security risks

 

Introduction

O’Keefe State University located in New Mexico has recently started using Canvas for online course delivery. Canvas hosts all the data in its own cloud storage. Students may log in to the systems form any personal device (laptops, phones, etc.). On-campus students can also use library computers. Note that the browsers may store student credentials (IDs and passwords) in a browser.

Directions 

Write a two-page security risk analysis to identify all possible security risks associated with the usage of Canvas in the library or on home computers.

Specifically address whether Canvas cloud architecture increases or decreases the cybersecurity risks associated with it, when compared to an old learning system that stored all student data on a servers located on-campus and managed by the university IT personnel.

Survey of Mobile App Software

The following software is typically needed to create a web service:

  • ASP.NET 4.0
  • Visual Studio 2010
  • IIS 7.5
  • Microsoft SQL Server 2008 R2

There could be new and updated software options to create a web service. For this assignment, conduct some research over the internet and create a professional document including general steps needed to create a web service.  When preparing the general steps, be sure to discuss any updated software found for which you would recommend creating a web service and why?Your assignment must follow these formatting requirements:

  • Use at least three- five (3 – 5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • The overall document of steps should be at least two pages of content. 
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

Criteria:

1. Created a professional documented including general steps of creating a web service.
2. Discussed updated software options in the current times used to create a web service.
3. Minimum 3 Sources

Discussion 14(Business continuity & Disaster recovery planning )

Question:  

We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). 

 How do we ensure that the remote site is protected like we would the main location? 

Discuss the challenges of maintaining information security at a remote recovery location.

***Standard for all discussion posts:

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following: 

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic

****** No Plagirsam

*** References

Discussion 250 -300 words

What are thick clients and thick servers, and what are the differences in philosophy of the two approaches? Suggest pros and cons for the thick client and thick server strategies. Provide an example of a thick client and a thick server.

Research Paper – development of a security program and risk management in a mid-size organization

Subject: Foundations of Information Assurance and Security

Research Paper: 5-6 pages WITHOUT title page and with 4 external reference

Topic:  

The development of a security program and risk management in a mid-size organization. 

5-6 pages WITHOUT title page and with 4 external reference

Discuss successful information security program, such as risk assessment, systems testing, policy, and planning

Discuss how it is used in your organization? how it works or doesn’t work in your environment?

Exp19_Excel_Ch11_HOEAssessment_Accountants

 Exp19_Excel_Ch11_HOEAssessment_Accountants

  

 Project Description:

You work for a tax accounting firm that has offices in San Diego, Dallas, Miami, and Albany. Previously, you downloaded data from the employee database. Now you will use text, database, and lookup functions to obtain the results you want.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch11_HOEAssessment_Accountants.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Your first step is to create a   unique ID for each accountant using the year hired, date hired, and number.
 

  In cell D2, enter 2007-1018-10 and use Flash Fill to complete the pattern to   create the remaining IDs in the range D3:D26.

 

The accountants’ full names are   located in column E. You want to separate the first and last names.
 

  Select the range E2:E26 and convert text to columns using the space as the   delimiter. Change cell E1 to First Name.

 

Next, you want to display the   accountants’ names with the last name and first name, separated by a comma.
 

  In cell G2, insert the TEXTJOIN function to join the last name and first name   for the first accountant, using a comma and space as the delimiter. The name   should display as Adams, Camille.   Copy the function to the range G3:G26.

 

Column J contains the phone   numbers. You want to extract the area codes.
 

  In cell K2, use the MID function to extract the area code for the phone   number for the first employee. The Start_num argument should be the position   of the first digit in the area code to avoid including the opening   parenthesis. Make sure the function extracts the three-digit area code. Copy   the function to the range K3:K26.

 

The Location column displays the   city names in all capital letters. Because this is hard to read, you will use   a text function to display the cities in upper and lowercase.
 

  In cell M2, use the PROPER function to display the first city name in upper   and lowercase. Copy the function to the range M3:M26.

 

You want to create a criteria   range to perform an advanced filter. The criteria are (1) Tax Accountants in   Miami and (2) Tax Accountants in San Diego.
 

  Copy the range A1:M1 and paste it in the range A28:M28. Enter Tax Accountant and Miami in the respective cells on row 29. Enter Tax   Accountant and San Diego in the respective cells on row   30.

 

Now you are ready to perform the   advanced filter by copying the data below the criteria range.
 

  Click within the dataset. Select A1:M26 as the list, the criteria range you   defined in the previous step, and A32:M32.

 

Next you want to calculate the   total salaries for all Tax Accountants in Miami and San Diego.
 

  In cell P2, insert the DSUM function using the dataset, column heading Salary, and the defined criteria   range.

 

Next, you will calculate the   average salary for Tax Accountants in Miami and San Diego.
 

  In cell P3, insert the DAVERAGE function to calculate the average salary   using the column heading Salary.

 

You want to identify the highest   salary for Tax Accountants in Miami and San Diego.
 

  In cell P4, insert the DMAX function.

 

Next, you want to identify the   lowest salary of Tax Accountants in Miami and San Diego.
 

  In cell P5, insert the DMIN function.

 

Finally, you want to count the   number of Tax Accountants in Miami and San Diego.
 

  In cell P6, insert the DCOUNT function.

 

The range O8:P9 contains a new   set of criteria to identify the one Senior Accountant in San Diego. You want   to obtain that person’s salary.
 

  In cell P11, insert the DGET function.

 

The range O13:P16 is designed to   look up a person’s name to return the position number and salary for that   person. First, you will look up the person’s location within the dataset.
 

  In cell P15, insert the MATCH function to look up the name in cell P14 and   return that person’s position within the Last Name column. Use only the range   containing the actual last names in the argument.

 

Now that you have the position   number for the accountant, you are ready to identify that person’s salary.
 

  In cell P16, insert the INDEX function using the range F2:M26 as the range   and the position number identified by the MATCH function.

 

In cell O19, insert the   FORMULATEXT function to display the formula that is stored in cell P15. Copy   the function to cell O20.

 

Create a footer with your name   on the left side, the sheet tab code in the center, and the file name code on   the right side of the worksheet.

 

Save and close Exp19_Excel_Ch11_HOEAssessment_Accountants.xlsx.   Exit Excel. Submit the file as directed.