HR Management & Blockchain

 1. How might blockchain technology impact labor relations and employee safety and security?

 paper: Introduction, Question 1, Conclusion, References.

Reference:

1. Morkunas, V. J., Paschen, J., & Boon, E. (2019). How Blockchain technologies impact your business model. Business Horizons, 62, 295-306.

2. Whitehouse, E. (2018, July/August). We can change the way you work. People Management, 30-34

Cryptography

Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  

Requirements:

APA Format

The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  

PowerPoint Module 1: Creating and Editing Presentations with Pictures.

 

Design and Create a Presentation about Business Programs

Part 1: Your school is expanding the courses offered in the School of Business, and the department chair has asked you to help promote the program. She informs you that the classes emphasize creative and critical-thinking skills by combining material from the modern business world, liberal arts and sciences, environmental design, and engineering. Graduates possess technical skills that prepare them for success in their careers. Internships at local businesses provide real-work experience. 

Use the concepts and techniques presented in this module to prepare a presentation with a minimum of four slides that showcase the School of Business program. Research business programs at local schools for additional information about specific classes, tuition costs, admission requirements, and graduation rates. Select a suitable theme, and include a title slide and bulleted lists. 

Review and revise your presentation as needed. 

Add your name to the first slide

Note: You need to make several decisions while creating the presentation in this assignment: 

  • what theme to use
  • where to place text
  • how to format the text (font, font size, paragraph alignment, bulleted paragraphs, italics, bold, underline, color). 
  • What was the rationale behind each of these decisions? 
  • When you reviewed the slides, what further revisions did you make and why? 
  • Where would you recommend showing this slide show?

When finished submit the presentation in PowerPoint format (not pdf) using the file name

5-PP-1-2-YourName.pptx

Security Architecture and Design Assignment 1

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. 

  1. When should the architect begin the analysis?
  2. What are the activities the architect must execute?
  3. What is the set of knowledge domains applied to the analysis?
  4. What are the tips and tricks that make security architecture risk assessment easier?

Create the physical data model

  

· Create the physical data model for the logical data model that you submitted in IP3. This should include all of the data definition language SQL.
 

Your submission should include all DDL needed to:
 

Create the tables
Create the primary keys
Create the foreign keys
Add DML statements to:
Add data of 1 customer who buys from the company
Provide the DML to add 1 employee who interacts with customers
Give DML to change data of the employee, giving the commission a 25% increase
Give DML to delete the customer and employee data
Write 3 SELECT statements:
To select the customer details
To select the employees details
To show which employee services which customer
 

Submit your Word document and make sure that it contains the following:
 

Screenshot of the ERD, logical data model from previous assignments.
The DDL to create the tables, including the table definition and the primary and foreign key definitions.
SQL to add data to the tables
Add data of 1 customer who buys from the company
Provide the DML to add 1 employee who interacts with customers
Give DML to change data of the employee, giving the commission a 25% increase
Give DML to delete the customer and employee data
Write 3 SELECT statements:
To select the customer details
To select the employees details
To show which employee services which customer

 

Project Management

Identify a personal project of your choosing. This could be a family vacation, plans to clean or organize a part of your living space, etc. 

Provide a brief summary of your project that includes the scope of the project and at least three goals or objectives of the project.    

Rainbow Table

Windows stores passwords using the NT LAN Manager (NTLM) hash.  This hash is created by hashing the plain text password with the MD4 algorithm.  There is no salt used.  The lack of salt enables the use of a rainbow table to lookup passwords from their hash.   For this assignment you will create a rainbow table for a set of passwords. 

More about NTLM: http://techgenix.com/how-cracked-windows-password-part1/

For this assignment you will create a Rainbow table for NTLM passwords.   Use the following list of steps as a guide.

  1. Use the sys library to read a command line argument that is the name of a password dictionary file.
    For your submission used the password dictionary file found at this link: http://www.openwall.com/passwords/wordlists/password-2011.lst (Links to an external site.)
  2. Open the password dictionary. 
  3. Loop through the contents of the password dictionary one password at a time.
  4. Sort the list of keys from your dictionary
  5. Use a for loop to print all keys and passwords. Print on hash and password pair per line. Structure each line as follows to allow a password to be looked up easily from it’s hash:
    [hash]:[password]
  6. Store the output of your program as rainbow_table.txt. 
    *** Run your program as ‘python3 rainbowtable.py dictionary.txt > rainbow_table.txt’
  7. Name your script rainbowtable.py

SECURITY ASSESSMENT & TESTING

Business Case: Local airport

The parameters.

15,000 passengers a day

530 flights daily  

350 fulltime employees

There are three databases in the Airport’s data center.

1-Passenger database to record and authenticate each passenger in the airport

2-Employee database to record and authenticate each employee in the airport

3-Flight database to record each flight in the airport

Every day the following processes must be done:

Process 1:  For each passenger: a Boarding Pass will be calculated, prepared, and stored. The final version of the boarding pass will be printed on the printers at the airport

Process 2: For each aircraft; Flight logs along with the passenger checklist will be prepared and stored.

Process 3: One-week old Passenger and Flight data will be stored in long-term storage (archive)

Question 1 Identify cyber assets based on the NIST definition in the given Local airport business case. List the cyber assets.

Question 2 What are the steps that you would follow to fulfill the requirement of the NIST Risk Management Framework for the Airport? Write each step

Question 3 Do your search and find common cybersecurity threats in aviation.  And prepare your Risk Assessment Report (RAR) Based on the following threat sources

  • Adversarial
  • Structural
  • Environmental

Question 4 List the Risk Treatment Alternatives you would consider for each cybersecurity threat for the Airport.