Microsoft Access Capstone. I need the Access files completed.
Softwear Anti-virus Security Architecture
Length: Minimum of 1500 words
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.
Question:
1. Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? (900 Words – two references)
2. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? (600 Words – two references)
Connection assignment 2
Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ – Information Security & Risk Management ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide an 500-800 word minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
security architecture 14.2
Topic : Technology review, reviewing some security product or control technology
Make sure to explain and backup your responses with facts and examples.
This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers). Minimum of 1000 words
Data Classification and Data Loss Prevention
Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf
It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?
The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.
After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.
Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)
System analysis and design
- Describe how Unified Modelling Language (UML) is used in systems design.
- Give examples of UML in use.
discussion
What are the privacy issues with data mining? Do you think they are substantiated?
Web Development Adobe Dreamweaver, Creative Cloud, and XD one page paragraph.
You should be REPORTING EVIDENCE and EXAMPLES from what you read.
Find, Read, and Share – THREE related sources of information
Report – Three things about the topic that you want to remember forever
- Identify the topic for this week. The title of this discussion board thread lists topics as well as you should reflect on what was covered during class.
- Find three high-quality sources of related information on the Internet.
- Read your chosen high-quality sources of related information.
- state your three sources of information.
- DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
- SUMMARIZE with three things about the topic that you want to remember forever.
Assignment
2 pages for each research paper
assignment
Please search and analyze contemporary incidents in the fields of CS, CE, and IT outside the US that has an ethical impact to the society. v