QUESTIONS-

ANSWER EACH QUESTION

LABEL IT WITH THE QUESTION NUMBER AND PAGE

APA FORMAT FOR OUTSIDE RESOURCES

DO NOT PLAGIARIZE

personal data

Question :

 share your perspective on personal data as a product to sell, who owns the data you produce, and the ethics around data collection 

Words:400

Citations:  You do not need to use in-text citations but please share at least three links to articles or videos that you used to research your perspective. 

ITS-834: Emerging Threats & Countermeasures. Discussion, Final Research Project.

Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources: 

 M. Ioannou, E. Stavrou and M. Bada, “Cybersecurity Culture in Computer Security Incident Response Teams: Investigating difficulties in communication & coordination,” 2019 International Conference on Cyber Security & Protection of Digital Services (Cyber Security), 2019, 1-4.  https://ieeexplore.ieee.org/document/8885240

J. Mendonça, W. Medeiros, E. Andrade, R. Maciel, P. Maciel and R. Lima, “Evaluating Database Replication Mechanisms for Disaster Recovery in Cloud Environments,” 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019, pp. 2358-2363.  https://ieeexplore.ieee.org/document/8914069

M. Zeybek, E. N. Yılmaz and İ. Alper Doğru, “A Study on Security Awareness in Mobile Devices,” 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 2019, 1-6.   https://ieeexplore.ieee.org/document/8965476

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Web Server Auditing

Word count: 300+ words

Chapters 17, and 18 in the course textbook  

 Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices. 

– Make sure to back up your statements with scholarly support.· 

– Please cite properly in APA 7· 

– At least one scholarly source should be used. · 

– Use proper citations and references in your post.

Final Research Project:

Number of pages: 6+ 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.

2. Introduction

3. Roles and Responsibilities

4. Incident Response

5. Plan Activation

6. Document History

7. Procedures

Your poject should meet the following requirements:· 

– 6+ pages in length, not including the required cover page and reference page.· 

– Follow APA 7 guidelines. 

Your paper should include an introduction, a body with fully developed content, and a conclusion.· 

Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

– Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: plagiarism check required, APA7 format, include References, within 8hrsThis post has 2 individual assignments (discussion, and Final research project).

Please provide answers in separate documents.  

How scorecards and organizational structure influence performance level ?

Explain how to balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization? 

 one -page in length 

 

Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

 one -page in length

erd

 

Option 1. Entity-relationship and data models are  said to model the “real world.” Respond to this statement and provide  examples in support or opposition of this statement.

Option 2. Please identify and describe a system that  you use regularly. This system can be in your personal or professional  life. Please describe how the system is used and your use of the system.  Then describe the data available within the system, list and define  entities you are familiar with, and then provide example data within the  system.

File

First Normal Form Assignment

First Normal Form Assignment

Attached Files:

In this exercise you will:1.) Run the attached SQL script “exampleData.sql” in your preferred way (E.g., workbench or from the command line tool in a terminal window.)This script creates a database named FN1 and a table named “VoterData”, and loads three rows of data into the table.Notice that the data are not stored in First Normal Form because two of the columns: “address” and “email” are used in a way that makes their data nonatomic. A valid address is hierarchical: street number, street name, city/town name, state, zip code, etc. The email field is used to store more than one email address. (If you want to know more about postal addresses read this: https://en.wikipedia.org/wiki/Address)2.) Watch Caleb Curry’s youtube video on First Normal Form (https://www.youtube.com/watch?v=JjwEhK4QxRo) and understand what this means and how he redesigns his database. Notice that the database I gave you is similar to his.3.) Redesign the provided example database so that the email information is in first normal form. This means that you will create a new table called “EmailAddresses” that is specialized for storing email address information, and, it has a foreign key relationship with the VoterData table, etc.When you finish save your work as an SQL file and upload it. I don’t want screen shots word documents, etc.I will run your sql file to determine if you did the exercise correctly.

This question will reuse the same code you

  

This question will reuse the same code you created for me last week. But, this time it needs to have user input. So the user must be able to enter in any Centigrade temprature and then its suppose to output the Fahrenheit temprature. User must be able to enter it numbers as many times as they want, but also have a quit option. Please add comments and documentation as to what the code is doing or what the code functionality is. 

NoSQL( java script)

 

Build for MongoDB is for powering an online store or e-commerce solution.   MongoDB’s features can easily manage attributes in a product catalogue, track the interactions between the store’s inventory and customers’ shopping carts, and offer dynamically switching recommendations such as “Customers also bought” in a single shopping session.

1. Build a Database to accomodate the ecommerce

2. Build functions to insert and fetch data

3. Data should be in hierarchy fashion

4. Demo the full solution – when data is fectched by product identifies, name  – it should return hierarchial data

Lab #5 Week 5 WiFi capture using Tshark

 

Lab #5 Week 5 WiFi capture using Tshark

Using Google find information on using Tshark to capture a wifi communication, then using the environment execute some of the Tshark commands. This is an exploratory lab so the goal is to find as much information on the use of Tshark as a wireless capture tool as you can find and report on it in your lab books.

Writing Requirements