table and the UnitPrice and ProductName fields from the Products table (in that order). Run the query and note the CategoryID for Meat/Poultry.
8
3
Add the appropriate CategoryID criterion to limit the query output to only Meat/Poultry. Convert the query to an update query. Update the UnitPrice for Meat/Poultry only by increasing it by 6 percent.
8
4
View the query in Datasheet view prior to running it to make sure you are updating the correct (four) records. Return to Design view and run the query. Save the query as Update Meat/Poultry Prices. Close the query.
10
5
You will identify orders shipped during the first half of the year and create a new table in which to store them. You will then delete the orders from the current orders table.
Create a select query that identifies all of the orders shipped Between 1/1/2020 and 3/31/2020. Include all fields from the Orders table.
9
6
Convert the select query to a make table query. Name the new table Orders Archive. Run the query. Save the query as Make Orders Archive Table. Close the query.
6
7
Make a copy of the Make Orders Archive Table query and save it as Append Orders Archive Table. Open the Append Orders Archive Table query in Design view. Convert the make table query to an append query. The query will append to the Orders Archive table.
7
8
Modify the criteria to append orders shipped Between 4/1/2020 and 6/30/2020. Run the query, save it, and then close it.
6
9
Open the Orders Archive table in Design view and set OrderID as the primary key field. Switch to Datasheet view, then save and close the table.
4
10
Make a copy of the Append Orders Archive Table query and save it as Delete Archived Orders. Open the Delete Archived Orders query in Design view. Convert the append query to a delete query.
6
11
Modify the criteria to delete all archived orders from the Orders table (six records). Run, save, and then close the query.
6
12
You want to determine how sales are performing with respect to each product category. You will create a crosstab query that displays quantities by category and salesperson.
Open the Profit query in Design view and add the LastName field from the Employees table to the last column of the design grid. Run, save, and close the query.
4
13
Use the query wizard to create a crosstab query based on the Profit query that sums the total Quantity by Ship Country (row heading) and CategoryName (column heading). Accept the query name as Profit_Crosstab.
8
14
Modify the query to display CategoryName as the row heading field and LastName as the column heading field. Run, save, and close the query.
6
15
You will create a query to determine which customers have no matching orders. The customers will be contacted to determine if they would like to place an order.
Create a query to find out if any of the customers have no current order details. Add all of the fields from the Customers table to the results. Save the query as Customers With No Orders. Run the query and close it.
12
16
Close all database objects. Close the database and then exit Access. Submit the database as directed.
0
Total Points
100
Practical Connection Assignment for the course Access Control
Notq
linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own careers.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course (Access Control) have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Effect of Information Technology in Business Process
Effect of Information Technology in Business Process
This is a one-page essay writing and I want your response to touch on the benefits of Information Technology in a Business process that will include how all phases of IT infrastructure such as Servers, Network, Database, Applications, and Storages improves the business process in any organization.
10P-2
Deliverable: Working/Annotated Bibliography
As you begin researching you will conduct a preliminary source review which should include a variety of articles related to the research topic. Your focus should be on the more formal sources (i.e. peer reviewed articles). Websites, internet articles, newspapers, interviews, etc. are useful in identifying sources. They can also help support your points.
After reading each article, create an annotated bibliographic entry reflecting the reading using the format described above.
Discussion 13
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.
Please make your initial post at least 500 to 600 words. Please add APA 7 format and intext citations and mention all the references used in the paper with indent hanging format.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Strategy and Business Models Exercise
In this assignment, students will apply the concepts of business models and strategies to a real company. Students will have the opportunity to assess why these components work for the company, and what skills it takes for management to develop these long-term plans.
In 500 words or more, choose a company in the IT industry and describe its business strategy and business model. Why does this strategy and model work (or not work) for the business? Explain what skills you employed and how you used them to assess the chosen company’s IT decisions. What additional skills would be needed for a professional to implement changes within this company? What security issues are unique to the business/industry (e.g. finance, production, international product distribution, SCADA, political, defense etc.)? What steps/solutions would be necessary for this company?
This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
INT 2240 Lab 1 or Lab 2
- Lab TWO-01Problem Statement:
- 3.2.1.14 LAB: Essentials of the while loop
- ================================================================================================Submit your Python solution (as explained below).
Your lab will be graded on whether it’s been set up as a complete and workable solution.For your solution to be complete, your program must be able to
- Set up code to do the following:
- prompt the user for the input data asked for (as explained above within the Input Data section)
- Set up the processing section, using a loop
- Display output
- compile (ie, no syntax error(s))
- run (ie, no run-time error(s))
- For your solution to be workable,
- Your solution should be free of any type of errors (syntax, run-time, logic)
- you may want to develop an algorithm first, using pseudocode
- you do NOT need to turn in any algorithm
- ==========================================================================================================================Grading rubric:
- You’ll receive full credit, if
- your program
- compiles and runs with no problems
- produces the expected output
- your program
- You’ll receive partial credit, if
- your program
- compiles and runs with no problems
- produces partial output (that is, incomplete output)
- your program
- You’ll receive full credit, if
- You’ll receive 25% of the points, if your program will not compile
- You’ll receive 30% of the points, if your program compiles but has a run-time problem
- You’ll receive 40% of the points, if your program produces logic error(s) =========================================================================================================================What to submit:
- Your Python solution as a text file
- A screenshot of a run of your program, showing the output
- How to submit:
- Save your Python program (Lab TWO-01) as a text file to your computer
- Save a screenshot of a run of your program, showing the output
- Click on the above link: Lab TWO-01
- Locate your Python program (Lab TWO-01 file) on your computer
- Locate your screenshot of the run of your program
- upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
- Click on SUBMIT
- NOTE: You can make your submission just ONCE. So, before making your submission, ensure that it does not need any additional editing/revisions.=====================================================================================================
- Lab TWO-02Problem Statement:
- 3.2.1.15 LAB: Collatz’s hypothesis
- ================================================================================================Submit your Python solution through Blackboard (as explained below).
Your lab will be graded on whether it’s been set up as a complete and workable solution.For your solution to be complete, your program must be able to
- Set up code to do the following:
- prompt the user for the input data asked for (as explained above within the Input Data section)
- Set up the processing section, using a loop
- Display output
- compile (ie, no syntax error(s))
- run (ie, no run-time error(s))
- For your solution to be workable,
- Your solution should be free of any type of errors (syntax, run-time, logic)
- you may want to develop an algorithm first, using pseudocode
- you do NOT need to turn in any algorithm
- ==========================================================================================================================Grading rubric:
- You’ll receive full credit, if
- your program
- compiles and runs with no problems
- produces the expected output
- your program
- You’ll receive partial credit, if
- your program
- compiles and runs with no problems
- produces partial output (that is, incomplete output)
- your program
- You’ll receive full credit, if
- You’ll receive 25% of the points, if your program will not compile
- You’ll receive 30% of the points, if your program compiles but has a run-time problem
- You’ll receive 40% of the points, if your program produces logic error(s)
- Due Date: Any time on or before Monday, September 13, 2021.==========================================================================================================================What to submit:
- Your Python solution as a text file
- A screenshot of a run of your program, showing the output
- How to submit:
- Save your Python program (Lab TWO-01) as a text file to your computer
- Save a screenshot of a run of your program, showing the output
- Click on the above link: Lab TWO-01
- Locate your Python program (Lab TWO-01 file) on your computer
- Locate your screenshot of the run of your program
- upload (that is, attach) BOTH files, under #4 and #5, to Blackboard
- Click on SUBMIT
- NOTE: You can make your submission just ONCE. So, before making your submission, ensure that it does n.=====================================================================================================
Python
Please read the FE.dox to see the 5 questions that need to be done.
Price can negotiate.