Information Governance week -4 -2

 Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread. 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

500 words

disucssion-7

 You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation. 

SQL writing assignment

 

Answer the following questions in a cohesive and comprehensive essay. 

  • What is the difference between “Stored Procedure” and “Function”?
  • What is difference between “Clustered Index” and “Non-Clustered Index”?
  • What is the difference between the “DELETE” and “TRUNCATE” commands?
    • Be specific and provide examples. 

 

  • A minimum of 350 words.
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.
    • NOTE:  An abstract, title page and reference page are not required for writing assignments in this course.
  • Use support from at least two reputable sources (other than course materials) written within the last five years.

Case Study

 This week you learned more about the core Compute, Networking, Storage, and Database services in AWS. Amazon publishes customer case studies to show how their customers use and benefit from their services. For this week’s assignment, use the AWS Customer Success page (Links to an external site.) to search for case studies.  Select at least two (3) or more customer case studies. Each case study will include multiple AWS or Amazon services, and you do not need to include all of the services mentioned. In your own words, discuss how each customer used the service. If you include a service that has not been discussed in this course, include a description of that service within your response. Your assignment should be 3 pages in length and in APA format. At a minimum, your reference page should include links to the Amazon customer case studies you selected. 

D6

The attached document contains the question. 

250-300 words in length with a minimum of 2 references in APA format

Cryptography milestone 2

Question:  you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  

-The writing assignment requires a minimum of two written pages to evaluate the history. 

 -You must use a minimum of three scholarly articles to complete the assignment.  

-The assignment must be properly APA formatted with a separate title and reference page.  

-No Plagiarism.

Essay Questions

The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing sources. 

Question #1

Immunomedics was alerted that there was some negative buzz about the company in a chat room. The poster used a pseudonym, and therefore the company was unable to identify the poster for lawsuit purposes. The only information the company could ascertain was the poster’s ISP. So the company decided to subpoena the ISP for identity information of the poster in order to file suit against the poster. How should the courts handle these cases, where the company’s complaints may, or may not rise to the level of an actionable legal claim?

Chicago Lawyers Committee for Civil Rights Under Law, Inc. v. Craigslist, 519 F.3d 666 (7th Cir. 2008).

Question #2.

Users of the popular Internet website Craigslist are able to post advertisements for housing that permit statements regarding the preference, limitation, or discrimination of others based on race, religion, sex, or family status. The Fair Housing Act (FHA), however, prohibits making, printing, or publishing a notice, statement, or advertisement for sale or rental of dwellings indicating preference, limitation, or discrimination based on protected classes. As such, the Chicago Lawyers Committee for Civil Rights Under Law, Inc. brought suit against Craigslist alleging a violation of the FHA. In defense, Craigslist claimed that it was immune from liability based on Section 230(c)(1) of the CDA, which protects interactive computer services from liability for unlawful third-party content. Should Craigslist be subject to liability for FHA violations? Why or why not? Cite to appropriate legal principles when explaining your answer.

Differences between and advantages of MAC, DAC, and RBAC.

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Tasks

 There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Your company is experiencing a decline in business because of competition. 

Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. 

Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. 

In your discussion, explain what is E-Commerce and Mobile Technology..

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Assignment-Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.