500 Words Essay

 

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations

Data base security

  

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a fingerprint?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

Videos:

https://www.youtube.com/watch?v=sWjic4xMHbM

https://www.youtube.com/watch?v=VDVhWro8to0

https://www.youtube.com/watch?v=iVeenkfa-0s

https://www.youtube.com/watch?v=Z77twyRQ5mY

https://www.youtube.com/watch?v=Xycb5wyTL4k

https://www.youtube.com/watch?v=QuMCvkqZbCQ

https://www.youtube.com/watch?v=avRkRuQsZ6M

RESPONSE DUE 5/26

GIVE YOUR OPINION ON THE POST BELOW, ALSO ASK THREE QUESTIONS PRETAINING TO THE POST.

 

As the cloud has become the norm for many businesses and users at this point, I selected Software-as-a-Service (SaaS). SaaS is the concept of enabling users with the ability to connect and use cloud resources over the internet (Chkadmin, 2022). The most recent example that applies to many of us here at Strayer University would be Microsoft 365. Specifically, we can log in to Strayer University and utilize many of the Microsoft applications or “software” provided through this cloud service. This is a perfect example of SaaS and poses many benefits but offers many challenges as well.

One of the main issues with the SaaS option of Microsoft 365 is that the user’s credentials are the target. If a user’s credentials are compromised, malicious actors are provided direct access to not only the user’s data but also the data within the organization that the user’s a member of. This exposes potentially sensitive data and places other assets and users at risk.

Within my organization, we have additional security configurations in place for this specific reason. One example is multifactor authentication through something you have and something you know. Along with two-person authentication, when I enable or request access to certain information, another user with the same permission or more must authenticate my request. Through this configuration, justifications are required for auditing purposes as well to harden resources and limit unauthorized access.

References:

Chkadmin. (2022). Top 3 office 365 security concerns. Retrieved from https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-office-365-security/top-3-office-365-security-concerns/

Portfolio Project

 You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.  

Requirements:

The paper should include at a minimum of the following sections:

  1. Title page
  2. Executive Summary (Abstract)
  3. Body
    1. Introduction (including industry discussion – 1-2 pages)
    2. Annotated Bibliography (2-3 pages)
    3. Literature review (2-3 pages)
    4. Program and technology recommendations, including:
      1. Metrics
      2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
      3. Regulatory, security, and privacy compliance expectations for your company
      4. Email and social media strategy
      5. Cloud Computing strategy
  4. Conclusion
  5. References

CYBERLAWS & ETHICAL HACKING

Determine whether a network scenario is fully secure.
Requirements:

Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.

Answer the following question(s):

  1. 1. If your network has both a firewall and an IDS deployed, would you consider it to be fully secure? Why or why not?

Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.

Problem 12- Legal

Question I – The year is 2012 and the light bulb has not yet been invented.  Thomas Edison and Nikola Tesla are in a bitter feud to see who can bring electricity to the masses first.  In this alternative history, it is indisputable that Tesla invented the lightbulb first.  However, Edison filed his lightbulb patent prior to Tesla.  According to the law in 2012, who holds the patent to the lightbulb?

Question II – In May of 2013, Jesse plans to open a law office named “Peace Law” and uses the peace symbol as part of the logo for the business.  That same month Jesse registers the trademark with the Patent and Trademark Office.  Jesse opens the law office for practice in July 2015.  Assuming no one contested registration of the trademark within 5 years, is the trademark valid?

Text-

Title: Business 

ISBN: 9780357447642 

Authors: Marianne M. Jennings 

Publication Date: 2021-01-01 

Edition: 12th Editio

Spreadsheet

Instructions

What is a spreadsheet? How do we use spreadsheets as a data storage and data analysis? How do you use spreadsheets to manage daily administration tasks?

Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0 | Access Chapter 1

  Project Description:

In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters.

     

Open   the Customers form in Form view. Use Search to locate the record for Baker Auto   Supply. Modify   the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form.

 

Open the Products form in Form   view. Add a new product (Access will automatically add the Product ID): Coffee-Arabica   Premium. The   Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the   Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form.

 

Open the Products report and   check that the report contains the new product P0026, Coffee-Arabica Premium.   View the layout of the report in Print Preview and then change the page   layout to Landscape. Save the report and close Print Preview.

 

Open the Customers table. Sort   the table by Customer Name in ascending order. Save the changes and close the   table.

 

Open the Revenue Stats query and   sort the City field in ascending order. Apply Filter by Selection so that   only stats for the last name Pellum   display. Save and close the filtered query.

 

Open the Products table. Use   Filter by Form to create a filter that will identify all premium brands in   the Brand field that were introduced after 2017. Apply the filter and preview the filtered table.   Close the table and save the changes.

 

Close all database objects.   Close the database and then exit Access. Submit the database as directed.