Portfolio Project: Milestone 3: Literature Review

 For milestone 3, you will create the literature review (2 pages) of your portfolio project.

Here are some resources to complete a literature review:

https://uscupstate.libguides.com/c.php?g=627058&p=4389968

https://www.youtube.com/watch?v=-ny_EUJXHHs 

https://umb.libguides.com/litreview

https://writingcenter.unc.edu/tips-and-tools/literature-reviews/

https://writingcenter.ashford.edu/writing-literature-review

Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted.

Paper

  

Research Paper: Securing Data

Overview

IT infrastructure of an enterprise has: 

a) Database servers, storage systems (SAN & NAS) for data storage

b) Computers, applications to process the data

c) Network components to enable connectivity among computers and servers

In this research, your goal is to secure the data processed by these IT components. 

Prepare

· Review the APA Citation Style guide if necessary. You can also consult the Learning Commons for writing support and library resources.

· Carefully review the Chapter 8, Chapter 11, and Chapter 12 of the textbook. The textbook is your primary source of information. 

Research

· Research and analyze potential vulnerabilities and security challenges that are associated with these IT components and that eventually threatens confidentiality, integrity, and availability of data. Consider both the technical and non-technical vulnerabilities.

· Research and analyze various security countermeasures and solutions to secure data. Think about countermeasures in policy, human, database, application, computer, storage, server, network, data, object, and application dimensions.

Write

Prepare a two to three-page APA formatted research paper. Your paper should be well-organized in terms of matching each stated vulnerability with at least one countermeasure. Real-world examples are a plus.

Cite

APA citation and referencing is required for this assignment. You must use in-text citations and a reference list to accurately cite the sources of information that you use to write your assignment. 

Failure to use proper citations and references will be considered plagiarism. If you need further information about APA style and format, see the APA Citation Style guide. The Purdue OWL is another useful source of APA help.

Submit

1. Turnitin will automatically and transparently check your submission after you submit it. Turnitin is integrated into Canvas; therefore, you don’t need to sign up for Turnitin. After Turnitin completed processing your submission, you will be able to see your similarity result on Canvas.

2. Review your Submission Details and access your Turnitin report. Revise your work as needed based on the feedback. 

3. By the due date indicated, re-submit the final version of your work.

BEFORE submitting your assignment for final grading, ensure that you have completed ALL of the steps above.

Can you help

please help me with az10 page apa formatted research paper. The topic is Developing algorithms for outlier detection and data cleaning. the paper should include an abstract introduction conclusion references and in text citations I need help with writing this.  

GO19_AC_CH03_GRADER_3F_HW – Degrees and Students 1.0

 GO19_AC_CH03_GRADER_3F_HW – Degrees and Students 1.0

  

Project Description:

In this project, you will use a database to track degrees and grade point averages for honor students in the health professions program in preparation for graduation. You will create reports, modify a report in Layout view and Design view, group data in a report, and keep grouped data together for a printed report.

     

Start   Access. Open the file Students_Access_3F_Degrees.accdb downloaded   with this project, and then enable the content. View the relationship between   the 3F Degrees table and the 3F Students table. One type of degree can   be awarded to many students. Close the Relationships window.

 

Use   the Report tool to create a report based on the 3F Summa Cum Laude Graduates   Query object.

 

With   the report displayed in Layout view, apply the Facet theme to only the   report. Delete the Student ID field from the report. Change the width of the   Last Name, First Name, and Degree text box controls to 1.25 inches.

 

With   the report displayed in Layout view, sort the records in ascending order by   the Last Name field. Change the width of the Program text box controls to 2.5 inches.

 

At   the bottom of the report and in Layout view, change the height of the   calculated control that displays 8   to 0.25 inch. For the page number control, set   the Left property to 5   inches.

 

With   the report displayed in Layout view, select the title of the report and   change the font size to 14. In the title, change the word Query to Report.   In the body of the report, for the GPA field name, set the Left property to 0.25 inch (the GPA text box controls move   to the right, and all of the other fields also move to the right). Save the   report as 3F Summa Cum Laude   Graduates Report, close the Property Sheet, and then   close the report.

 

Use   the Report Wizard to create a report based on the 3F GPAs by Degree Program   Query object. Add the following fields (in this order) to the report:   Program, GPA, Last Name, and First Name. View the data by 3F Degrees, and do   not add any other grouping to the report.

 

Sort   the records first in descending order by the GPA field and then in ascending   order by the Last Name field. Summarize the report by averaging the GPA   field.

 

Be   sure the layout is Stepped and the orientation is Portrait. Name the report 3F GPAs by Program   Report,   and then finish the wizard.

 

Display   the 3F GPAs by Program Report in Layout view. Apply the Wisp theme to this   report only. Select the title of the report, change the font size to 16, and   then apply bold.

 

With   the 3F GPAs by Program Report displayed in Layout view, delete the controls   that begin with Summary for ‘Program’. Change the width of the Program text   box controls to 2.75   inches.

 

With   the 3F GPAs by Program Report displayed in Layout view, change the text in   the label control that displays Avg   to Average GPA by Program. At the top of the report, apply bold   formatting to the four label controls that display the field names.

 

With   the 3F GPAs by Program Report displayed in Layout view, select the GPA label   control, the GPA text box controls, and the calculated controls for the   average GPA. Change the width of the selected controls to 1 inch, and set the Left property to 3 inches. Close the Property Sheet.

 

Display   the 3F GPAs by Program Report in Design view. Select the following two   controls: the Program text box control (in the Program Header section) and   the Average GPA by Program label control (in the Program Footer section).   Align the right edges of the two selected controls. Save the report.

 

Display   the 3F GPAs by Program Report in Print Preview as two pages, and notice how   the groupings break across the pages. Display the report in Layout view, and   then open the Group, Sort, and Total pane. Set the grouping option so that each   group of program records is kept together on one page when the report is   printed, and then close the Group, Sort, and Total pane. Display the report   in Print Preview, and notice that the groupings are not split between pages.   Save the report, and then close the report.

 

If   necessary, close all database objects and open the Navigation Pane. Save and   close the database, and then submit for grading.

Enterprise Security Strategy Plan

 Enterprise Security Strategy Plan

Describe the company that will be the subject of your Enterprise Security Strategy Plan. Explain what the company does and provide an overall description of its infrastructure and the software it has in place. Discuss what the company has that it needs to secure.

HIPAA Compliance

Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

  • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
  • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
  • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login

Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

  • Accurate information on the HIPAA requirements for securing PHI
  • FISMA and HIPAA requirements for a security plan
  • Scope of the work you will perform to meet the Health Coverage Associates’ requests

Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

Write a 1- to 2-page concise outline of the contents of the security management plan. Include

  • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
  • The recommended risk management framework Health Coverage Associates should adopt
  • Key elements Health Coverage Associates should include in its plan of actions and milestones

help me please

  Chapter 3: Requirements and analysis. This should state, in a more detailed way, the  objectives of the project by requirement and the analysis should break the problem down into  manageable steps. There may be more than one suitable approach; the analysis may cover more  of the area than is finally implemented. Suitable diagram-techniques (e.g. UML, other drawings)  should be used where appropriate. If a method is applied selectively, explain which parts were  used and why. Experimental projects should pay careful attention to control conditions, samples  selected, etc. to ensure a valid result. Testing and evaluation should be given due consideration.  It is important that you state how you will evaluate your work. For a design project it is  appropriate to consider testing at the same time as specification.