Internet Security

Write a fully developed paper in which you:

on Internet Security 

  1. Compose an executive summary highlighting the paper’s contents and reasoning for your chosen topic.
  2. Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.
  3. Evaluate the current ethical and legal concerns surrounding your topic.
  4. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide rationale.
  5. Analyze the improvements over the last two years to your communication technology topic, and suggest an improvement based on its current usage.
  6. Predict the future role of the communication technology you’ve selected for both personal and commercial use.
  7. Create a diagram that illustrates the communication structure of your chosen technology in Visio or its open source alternative software. Note:The graphically depicted solution is not included in the required page length.
  8. Use at least eight quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

security vulnerablities

 

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

IT 244 – database design

1-Write the relational algebra expressions for the following (using Ç):
branch (branch_name, branch city, assets)
customer (customer_name, customer street, customer city)
loan (loan number, branch_name, amount)
borrower (customer name, loan number)
account (account_number, branch name, balance)
depositor (customer_name, account number)
a) Find the names of all customers who have a loan and an account at bank. 
b) Find all customers who have an account from at least the “Downtown” and the “Uptown” branches. 
2- University schema
Classroom (building, room number, capacity)
Department (dept name, building, budget)
Course (course id, title, dept_name, credits)
Instructor (ID, name, dept_name, salary)
Section (course id, sec id, semester, year, building, room number, time slot id)
Teaches (ID, course id, sec id, semester, year)
Student (ID, name, dept_name, tot cred)
Takes (ID, course id, sec id, semester, year, grade)
Advisor (student ID, instructor ID)
Time slot (time slot id, day, start time, end time)
Prereq (course id, prereq id)
Write the following queries in SQL, using the university schema
a) Find the names of all students who have taken at least one Comp. Sci. course; make sure there are no duplicate names in the result
b) Increase the salary of each instructor in the IT department by 15%. 
c) Insert every student whose tot cred attribute is greater than 75 as an instructor in the same department, with a salary of $15,000. 
3- Refer to the university schema used in Q.2 and write the following queries using Nested subqueries.
a) Find the average instructors’ salaries of those departments where the average salary is greater than $50,000. (Hint: use subqueries in the From Clause)
b) Delete all courses that have never been offered (that is, do not occur) in the section relation. 
4- Deleting a record can be costly to an organization if not done in the right way. Let us assume you are working as a DBA (database administrator) and you used the delete command without specifying a condition in the where clause. What do you think will happen to the record in the database? And in case a record was deleted, is there a way to recover the lost data? Answer should be in your own words.

Week 3 Discussion

 

  1. Identify your field of study (Psychology), the career you chose, and explain why you chose it ( To work with children in my local school system of Fayette County, GA).
  2. Find two sources from the web and two sources from the South  University Online library about your field. List your four sources in  APA format at the bottom of your post.
  3. Share examples of APA in-text citations which will go in the body of your post for two of your references.

When responding to others, comment on search tips that worked for  you, or on why you think academic and professional writing requires such  rigorous documentation in the form of references and in-text citations.

Note that from this week on throughout your college career, the  grading criterion that mentions information literacy includes the  requirement of providing references in APA format to support your ideas.

cloud_computing_2

 Define and describe PaaS. In the description be sure to list the benefits and potential disadvantages. Locate an article that supports the benefits of PaaS in an organization and/or the failures of PaaS implementation. Be sure to cite in APA format.  

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 4

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not?

Chapter 5

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

Sarbanes-Oxley and

PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Computer science

-Explain Normalization and De-Normalization.
-What are the different types of Normalization? -What is BCNF? 
-What is SQL?
-How many SQL statements are used? Define them.

Technology Entrepreneurship

Que:1 

Discuss this statement: “Market research provides the relevant intelligence for developing the right.” What facts support this assumption?

Que:2 

Discuss the two crucial areas of commercialization of innovation. Do you agree with the statements to support their importance and if so why do you agree that commercialization of innovation is important.  

Assignment

 

Applying all the code on your selected dataset, complete all codes from Chapter 7 Time-dependent graphs. Make sure you submit to this link two things

1. Your report file showing screenshots of all commands from Rstudio GUI

Make sure you show all Rstudio GUIs

2. Submit your R script code

Please go to the below link and download dataset file 

https://www.kaggle.com/puran123/covid19

web master

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 300 words.