Project #4

Database Project

  • Project 4 Instructions Actions | Print and follow these instructions to complete this project
  • You can build the database example I have outlined in these Instructions
    • OR you can build your own database.
    • If you build your own database
      • The database must contain at least 3 tables (with at least 5 fields and 5 records in each table)
      • You may not use a template for this project

Building secure web applications

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

London and Quadrant Association

 

You are asked to look at the four housing associations and choose the one whose location most resembles your own home area, together with another association in a contrasting area. You are asked to address four questions for each of the two associations that you have chosen:

1. Given the fact that the association is a charity, with risks related both to its financial and charitable aims and any profits made being reinvested to support its charitable aims, what do you assess as the biggest risks facing the association and what is your assessment of these risks? Note that “for profit” activities such as building houses for sale can also contribute to an association’s aims (e.g., to provide affordable housing within its chosen area of operation).

2. Considering the list of products in the “Background” section, how do you rate their potential risks and returns for the association, again in relation to its charitable aims and viability constraints and in the context of the association’s operating environment?

3. In the light of the association’s financial position and its charitable aims, how high should be the risk appetite of the association? Is one of the generic strategies listed in the “Sector Issues” section appropriate for the association, and if not then what should the association’s strategy be?

4. Can you suggest product growth targets and appropriate risk limits that will enable the association to develop safely and dynamically in the short/medium term? The association data was drawn in 2013 from current real cases, and it may help you to investigate the “actual” cases and their contexts.

Textbook: Implementing Enterprise Risk Management Case Studies and Best Practices. John Wiley & Sons.  Fraser, John, Simkins, Betty, Narvaez, Kristina. (2015) 

Chapter 8: Housing Association Case Study of ERM in a Changing Marketplace 

Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

week-12 discussion

 Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for. 

SOFTWARE -9

 

Dear Students,
After you review all course materials attached below please answer the following question.

Assignment:

Which skills do you think are more important for information technology project managers to possess at various points in their careers: strong technical skills or strong communications skills?

Discussion

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Data and System Security

 What are risk analysis and threat definitions? Explain What is being protected? What are the threats? Where are the weaknesses that may be exploited? Explain at least three(3) types of attacks and how they impact organizational data/resources?. 

Need 300 words with references 

Article read

 After reviewing the Cases (The New Roles in Technical Communication and Top 10 trends shaping tomorrow TCI) respond to the question: what technical communications mean to you, the roles it plays in business and industry today, and also what are some of the key trends? 

600 words

Research paper – 5 pages 5 references

Research paper topic: Data breaches in the cloud

 By 2018, the need to prevent data breaches from public clouds will drive 20% of organizations to develop data security governance programs.
Recommended Action: Develop an enterprise-wide data security governance (DSG) program. Identify data security policy gaps, develop a roadmap to address the issues and seek cyberinsurance when appropriate.

In your paper:

  • Identify and describe at least one emerging domain in the field of IT. Include details such as the underlying technologies of these domains and expected timelines for major worldwide adoption.
  • Analyze the impact on cybersecurity and supporting standards of these domains.
  • Make appropriate recommendations based on the standards and guidelines related to the identified domain.