Writing assignment

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Do not double space.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

week-7-BT

From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

Project part 2

  

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Week 4 Discussion

    

For this discussion, you will need to address the question below and be sure to participate fully by responding to your classmates as well. Citations should be used to support your analysis and references should be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!

Productivity software (such as Excel or Google Sheets) is used by almost every business. Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work?

The Question:

•Productivity software (such as Excel or Google Sheets) is used by almost every business.  •Think in terms of your own field of study and future profession, in what ways could you use productivity software to increase efficiency in your work? 

Ask yourself:

•Please note this week Excel is studied. •What is productivity software (Excel)? •How is productivity software (Excel) increasing efficiency in your own field of study and future profession?  

discussion

 Task1 (Around 500-600 words)

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Cybersecurity

Cybersecurity careers are growing at a very fast rate. what brought you to this program. What do you hope to obtain from taking this course? Has anything you learned anything potentially made you think about opportunities in cybersecurity you may have not before?

discussion help minimum 300 words

Discuss a particular type of Malware and how has it been used in “todays news” and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Read Chapter 1 of the assigned textbook.

Book reference:

Computer Security: Principles and Practice

Fourth Edition By:  William Stallings and Lawrie Brown

assignment of 3pages forHOMWORK_WRITER

Write a paper for 3 pages not including title page and references.

Assignment Content
Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data, information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and users’ intellectual property (e.g., photos, artwork, videos, etc.).
Continue your work with your team on the features of the application by identifying ethical challenges and specifying the type of data the feature uses, a risk mitigation strategy for the risk you provided in Week 2, and a global ethical perspective of the choices you made in implementing a risk mitigation strategy.

database management

IFB105 Database Management

Project – part A

Project overview

The IFB105 project gives you an opportunity to apply concepts and skills you acquired in the unit to a realistic database design scenario and reflect on the data requirements of an organisation.  

The submission is divided into 2 parts due at different times during the semester. These parts will cover:

  1. Design of a database
     
  2. Creation and use of a database  
     

The task for part A

In this part, you will:

  1. Design an ORM conceptual schema for a business domain based on sample reports required for that domain.
     
  2. Map a different ORM schema to a relational database schema.
     

.please there are several task on the file uploaded ..