Cyber security 4050

 I have one full course for cyber security. There are 16 weeks and have to do the discussion papers and response and final week. Please do placed your bid after reading the attachment.   

Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 7

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Project

Database Management System

 Johnson’s Hospital System Case Study

Case Study 1

Hospital Management System

Aim: JHChospitalisamultispecialtyhospitalthatincludesanumberofdepartments,rooms,doctors, nurses , compounders , and other staff working in the hospital . Patients having different kinds of ailments come to the hospital and get checkup done from the concerned doctors . If required they are admitted in the hospital and discharged after treatment.

The aim of this case study is to design and develop a database for the hospital to maintain the records of various departments , rooms , and doctors in the hospital . It also maintains records of the regular patients , patients admitted in the hospital , the check up of patients done by the doctors , the patients that have been operated, and patients discharged from the hospital.

Description: In hospital, there are many departments like Orthopedic, Pathology, Emergency, Dental, Gynecology ,Anesthetics ,I.C.U.,Blood Bank,Operation Theater ,Laboratory ,M.R.I.,Neurology , Cardiology, Cancer Department, Corpse, etc. There is an OPD where patients come and get a card (that is ,entrycardofthepatient)forcheckupfromtheconcerneddoctor.Aftermakingentryinthecard,they go to the concerned doctor ’s room and the doctor checks up their ailments . According to the ailments , the doctor either prescribes medicine or admits the patient in the concerned department . The patient may choose either private or general room according to his/her need. But before getting admission in thehospital,thepatienthastofulfillcertainformalitiesofthehospitallikeroomcharges,etc.Afterthe treatment is completed , the doctor discharges the patient . Before discharging from the hospital , the patient again has to complete certain formalities of the hospital like balance charges , test charges , operation charges (if any), blood charges, doctors’ charges, etc.

Next we talk about the doctors of the hospital. There are two types of the doctors in the hospital, namely, regular doctors and call on doctors . Regular doctors are those doctors who come to the hospital daily . Calls on doctors are those doctors who are called by the hospital if the concerned doctor is not available.

Research Paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cloud computing

  

Project overview

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.

This project will be completed in a series of steps, in which you will explore cloud technologies and cloud architecture and how they can be used in the organization.

Your presentation with audio narration will educate the executives on cloud computing and its benefits (and drawbacks) to the company. To complete your analysis, you will need to cover the following:

  • description      of cloud computing
  • basic      capabilities of the cloud
  • advantages      and disadvantages of cloud computing
  • analysis      of economic implications
  • IT      business needs
  • SWOT      analysis

There are six steps in this project. In your final narrated PowerPoint presentation, you will be assessed on your ability to convey your understanding of cloud computing and how it can be used to benefit your organization, explaining the advantages and disadvantages of cloud computing and providing a detailed business analysis covering financial considerations, business requirements, and an analysis of threats and opportunities.

Step 1: Describe Cloud Computing

Your supervisor, Sophia, BallotOnline’s director of information technology, has tasked you with creating a presentation that will convince the executives that using cloud-based computing to accommodate BallotOnline’s future growth rather than trying to expand the current infrastructure will help the company do business faster and at lower cost while conserving IT resources.

Step 2: Research Advantages and Disadvantages of Cloud Computing

Now that you have defined important terms and summarized the basic capabilities of the cloud, it is time to explore the advantages and disadvantages of cloud computing.

Currently, BallotOnline is running at full capacity and needs to expand its IT infrastructure to accommodate its growing needs. Instead of expanding current on-premise IT infrastructure by building or acquiring a new data center, Sophia has suggested that the cloud may be more efficient and cost-effective than adding more traditional physical data center space.

This information that you research will be useful in your final presentation in the last step.

When you have completed the research, move to the next step, where you will consider the budgetary aspects of a move to the cloud and the implications for the organization.

Step 3: Analyze Economic Implications

Now that you have weighed the benefits and drawbacks of cloud computing, it’s time to take a close look at the economic implications of a move to the cloud. All organizations (for-profit, nonprofit, or government) have finite budgets. Management must allocate these financial assets appropriately so that the leaders can make sound business decisions and meet the objectives of the organization.

Information technology (IT) is a key strategic function to help support the objectives of an organization. Businesses first used information systems to replace paper-based methods of helping management perform these functions, and that use continues today. Managers must be able to understand different IT models to make the best financial investment decisions for the organization.

The financial requirements for the cloud computing model are different than the financial requirements for an on-premise model. Cloud computing shifts budgets to a pure operating expense model, whereas the traditional on-premise computing model requires both capital and operating expense allocations.

Several free calculators to help estimate the cost of cloud services exist on the web, including the AWS Total Cost of Ownership (TCO) Calculator and Azure TCO Calculator. Alternatively, you may find other calculators to estimate your cloud cost. Most cloud providers have their own cloud cost estimator tools. If the calculator that you selected does not show on-premise data, then you can recalculate using one of the other calculators that do provide this data.

For your economic analysis, enter the information from BallotOnline’s IT Budget and Infrastructure Summary into your chosen calculator to estimate TCO for the current physical IT infrastructure configuration. Then estimate TCO for a comparable configuration in the cloud to estimate the potential cost savings.

Write the summary of the economic implications, showing the savings and how you arrived at them, and upload it to the dropbox below.

Step 4: Define the IT Business Requirements

After considering the economic aspects of the cloud, the next logical step is to narrow the particular requirements of cloud computing for the organization. It is important that your presentation works toward building a business case for cloud computing.

Your presentation must address BallotOnline’s business requirements and critical IT requirements related to data storage. Make sure you classify the requirements into functional (behavior) and nonfunctional, as per the requirements definition link.

Step 5: Prepare a SWOT Analysis

In this step, you will apply the information gathered in the business analysis to assess the benefits and possible drawbacks of adopting cloud infrastructure for BallotOnline.

Take Note

What Is a SWOT Analysis?

Description: SWOT analysis acronym stands for Strength, Weaknesses, Opportunities, and Threats.

Your supervisor, Sophia, recommends that you include a SWOT analysis in your presentation, since the BallotOnline company executives will want you to go over both the advantages and disadvantages of cloud adoption and any important internal and external factors that may influence the success of the project.

Prepare a Presentation on Benefits and Possible Drawbacks of Adopting Cloud Infrastructure

In this step, you will prepare your presentation for the BallotOnline executives. This presentation should present them with a compelling business case and cover the benefits and possible drawbacks of adopting cloud infrastructure, data on cloud economics, and a demo of some basic cloud capabilities.

MYSQL

 

we will work with the Sailingdatabase. Download the sailingDB-JS.sql from and load it in MySQL.Submit your lab report as Word document.

1.Read the statements in sailingDB-JS.sql. For each type of statements, choose one example to explain what that statement does. Refer to the textbook or MySQL reference manual for information.

2. Describe briefly each relation in the Sailing database. Point out the entity relations and association relations and explain your rationale.

3. Queries A and B below demonstrate the impact of order when we use outer jointo connect three or more database tables. Execute each query, then compare the query results, and include in your lab report:

•A screenshot of the results for each query

•An explanation of where and why the results of the two queries differ

Query A: SELECT SA.sid, SA.sname AS Sailor_Name, CONCAT(‘S:’,RA.sid,’-B:’,RA.bid) AS Reserv_Track_id, BA.bid, BA.bname AS Boat_NameFROM reserves RA right outer join sailors SA on RA.sid=SA.sid right outer join boats BA on RA.bid=BA.bid;

Query B: SELECT SA.sid, SA.sname AS Sailor_Name, CONCAT(‘S:’,RA.sid,’-B:’,RA.bid) AS Reserv_Track_id, BA.bid, BA.bname AS Boat_NameFROM reserves RA right outer join boats BA on RA.bid=BA.bid right outer join sailors SA on RA.sid=SA.sid;

4.QueriesC, D, and E attempt to find the names of sailors who have reserved BOTH a red boat and a green boat. Execute each query, compare the results, and include in your lab report:

•The screenshot of results for each query

•A comparative analysis of the different results

•Explanation of why Query E does not work

Query C: SELECT S.snameFROM Sailors S, Reserves R1,Boats B1,ReservesR2,Boats B2WHERE S.sid=R1.sid AND R1.bid=B1.bidAND S.sid=R2.sid AND R2.bid=B2.bidAND B1.color=’red’ AND B2.color=’green’;

Query D:SELECT S.snameFROM Sailors S, Reserves R, Boats BWHERE S.sid=R.sid AND R.bid=B.bid AND B.color=’red’AND S.sid IN ( SELECT S2.sidFROM Sailors S2, Boats B2, Reserves R2WHERE S2.sid=R2.sid AND R2.bid=B2.bidAND B2.color=’green’);

Query E:SELECT S.snameFROM Sailors S, Reserves R, Boats BWHERE S.sid=R.sid AND R.bid=B.bidAND (B.color=’red’AND B.color=’green’);

Reference to database below:

Opposing Shadow IT

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively. Read the article, “Lifting the Veil Off Shadow IT.” Then, respond to the following:

  • Take a position favoring or opposing shadow IT.
  • If you are in favor, give one reason that shadow IT should be allowed. If you are not in favor, provide one way that the organization can reduce the risks of shadow IT.

assignment

 

Scenario

Your new manager comes to you and asks you that he keeps hearing about read/write blockers for forensic imaging. He’s not sure what that is. He also is confused because he’s heard that there’s two different types (software and hardware). Also, there’s commercial and open source tools. He knows you just took a course in digital forensics so he asks you to prepare a memo for him explaining all that.

Your assignment

  1. Research on what is a forensic read/write blocker and what is the difference between a hardware and a software version?
  2. Research on what tools are available e.g. commercial (you buy) or open-source (free) and what types are available.
  3. Identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
  4. Put it all together and summarize it for your manager! No more than 2 pages please.

What this teaches you

Being familiar with what tools the investigator used will help you. You gain credibility by asking what hardware or software tools they used, how they deployed it and why they went with a hardware or software version. 

IT project ticketing system

 

n this course, you are required to identify a problem or opportunity in the IT area and develop a solution to the problem.  The project should integrate theory and application from across your educational experience and allow you to showcase your academic learning.  During the course, you will identify a problem, develop requirements based on stakeholder needs, develop a design after considering alternative solutions, implement the solution (virtually is sufficient), and test the solution.  Your design and test plans should take into consideration the end-user as well as the broader context of the end-user.  The course culminates in a final presentation and final report.

Your project should not be something that you have done before, either as part of your academic work or for an employer.  However, you can work on a project which is for your employer and will be implemented in the workplace, as long as you don’t develop the design with colleagues at work. It is important to note that your project MUST include a hands-on component (typically completed in a virtual environment). Because of the point distribution, you MUST complete an appropriate hands-on project in order to pass this class.

If you need some ideas, see the attached file, “IT491 Capstone Topic Ideas” for some suggested topics. 

Keep in mind that your project should meet the objectives listed for this course: 

1. Apply industry standards to the implementation and support of network systems and computer devices.

2. Demonstrate the principles of information technology security.

3. Use information systems for the collection, organization, and delivery of data.

4. Express relevant information to technical and non-technical audiences.

5. Design secure network infrastructures for physical and virtual environments.

6. Create information technology solutions based on business needs or requirements.

You may not begin work on the project until your proposal is approved by your instructor.

In this assignment, please write a proposal for your capstone project using the attached “IT491 Week One Assignment 2020.”