6/2 Text book

  1. Read Chapters 11 and 12 in your textbook.
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. 300 Words

Textbook: Principles of Information Systems

Analyzing & Visualizing Data

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Discussion Board

The bike shop that you outfitted with hardware, software, and operating system back in an earlier assignment has grown. Now the owners need you to use your knowledge of data storage and databases to manage this growth. Prepare a report in which you explain to the owner the options for data storage, database development, and data security and recommend an overall solution for the organization.

In your report, address the following:

  • Explain the differences between in-house data storage and cloud storage.
  • Describe the advantages of each storage method for a business organization.
  • Explain the differences between databases and spreadsheets. 
    • Be sure to discuss what makes a database relational.
  • Recommend a solution for data storage and system development. 
    • Support your recommendation based on a critical analysis of alternatives. For example, how would a database help to better manage the bike shop’s inventory, payroll, pricing, and expenses over spreadsheets?
  • Describe best practices for database security and data backups.
  • Cite authoritative sources to support assertions.
  • Organize the report so ideas flow logically with smooth transitions.

IT470: Computer Security Fundamentals

Discussion 1

22 unread replies.22 replies.

After reading the assigned chapter please answer the following questions. Make sure you ask a question and answer another student question as well.

1) How is personal information safeguarded? Provides some standard procedures mainly used by businesses to safegaurd their data. 2) What are the vulnerabilities? Provides some examples. 3) What do we mean by secured system? Name some of the best practices for securing your personal computer.

Please, with 300 words plus, elaborate on each of these attacks and provide genuine examples and with supporting facts. 

To Ensure Getting a Full-Grade, check the Rubric as I will be using it to grade you!!!

Anything copied from the internet or copied from another student will result in ZERO grade for both students. I will be checking all work against plagiarism.

Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.Your paper should meet the following requirements:

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Activity to do

 

Learn About Learning Styles.

Barbara Soloman and Richard Felder at North Carolina State Universityhave researched different learning styles. They created an instrument to assess learning styles on these 4 dimensions:

1. Active/reflective

2. Sensing/intuitive

3. Visual/verbal

4. Sequential/global

Find out more about each of these learning styles at their website (www.engr.ncsu.edu/learningstyles/ilsweb.html (Links to an external site.)). Answer their Index of Learning Styles (ILS) questionnaire (there are no right or wrong answers) to learn more about your learning style. PrtScn/ snapshot your results( I attached two Screen Shots for me and my friend Martin). Compare your scores on the ILS questionnaire with the scores of 1 coworker(attached file Martin use it ). Write a summary paragraph (10 sentences) of the results you observed and what the results mean for you as a trainee.

In your summary, INCLUDE (in the 10 sentence paragraph) the answer this question: “Does any one of the training methods described in this chapter meet the needs of all the different learning styles that Felder and Soloman describe on their website?” Why or Why not (explain in 1 paragraph/5 sentences).

Apply: Control Assessment

 

Assignment Content

  1. You are the auditor in charge of the Gail Industries audit. It is your responsibility to prepare a control table that will be used to evaluate all controls and the associated policies and processes for the company. Provide information for an accurate review of the monitoring that protects the areas within the control.

    Read the Gail Industries Case Study.

    Create a table that lists the 8 controls from the Gail Industries case study. Determine the applicability of each control based on the elements provided. Identify how the control (e.g., door security, entry log file) functions in the case study. Support the applicability of the controls to perform the tasks assigned with at least 2 outside sources to validate the controls. 

    Format your citations according to APA guidelines.

    Submit your assignment.

discussion 2

due tonight by 11:59 PM EST…200 words

What are three important online discussion lists or bulletin boards read by people in the cybersecurity field? How did you find them? What major issues are being discussed in each? Which of them do you consider to be most useful? Please provide links to the discussion lists.