With the advent of ML/AI, what effect do you think this will have on the future of firewalls? What kinds of new implementation techniques do you think will emerge because of ML/AI?
security architecture
What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?
Data gathering instrument
Task: Create one (1) instrument that could be used to gather data for your mock dissertation topic. The instrument should be designed to be exactly how it would be deployed to collect data. Since instrumentation usually goes through several steps of field testing, for purposes of this assignment you can submit a deployment-ready draft of your instrument without field testing it. Be sure the instrument collects data appropriately to measure your research question. If your study will not use an instrument to collect data because your data is archival and already exists, you will discuss your process for data retrieval.
Some examples in below link
Need Response to below discussion-cloud IT
Please provide the responses to below discussions in 75 to 100 words for each discussion
Post1#
Federated architecture in cloud systems is also referred to as the Cloud Federation Architecture. It is a system that provides an intercloud service where heterogeneous cloud gets capacitated to interoperate. All the clouds participating ‘adopt unique techniques to describe the different services obtained from their platforms’ (Liu, Zhang, Song, & Letaief, 2020). Users, on the other hand, are enabled to use the created mechanism or system to benefit from the common as well as available services within the cloud, this being after the conclusive application of the federation’s architecture within the interface. There are specialist service brokers whose mandate is to provide a platform for translating services between and amongst the interfaces, thus providing the necessary updates for its successful operations.
Cloud federation architecture applies brokerages, including the most common, typical objective request broker architecture (Liu et al., 2020). Others that have gained notoriety in the market amongst consumers include the Object Request Broker, which acts as middleware, especially after introducing the XML. It is now possible to apply similar technologies in processing similar languages while avoiding unnecessary translations. Brokers play a core role in the cloud federation, ‘whereas other service providers such as the CPSs facilitate the broker-to-broker communications’ (Liu et al., 2020). Such a function can be matched with those offered under the federation resources and have to be operated using a user command just as it is done while considering the SLAs parties. It is incumbent upon the brokers to identify the unique ways cloud services and resources ca. n be applied before gathering information seamlessly and smoothly. Service pricing information is another crucial benefit that can be gained from brokerage services.
For cloud federation architecture to function correctly as designed, the engaging parties, as well as those that are interested, need to ‘subscribe for the FLA services’ (Wu, He, & Chen, 2020). This service guarantees particular interconnections, laws, and rules of operation, which also dictates the unique roles and responsibilities of the parties. Only acceptable behaviors are allowed leading to more significant financial gains. There are administrative penalties, however, following violations of the laid down protocols, which equally encourages smaller parties to subscribe and unsubscribe at will. All the pros and cons of cloud federation architecture, however, serve to ensure that the system as developed promotes interoperability, collaboration, and cooperation.
Research on the intercloud services reveals a growing interest and concern for the use of cloud federations. Some of the factors that have been cited for this ever-increasing urge include its power-efficiency, cost-effectiveness, and even the dynamism associated with it when it comes to sharing and disseminating information, services, and resources (Wu et al., 2020). It is required of the members in a federation to sign up for the Sign Service-Level Agreements, which is depended upon for continued availability as well as QoS. Other things to consider include defining the marketing system based on the costs of utilities, determine the geographic dispersion that will dictate how resources are distributed. Equally important is that it will eliminate any likely problems within the network ass that would interrupt normal services or alter access to services through delays.
Post#2
Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. Those users might be customers (customer identity management) or employees (employee identity management). The core objective of IAM systems is one digital identity per individual. Once that digital identity has been established, it must be maintained, modified and monitored throughout each user’s access lifecycle. Identity and management technologies include but aren’t limited to password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.
“An Identity and Access Management (IAM) framework manages these different slices of your profile, including your memberships, groups and organizations, roles, resources, resource-level roles, risk, history, status, and so on” (Scheidel, 2010). IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations.
“Unlike manual new-user access and subsequent modification controls, the primary benefit of centralized and automated IAM controls is the enforcement of organizational security policies at the point of use” (George, Aldhizer, Paul & Dale, 2008). Specifically, security policies are enforced through the real-time monitoring of employee and third-party access and use of sensitive data across multiple enterprise resource planning (ERP) databases in numerous locations. Additional benefits of centralized and automated IAM controls include improved operational efficiency, increased userproductivity, enhanced internal audit efficiency, and improved compliance with federal privacy laws and regulations.
“Implementing centralized authentication is a great method when there are too many users and servers, although this itself needs a good amount of time to implement and maintain. Thus, depending on operational benefits, you can give a thought” (Vora, & Pruteanu, 2017). Many organizations should consider automating the following five IAM processes and related controls: password changes or resets, new-user access, subsequent modifications to existing user access, termination of user access, and third-party access. While the benefits of deploying a robust IAM solution are clear, the cost and complexity of implementation can derail even the most well-intentioned organization. However, when enterprises consider the cost of a potential security breach or study the inefficiencies inherent to the manual provisioning and de-provisioning of access to corporate resources, the imperative is clear. In addition, enterprises can ensure security by deploying solutions with strong multifactor authentication, while eliminating user frustration by delivering seamless access to cloud-based applications.
Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges. Those users might be customers (customer identity management) or employees (employee identity management). The core objective of IAM systems is one digital identity per individual. Once that digital identity has been established, it must be maintained, modified and monitored throughout each user’s access lifecycle. Identity and management technologies include but aren’t limited to password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.
“An Identity and Access Management (IAM) framework manages these different slices of your profile, including your memberships, groups and organizations, roles, resources, resource-level roles, risk, history, status, and so on” (Scheidel, 2010). IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations.
“Unlike manual new-user access and subsequent modification controls, the primary benefit of centralized and automated IAM controls is the enforcement of organizational security policies at the point of use” (George, Aldhizer, Paul & Dale, 2008). Specifically, security policies are enforced through the real-time monitoring of employee and third-party access and use of sensitive data across multiple enterprise resource planning (ERP) databases in numerous locations. Additional benefits of centralized and automated IAM controls include improved operational efficiency, increased userproductivity, enhanced internal audit efficiency, and improved compliance with federal privacy laws and regulations.
“Implementing centralized authentication is a great method when there are too many users and servers, although this itself needs a good amount of time to implement and maintain. Thus, depending on operational benefits, you can give a thought” (Vora, & Pruteanu, 2017). Many organizations should consider automating the following five IAM processes and related controls: password changes or resets, new-user access, subsequent modifications to existing user access, termination of user access, and third-party access. While the benefits of deploying a robust IAM solution are clear, the cost and complexity of implementation can derail even the most well-intentioned organization. However, when enterprises consider the cost of a potential security breach or study the inefficiencies inherent to the manual provisioning and de-provisioning of access to corporate resources, the imperative is clear. In addition, enterprises can ensure security by deploying solutions with strong multifactor authentication, while eliminating user frustration by delivering seamless access to cloud-based applications.
database Management system
Given the relational model below, using your ADU ID and SQL statements.
List all your courses of the last term [0.5 pt.]
List the instructors’ names of these courses in descending order [0.5 pt.]
List all courses of the last term that have no prerequisite [0.5 pt.]
List all courses of the last term with grade above ‘C’ [0.5 pt.]
Determine the CSIT department of the last term courses [1 pt.]
Define the courses of the last term that have more than one section [1 pt.]
Display the sections of the courses above that are offered in your location (‘Abu Dhabi’ or ‘Al-Ain’) [1 pt.]
Please attach your last semester schedule details for crosschecking.
Spr1.2
Assignment 1:
In Chapter 2, the author talks about four key stages with regards to data visualization workflow. Select one key stage and expand on the author’s comments about the stage.
Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.
Requirement:
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.
· Add reference separately for each assignment question.
· Strictly follow APA style.
· Include at least two citations (APA) from academic resources
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Assignment 2:
A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.
As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:
· BitLocker
· BitLocker To Go
· File encryption via Encrypting File System (EFS)
· Folder encryption via EFS
Answer the following question(s):
Ø Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.
Requirement:
· ****Separate word document for each assignment****
· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.
· Add reference separately for each assignment question.
· Strictly follow APA style. Length – 2 to 3 paragraphs.
· Sources: 2 References to Support your answer
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $5 max. Please bid if you agree.
Assignment 3:
Project Part 2.
Refer to the “Project Part 2-Access Controls Procedure Guide” word document for tasks and instructions.
Requirement:
· ****Separate word document for each assignment****
· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.
· Strictly follow APA style.
· No plagiarized content please! Attach a plagiarized report.
· Check for spelling and grammar mistakes!
· $10 max. Please bid if you agree.
essay
The final paper is a summary and self-reflection on how knowledge acquired from this course can impact your future career decision/choice/development. It should be
In this paper, write about your thoughts about informatics over the entire course and address the following:
- What is informatics? (5 points)
- Which aspect(s) of informatics is new to you? (15 points)
- Were you aware of any informatics-related job opportunities before taking this course? (5 points)
- Does this course change your overview of the future job opportunities? and How? (10 points)
- What type of jobs do you plan to pursue after graduation? Is it going to be informatics related? (10 points)
Compose the paper in an essay format and do not just give answers in the bullet list. (5 points)
Please make your analytic points specific as this is your self-reflection. Reference anything that are not your own using APA style.
Which aspect(s) of informatics is new to you? for this question please write health informatics is new for me you can use following link for more information for health informatics
2. Use the following resources to learn about health informatics and possible career paths:
What is Health Informatics? (Links to an external site.)
Health Informatics Degree Guide (Links to an external site.)
What is a Health Informatics Specialist? (Links to an external site.)
Healthcare Informatics (Links to an external site.)
Submission instructions:
Save your paper in a Word file and name it as FinalPaper_FL where FL are your first and last name initials. The formatting of the paper should be of at least two pages long (references do not count), single line spacing, use a font size of minimum 10 points but no larger than 12 point. Set margins to 1 inch on all sides.
Assignment
Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.
Use your own words and do not copy the work of another student.
Research paper
Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets. A policy is an administrative control.
If no policy exist in the IT department, research shows that employees will default to a defacto policy. A defacto policy means a policy that is in effect ,but not formally recognize. To stop this for happening, It is important for students to understand how to take the cloud best practices discussed throughout this course and use them to create a cloud security policy. Cloud security fundamentals and mechanisms is a huge part of the cloud security policy.
For this assignment, read the attached article: “Our Journey to the Cloud”. Use the SANS email policy template SANS email policy template – Alternative Formats
to create a policy for the cloud. Please note, the SANS policy is a template you can use to structure your policy. If you are having trouble with the links above, these supporting documents can be found in the Cloud Policy Assignment Documents folder.
cloud computing
Compare and contrast physical, dedicated virtual, and shared virtual servers. Search the web for companies that provide each. What cost should a customer expect to pay for each?
Be sure to provide a minimal 2 pages, 3 scholarly resources and write using APA format. No plagiarism.