Firewall discussion

Why are firewalls so important within an IT environment? What are the different firewalls and are all types still in use today? What concepts/inputs would you consider when updating an out of date firewall within an IT environment?

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Discussion 1 week 4

Define the following radiology guidelines and give an example of each:
1.Professional
2.Technical
3.Global


The reference at the bottom of your post should appear as follows:
Reference
Carol J. Buck, Saunders (2022).  Step-by-Step Medical Coding, 2022 Edition, by Carol J. Buck, Saunders

Research Project Assignment

Cybersecurity policy sets the standards of behavior for activities such as the encryption of email attachments and restrictions on the use of social media.

Now, create a cybersecurity policy for the use of Social Media at New England College for the faculty and Staff.

The Final Policy must be comprehensive and include all of the information described in “Creating a Successful Policy”

Note: 3 pages with intext citations and 3-4 references must needed.

kyits531_wk15_as

1) Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view.

 2) What are some of the major privacy concerns in employing intelligent systems on mobile data?

3). Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

 4) Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork.

a

This is a coding assignment.

need some help in my assignment. I have a XML request and need to convert it into an SQL query which will generate the same XML.

MIS602 Assessment 2 { PART I & PART II }

MIS602-Assessment-2-Database-programming-evaluation-practical (Part 1 and Part 2)

 Assessment 2: Database programming evaluation practical  

Context:

The MIS602 Data Modelling & Database Design subject is designed for you to progressively add to your understanding of data and database management and its relevance with in business context. It also introduces you to some of the key features of database management system and designing database systems that will feature in later modules of this topic. In order for you to do well in this subject, it is imperative that you undertake all of the learning activities in the modules. The learning activities are presented as a way of scaffolding your learning so that you can attempt the building blocks of the assessments and be in a safe environment to fail and to learn from them. Therefore, doing your learning activities and seeking feedback from them from peers and from the learning facilitator is the single best way of preparing for doing well in this assessment.

Introduction:

You are required to create the database tables as per the ERD below, and then generate the SQL tasks given in the table.

Submission Requirements and Instructions

This assessment comprises of TWO parts. 

PART I 

Requirements: Complete all the SQL tasks given in the table above. After completing the SQL tasks, you are required produce and experience/reflection report (1000 words) in a word document summarizing your experience of doing these tasks. 

Submission: Your submission must composed of the following files, which must be submitted to Blackboard on or before

Week 7, Thursday 23:59 (Sydney time)

1. SQL file (24 tasks) with results and outputs in a word document.

2. Experience/Reflection report. 

Note: On the following day, you will receive another student’s assignment via email to review, for which you are required to write a short critique. This is explained in the following section.

PART II

Requirements: Based on the assignment you received, you are required to write a critique of approximately 500 words. Please note that your critique should provide constructive feedback highlighting the strengths and areas for improvement in the report, as well as any new knowledge gained from evaluating the authors report. You should provide feedback on overall design of the database, and fulfil the following minimum requirements: 

· Comment on the overall usage of SQL statements and commands used.

· Provide constructive criticism on how the author can improve their understanding of SQL statements.

· Provide some useful readings the author may pursue to help in developing the SQL skills in the future. 

Submission: Your submission must composed of the following files, which must be submitted to Blackboard in a single zipped file on or before Week 7, Sunday 23:59 (Sydney time)

1. Critique of 500 words.

2. The author’s report, which your critique was based upon. 

Topics: 1, 2, 3, 4

Topics:

1.Ponzi scheme, 2. Poverty in Pakistan, 3. What have researchers learned about network security issues in social media. 4. Effect of Test Anxiety on Academic Performance among Medical Students. 

Here you will submit your entire semester’s worth of work in the form of a complete research paper: 

In class, we learned how to create an introduction paragraph for your paper with a thesis statement, in addition to a conclusion paragraph to your paper. If you missed class, be sure to watch the recording. 

  1. REVISE any mistakes made in your Draft submission of your complete Literature Review
  2. REVISE any mistakes made in your Draft submission of your Discussion 

Once you have made all required revisions, prepare for final submission in APA 7 – ALL paragraphs MUST be indented — p. 64 in Foundations for a full outline

YOU MUST CHECK YOUR SIMILARITY AND MAKE REVISIONS BEFORE SUBMITTING IT HERE FOR GRADING:

APA 7 Compliant Title Page – your title is your research problem (10 pts) 

  • Top of p. 2, centered and bold is the EXACT title that is on your title page 
  1. the main introduction paragraph to your entire research paper.
    Opening Sentence: p. 6a in Final Mission Packet
  2. Thesis Statement: p. 7a in Final Mission Packet 
  3. Introduction paragraph with thesis statement — Final Mission Packet (10 pts)
  4. Level 1 heading “Literature Review” — place your complete, revised Literature Review here — (level 2 headings for any subheadings) intro, review of literature, analysis of literature (25 pts)
  5. Level 1 heading “Discussion” — place your complete, revised Discussion — (level 2 headings for anything else, such as Recommendation (25 pts)
  6. Level 1 heading “Conclusion” — Final Mission Packet (10 pts) 

APA 7 Compliant References Page with ALL sources listed in-text (15 pts) 

COMPUTER SECURITY FUNDAMENTALS -3

 

Week 3 discussion topic

  1. Explain that the IT security engineer is responsible for ensuring that a coherent set of processes, procedures, and technologies are installed to support the day-to-day management of risks. 
  2. Compromising information systems is an increasingly popular method of espionage.  Discuss the challenges companies face and how can they prevent data loss?

Look

2hrs to complete

Overview

Based on Chapter 7 in Kremling and Sharp Parker (2018), this assignment is designed to examine the prevention approaches for cyberterrorism and other forms of cybercrime.

“What is the role of violence in cyberterrorism? Within the academic definitions of terrorism, over 80% of definitions indicate violence as a necessary element. However, how does violence, and subsequently fear of harm/violence, translate in cyberspace? Furthermore, how would the presence of violence affect the prosecution of cyberterrorists?

Jackman has elaborated on the issues surrounding the conceptualization of violence. She asserts that there are four main issues that have affected society’s perception of violence. The first is the idea of physical violence. Often, acts of violence that result in “psychological, material, and social injuries” are ignored. Second, the conceptualization of violence is usually limited to “physical behavior and threats of physical behavior.” The third issue is the idea of failure to resist by the victim, and the last is the concentration on interpersonal violence, or the concentration on acts which have “individually identifiable agents and victims and immediate and certain outcomes.” In the virtual realm, these four points come under scrutiny when examining the conceptualization of violence as it applies to cyberterrorism.

In most cases of traditional cybercrime, investigations are conducted by banks or antifraud departments, not by traditional law enforcement. However, if an act results in violence, which may be the case in events of cyberterrorism, law enforcement may have to respond to the report.” (Kremling & Parker, 2018, p. 133)

Action Items

  1. Browse Chapter 7 in Kremling & Parker (2018).
  2. Write a 500-to-1000-word paper that addresses the following questions:
  3. The data preservation stage of the collection/acquisition phase of the digital forensic process involves careful planning on the part of the examiner. Identify and discuss five ways in which the digital evidence can be tainted during the data preservation process. Think of the above case as you respond to this, sharing examples of how the evidence can be tainted.
  4. A fellow classmate is confused about the following terms: slack space, clusters, and sectors. The book provided the analogy of a two-car garage to assist readers with these different terms. Create a different analogy to explain these different terms to your classmate.





CIS 498 – Identifying Your Company and Your Role

  ACTIVITY: IDENTIFYING YOUR COMPANY AND YOUR ROLE

Activity: Identifying Your Company and Your Role

Overview

You have accepted a job offer from the chief information officer at a small business with 30 employees. The company moved into a new building last year and quickly expanded. The CEO has asked the CIO to serve as an executive stakeholder of the project steering committee, which is headed by the lead project manager of the PMO that the company is contracting with.

Instructions

For this activity, you will establish the fictional company, executives, and team members that you will refer to. You will use the information from this activity to complete your first assignment in Week 2.Using the provided Word Document Template, respond to each of the following:

  1. What is the name of this e-commerce company? (Do not choose a real company.) What is the fictional name of the CEO, and what is the fictional name of the CIO? (You can use a friend or family member if you want, or some celebrity or fictional character.)
  2. In 1–2 paragraphs, describe what kind of business your fictional company is in. Do they sell a product? A service? A new government (non-political, please) agency? A nonprofit or charity, perhaps? The one stipulation is that they must conduct business online, and they must be growing.
  3. Finally, choose one of the following roles on the team. Pick one that is closest to the concentration you have studied. For example, software engineering would be closest to software development, forensic investigation would be closest to cybersecurity. If you have any questions on how to answer this, reach out to your instructor. Which of the following is your major (concentration) closest to?
    • Software Development.
    • Networking.
    • IT Project Management.
    • Data Analytics.
    • Data Management.
    • Cybersecurity (yes, this is the correct spelling).
  4. Now that you have identified your area of expertise based on the concentration you have studied, you will need to identify the members of your team. You will take the place of one of the members, so put your name where it belongs; the other roles can have fictional names assigned to them.
    • Cybersecurity Specialist.
    • Networking Specialist.
    • Data Management Specialist.
    • IT Project Manager (Assistant to the Project Manager).
    • Software Development Team Lead.