security awareness

No training plan is in place for the company you chose, and many members of the upper management argue that there is no need to have one. However, your supervisor has asked you to research the compliance and/or audit standards that your organization must adhere to maintain these requirements and then write a proposal to address the training needed for the company.

Please review the following documents:

You are required to write a three to five (3-5) page proposal in which you recommend the need for security awareness training. In your proposal, be sure to:

  1. Identify compliance or audit standards that your organization must adhere to.
  2. Identify security awareness requirements for those standards.
  3. Identify training methods to meet those requirements (In house, contract or CBT).

Assumptions

  • You should assume that your company will have to accept credit cards as payments.
  • You should assume that no current awareness/training plans exist for your company.
  • You should assume that all offices and groups need training.

Notes on submission:

  • Use at least three (3) quality resources as references in this assignment. Wikipedia and similar Websites do not qualify as quality resources.
  • Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

page paper comparing SQL and NoSQL Database for Big Data.

Write a 3 page paper
Comparing SQL and NoSQL Database for Big Data.
The paper should answer the following:

1. What are the SQL and NoSQL databases. 

2. Use cases of SQL and NoSQL database. Differences of SQL and NoSQL databases.

3. Four types of NoSQL database. Give example of each database. Use case of each type of the four NoSQL database.

4. What big data databases are used in the cloud, AWS and Azure

5. Future of big data database

Reference files Attached:
Write a paper comparing SQL and NoSQL Database for Big Data

Attached Files:

File1: 30108-ArticleText-56477-3-10-20191021.pdf 30108-ArticleText-56477-3-10-20191021.pdf – Alternative Formats (626.162 KB)

File2: Comparative Study-3401.pdf Comparative Study-3401.pdf – Alternative Formats (376.457 KB)

File3: NoSQLdatabasesforbigdata.pdf NoSQLdatabasesforbigdata.pdf – Alternative Formats (235.421 KB)

File4: sustainability-12-00634.pdf sustainability-12-00634.pdf – Alternative Formats (5.164 MB)

File4: sample-paper.pdf sample-paper.pdf – Alternative Formats (263.157 KB)

Week 6

Here you can submit an outline of your final project paper. Before you begin your outline, go to the Assignments area of the classroom. Read what is required for your final paper and build your outline accordingly. The template and sample attached there will help you.

 Your outline should include your thesis statement, a description of the problem, alternative solutions (if you are exploring solutions), and the solution you are advocating (if you are suggesting a solution). Be sure that the elements of the outline are complete sentences. Please note that, if you have one subheading in a category, you should have a second subheading. Samples of outlines are attached.

mobile -6

 

Question 1:

Read the given paper on Doodle Health: Games as Cultural Probes and answer the following questions

Why it is needed to provide better health information communicating tool for medical

discharge information or instructions for at-home care?

How Cultural Probes would be effective to provide solution for this case.?  

What is Doodle Health?

Question 2: Consider the online learning environment in  elementary school  (ages 6–11).

Due to Covid 19, so many students  from different cultural backgrounds are engaging with remote learning. 

How Cultural Probes would be effective to provide better learning environment for this student age group ?

What would you do if you were tasked to develop a Mobile app to improve remote learning for this age group?

Mobile_Probes_in_Mobile_Learning.pdf Download Mobile_Probes_in_Mobile_Learning.pdf

Doodle_Health_Games_Cultural_Probes.pdf Download Doodle_Health_Games_Cultural_Probes.pdf

Cultural_Probes.pdf 

Need about one and half page. Own launguage,

  

Based upon the recommendations you plan to make for your week six written assignment, use this spreadsheet                Download this spreadsheet               to create a financial case for your  recommendations. In your posting, describe your recommendations and  attach the return on investment spreadsheet with your costs and  benefits. The following resources may help you:

Case study is given in attached PDF.

about 500 words and given excel database sheet. You can write about recommendations, Use of IT to improve business, Financial improvements etc. 

Required citation and references.

The Knights Move Program in What Language?

When the instructor was working on his master’s degree my first programming class was Assembly Language Programming for the 8088 microprocessor. Don’t worry you don’t need to learn any languages for this assignment. However, I want you to use your favorite internet search engine (NOT BING) to look up the Knights move problem and how to solve it in the following languages.

  • 8088/286/386/486/X86/AMD64 Assembly (Intel, 8, 16, 32, or 64 bit is fine)
  • C
  • C++
  • Python 3
  • Php
  • Java/DotNet

Calculate which programming language most efficiently solves this problem from a point of view of the number of lines of code excluding imports, {, }, blank lines, and comments.

You should graph or chart how the solution differs so it is clear and concise.

Parameters:

  • Must include one paragraph describing how efficient the different languages are in regard to code length.

Computer Forensics

 You are required to write a 7-10 page research paper, double-spaced, on a current topic within the realm of digital forensics. The topic needs to be approved by the instructor when you submit the Abstract (Week 7). The paper has to be well referenced. This is defined by having at least two “peer reviewed” references cited. For the purposes of this assignment, we will consider any paper published in a conference proceedings or journal as peer reviewed. The following notes are available from the Purdue OWL Writing Lab. The Analytical Research Paper You will be writing an analytical research paper, which begins with the student asking a question (a.k.a. a research question) on which he has taken no stance. Such a paper is often an exercise in exploration and evaluation. For example, perhaps one is interested in Cloud computing…the research question may be “what challenges does Cloud computing pose to the field of Digital Forensics?” Then, the research will lead to a conclusion of what current Cloud challenges are. The Paper Writing Process Once you have identified a topic and research question, you need to do academic research on the topic. For the purposes of a graduate-level research paper, all references must be academically strong, meaning from scholarly journals and published in the last 3-5 years. The best source of research is the UMGC Library. Once you have enough information to write a 7-10 page paper, the next step is to create an outline. Write a draft report from the outline, proofread and revise to complete the final paper 

Benchmark – Legal and Ethical Challenges of Cybersecurity

 Cybersecurity policies and regulations should support not interfere with organization workflow, and ultimately provide the three most crucial components of security: confidentiality, integrity, and availability. That is, policies should support people doing their jobs. Successful security policy needs to demonstrate to employees the value of security, not just the requirement for security. Thus, establishing adequate organizational culture is important as it affects security structure and policy. In 750-1,200 words, discuss organizational factors in light of Christian worldview by answering questions below:

  1. How does trust grow in organizations? For example, in some organizations there is lots of trust  at the base of the organization, but this trust does not necessarily rise      up.
  2. When are employees comfortable      with whistleblowing? Should technology have a function in extending the      whistleblowing capabilities of employees?
  3. It seems reasonable to assume      that all organizations have implicit tradeoffs about what is more and less      important in their expressions of policy. How can these be made more      explicit so that policy and security architectures can more effectively      capture these values?
  4. Within an organization, while      monitoring can help with technical aspect (such as access violations), it      does potentially worsen behavioral aspects. Discuss the deciding factor of      how much monitoring is acceptable both ethically and legally by examining      the ideological foundation of the Christian worldview.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.