for example
Cyber Threaths
Cyber Threaths
Database management
I will send the picture of the ER diagram for reference, to come up with the queries.!
Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For
each query, provide the following in Report 2:
In about 2 lines, explain what the query returns.
Queries:
1 trivial query. Simple select with ordering.
2 medium difficulty queries. Queries that use composite condition for selection,
computations, aggregate function and grouping.
1 query that uses subquery.
2 queries that uses join (1 inner join, 1 left or right outer join).
1 view (query must use join – hint: you can use one of the queries from the
previous question).
1 query that uses union.
1 custom stored function.
1 custom stored procedure.
Design an infrastructure solution using an external service provider.(4-5 pages and No plagiarism)
Design an infrastructure solution using an external service provider.
- Describe a business scenario that requires a new or modified IT infrastructure.
- Analyze the needs of the domain.
- Design a computing solution for the infrastructure.
- Prepare a request for proposal (RFP) based on domain needs analysis.
Your assignment should be 4-5 pages in length (in APA format). You must use a minimum of 3 sources (one can be your textbook) and you must include in-text citations for at least 2 of your sources.
APA Paper Needed. Due December 3, 2021.
Instructions & Paper Topic are attached…
6-8 pages.
APA Format.
Must include pictures & graphs.
3-5 Peer-reviewed articles are required, for sources.
IT492 week 1
Question 1.
More than 200 words APA FORMAT AND CITATIONS
What is project management? Briefly describe the project management framework, providing examples of stakeholders, knowledge areas, tools and techniques, and project success factors.
Question 2
More than 100 words and references
Write about a project that you accomplished. Explain what needed to be done, how it got done, who worked on the project, how long did it take, how much it cost, and what were the risks involved in the project.
CIS
Step One: Select the current chapter being covered in lecture in class about which you want to comment. (See the schedule below.)
Step Two: Use the “Packback Questions” link on the Home page to access Packback.
Step Three: Click on “Ask a New Question” and type in the question that you want to ask pertaining to the chapter being covered this week. Remember to use open ended questions.
Step Four: Find an external source that supports your question.
Step Five: Use paragraphs and don’t make spelling errors. Check your Curiosity score and make sure that it’s at least an 80.
Assignment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references 600 words .
One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”
Business Continuity Planning
Answer the following 12 questions by selecting the single BEST answer for each. Using your course materials and/or other credible resources, provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.
1. Which of the following business continuity exercises can be quite involved and should be performed annually?
A. Disaster simulation testing
B. Table-top exercise
C. Structured walkthrough
2. Which plan is written to attempt to prevent a disaster from impacting the organization and/or to lessen a disaster’s impact?
A. Disaster recovery plan
B. Business impact analysis
C. Business continuity plan
3. While developing the business continuity plan, your team must create a plan that ensures that normal operation can be resumed in a timely manner. Which element is your team creating?
A. Vulnerability analysis
B. Disaster recovery plan
C. Business continuity plan
4. Of the following choices, what is the best form of anti-malware protection?
A. Multiple solutions on each system
B. A single solution throughout the organization
C. Anti-malware protection at several locations
5. What is the first step of a business continuity plan (BCP)?
A. Business organization analysis
B. Select the BCP team
C. Resource requirements analysis
6. What task of BCP bridges the gap between the business impact assessment and the continuity planning phases?
A. Likelihood assessment
B. Provisions and processes
C. Strategy development task
7. Which business continuity plan element is primarily concerned with minimizing property damage and preventing loss of life?
A. Disaster recovery plan
B. Vulnerability analysis
C. Business impact analysis (BIA)
D. Risk analysis
8. You need to ensure that all systems, networks, and major applications can be recovered. What should you create or perform?
A. vulnerability analysis
B. contingency plan
C. risk analysis
D. business impact analysis (BIA)
9. Which of the following is likely to be the most significant challenge with developing an incident management plan?
A. Lack of management support
B. Intrusion by hackers
C. Security response procedures undertaken to detect brute force attacks
10. If a forensic copy of a hard drive is needed, the copy data are MOST defensible from a legal standpoint if which of the following is used?
A. An encrypted copy of all contents of a hard drive
B. A bit-by-bit copy of all data
C. A compressed copy of all contents of a hard drive
11. What is the capability to effectively manage unexpected events to the organization with the objective of minimizing impacts and maintaining and restoring normal operations?
A. Incident response
B. Incident management
C. Control objectives
12. What is the operational capability to identify, I prepare for and respond to incidents?
A. Risk tolerance
B. Quality assurance
C. Incident response
Discussion
I have attached the instruction