HSIN Week 5 assignment

 

Using a word document with a cover sheet –

Complete:

1- Chapter 11 Review Questions 1-10 located at the end of your Database Systems Chapter 11 book. Please use complete sentences and proper grammar. 

1- Chapter 13 Review Questions 1-15 located at the end of your Database Systems Chapter 13 book. Please use complete sentences and proper grammar.

Cyber White-collar Crime, Neturlization, Theories, Cyber Stalking, Criminal Subculture

 

In a word document answer the following questions.  The total response should be 1-3 pages. 

  1. Discuss some of the internet fraud schemes
  2. Discuss the difference between “insider corporate spies” and “outsider corporate spies.” How does each group engage in corporate espionage? 
  3. Identify and describe at least three methods that identity thieves use to steal personal information. 
  4. Explain how the historical description of an embezzler no longer applies. How are modern embezzlers described? 

Assignment

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

CIS109-Discussion 5

  

  • Our readings this week focused on computer networking. We learned about networking protocols and standards and how they are used to move data across the Internet. What are some types of technology might you encounter in your chosen field that will use these networking protocols and standards? As a business professional, why do you think it is important to understand networking protocols and standards?

Database Systems – Discussions

Discussion 1: Create a discussion thread (with your name) and answer the following question(s): (Chapter 3):  

Consider the ER diagram shown in Figure 3.22 for part of a BANK database (also below for reference). Each bank can have multiple branches, and each branch can have multiple accounts and loans.

(a) List the strong (nonweak) entity types in the ER diagram.

(b) Is there a weak entity type? If so, give its name, its partial key, and its identifying relationship.

(c) What constraints do the partial key and the identifying relationship of the weak entity type specify in this diagram?

(d) List the names of all relationship types, and specify the (min,max) constraint on each participation of an entity type in a relationship type. Justify your choices.

Discussion 2: Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 5):  Discuss the characteristics of relations that make them different from ordinary tables and files. 

Activity 4A- Project Process

Part 1

Describe a complex project that could be completed using a Hybrid Model.  Describe the hybrid model? Why do you feel that this model is better for this type of project? What would be the impact of completing the project using a different approach? 

Part 2

Case Study Link:Going with the Flow: Agile Development at Dell | Harvard Business Publishing EducationCase Study Overview: In February 2017 the Team Project Manager and Flow Project Coordinator for Dell Technologies-Limerick (Ireland), is preparing for a review with Dell’s Systems and Processes Improvement board, early in a transition from the use of one agile software development method (Scrum) to another (Flow, which applies lean manufacturing techniques to software engineering). The new manager has been on board for less than six months. With ten years’ prior software development experience in Brazil, he moved to Ireland when hired by Dell. Dell is midway through its attempts to transform from a manufacturing-heavy strategy to an IT-supported service-heavy strategy; its recent acquisition of EMC is an important step in that direction, and executives expect Flow will help globally-distributed software developers produce higher quality code, faster, in follow-the-sun mode. The Flow coordinator/champion recognizes Flow is a complex innovation; it will take time and focus for busy software developers (who only recently mastered Scrum techniques) to master new Flow techniques. The champion is also concerned that needed digital Kanban functionality (essential for supporting globally distributed teams using Flow) has not yet been approved or provided by the Dell IT organization in Texas; this and other obstacles are impeding the developers’ transition to Flow. Keen to demonstrate his commitment to help Dell achieve these aims, he worries that some executives expect performance improvements sooner than teams can realistically deliver. He seeks to persuade executives to be both patient and helpful. As he plans his 20-minute presentation for the next day’s meeting, he is told to keep his remarks to executives simple: highlight no more than three messages.Questions:

  1. What should Ferreira do next to accelerate Flow Adoption? 
  2. What three points should Ferreira make at the 7 Feb 2017 SPI Board Review?
  3. Review the seven lean manufacturing principles and demonstrate how Ferreira used them when implementing Flow. 

Part 3

Case Study Overview:

In conventional business and government megaprojects–such as hydroelectric dams, chemical-processing plants, or big-bang enterprise-resource-planning systems–the standard approach is to build something monolithic and customized. Such projects must be 100% complete before they can deliver benefits: Even when it’s 95% complete, a nuclear reactor is of no use. On the basis of 30 years of research and consulting on megaprojects, the author has found two factors that play a critical role in determining success or failure: replicable modularity in design and speed in iteration. The article examines those factors by looking at well-known megaprojects, both successful ones, and cautionary tales.

Case Study Link

Better Project Management | Harvard Business Publishing Education

Using the megaproject case study  answer the following:Build and describe a complex model that can be used to manage the mega-project described in the case study linked above.  Your model should include the following:

  1. Overview of the process
  2. Pictorial design of the process
  3. Description of each phase
  4. Explanation as to why this process will work when managing megaprojects. 

Text-

Title: Effective Project Management 

ISBN: 9781119562801 

Authors: Robert K. Wysocki 

Publisher: Wiley 

Publication Date: 2019-05-07 

Edition: 8th Edition

Project Definition

You are required to identify a problem or opportunity in the IT area and develop a solution to the problem.  The project should integrate theory and application from across your educational experience and allow you to showcase your academic learning.  During the course, you will identify a problem, develop requirements based on stakeholder needs, develop a design after considering alternative solutions, implement the solution (virtually is sufficient), and test the solution.  Your design and test plans should take into consideration the end-user as well as the broader context of the end-user.  The course culminates in a final presentation and final report.

  

PROJECT PROBLEM: Transitioning a network from IPv4 to IPv6 

HIPAA Compliance planning

Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

  • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
  • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
  • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login

Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

  • Accurate information on the HIPAA requirements for securing PHI
  • FISMA and HIPAA requirements for a security plan
  • Scope of the work you will perform to meet the Health Coverage Associates’ requests

Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

Write a 1- to 2-page concise outline of the contents of the security management plan. Include

  • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
  • The recommended risk management framework Health Coverage Associates should adopt
  • Key elements Health Coverage Associates should include in its plan of actions and milestones

Cite all sources using APA guidelines.

telecomunication

Do a risk assessment for 3 personal assets, defining a threat for each, and a security control to control that threat (identifying the type of control –  preventive, detective, or corrective controls) .