cyber

 

Review the videos below and discuss  in your own words the following:

1. Differentiate between the following:

– Event

– Alert

– Incident

2. Compare and contrast SANS and NIST’s versions of an Incident Response Plan.

3. Discuss the processes of containment, eradication and recovery.

Your initial post must be no less than 300 words and respond to at least one of your peer’s posts.

DS-14

Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or another list format.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Research Paper

Create a Research Paper.

In the document attached, you have notes about a theme with the following information:

1.   Title

2.   Body of the Research Paper

3.   Footnote

4.   Reference

Using the concepts and techniques learned, organize the notes as necessary, and then create and format the research paper according to the MLA documentation style.

Be sure to check the spelling and grammar of the finished paper. 

·        Add the header and page Number

·        Add the footnote at the end of the first paragraph

·        Add the Reference at the end of the body

·        Create the Works Cited according to the MLA Style format as studied.

CREATE TABLES AND QUERIES IN MS ACCESS

 

Overview

For this assignment, you will use MS Access to create tables and queries.

Instructions

Using an ERD to create tables in MS Access
  • Refer to the ERD that you created in the Week 8 assignment. Create an ERD, and perform the following steps in MS Access: 
    • Create the tables and relationships from the database design created in the Week 8 assignment. 
    • Add at least five records into each table (Note: You must determine the field values).

Include the following screenshots in a Microsoft Word document to show the completion of the steps above: 

  • Screenshot depicting the tables created within MS Access.
  • Screenshots depicting the records added into each table. Include one student where the student’s last name is your name. 
Query tables in MS Access

Perform the following steps in MS Access:

  • Create a query with all fields from the student table, where the student’s last name is your name. 
  • Create a query that includes students’ first names, last names, and phone numbers. 
  • Create a query that includes instructors’ first names, last names, and courses they teach.

Include the following screenshots in a Microsoft Word document to show the completion of the steps above: 

  • Screenshot depicting the tables created. 
  • Screenshots depicting the records added into each table. 
  • Screenshots depicting the query results from each of the queries created. 

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is: 

  • Use MS Access to create tables and queries.

Describe

 Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad. 

Final Portfolio Project

The Final Portfolio Project i

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Assignment

You will develop a word document to include:

  1. Your research question in the form of a quantitative question – 

This was my research question ( security of the personal information of health care system users – how to protect cyber threats to important personal health care information using AI.

2. Use any one of the instruments given in the sample attached document i.e, either a regular survey questionnaire or closed-ended survey or archival data that could be used to answer the quantitative version of your research question. 

Special note: for those using archival data, you will describe the process of data retrieval for your archival data. See examples to help. 

3. A one-paragraph description/justification of how your chosen instrument/protocol is the best choice for answering the quantitative version of your research question.

See rubric for how the paper will be graded.