cloud 12

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

HTML Programming

 

HTML programming

Create a Design Document, outlining a website with at least 5 pages demonstrating the content from this course, relating to an interest or hobby the student has. 

Include:

· Brief Description of the following pages, including a layout mockup and a color palette 

o 1 text/terms 

o 1 images 

o 1 multimedia page 

o 1 links page 

o 1 user designed 

Computer Science

Projects
  1. Compile a list of important characteristics of processors commonly employed in today’s personal computers.
  2. Conduct research on how to write the algorithms for shortest job next (SJN) and shortest remaining time (SRT) policies. Submit your findings in a report.
Additional Resources
  1. History of operating systems:  http://www.osdata.com/kind/history.htm
  2. Dual-Core vs. Quad-Core CPUs: http://www.pcmag.com/article2/0,2817,2406293,00.asp
  3. Intel® Core™2 Quad Processors: http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-8M-Cache-2_40-GHz-1066-MHz-FSB
  4. Multi-core Enterprise Technology at Dell®: http://www1.euro.dell.com/content/topics/topic.aspx/emea/topics/products/pedge/en/multi_core?c=uk&cs=ukbsdt1&l=en&s=bsd

Wk 3 – PCI Compliance

 

Assignment Content

  1. Your father has a private retail pharmacy in a small rural town. He accepts credit cards and holds customer information on a small database server. He wants to know if he should be concerned about PCI compliance, as well as HIPAA, and has asked you for a summary so he can decide if he wants to hire an outside consultant to help him comply with government regulations.

    Write a 3- to 4-page summary in Microsoft® Word of the important aspect of PCI and HIPAA regulations to help him make his decision. In your summary:

    • Accurately describe what PCI is and why it is important to a small business.
    • Explain why a small business needs to comply with PCI. Provide at least two reasons.
    • Outline the ramifications of noncompliance to a small business. Provide two examples.
    • Concisely describe who is covered under HIPAA.
    • List the information protected under HIPAA.
    • List the administrative requirements under HIPAA.
    • Cite all sources using APA guidelines. 

      Submit your assignment.

Technology Acceptance Model in Leadership context

This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

In this paper, address the following key concepts:

  1. Define TAM and the components.
  2. Note how TAM is impacting educational settings.
  3. Give an overview of the case study presented and the findings.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 3-5 pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts.

Cyber Crime Final Project

Final Project

*****

This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.

*****

The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below.  You can select one of these (first come/first serve) or submit your own.

Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.

*****

Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.

*****

The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:

– Project Description

– Project Goal/Objectives

– Details of Work Performed

– Outcomes

– Conclusion

Grading Rubric – 25 Points towards Final Grade:

– 15    points for Complexity of Project (High = 3, Medium = 2, Low = 1)

– 5    points for Report

– 5    points for Presentation

TOPIC:

(10) Image File Tampering

Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.

The project requires a brief paper and a power point document. 

Paper needs to be no more than 2 pages.

Need both assignments by 4pm Eastern. 11/17

Practical Connection Assignment Reflection

Practical Connection Assignment Reflection on INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING. 

How gained knowledge in INFORMATION TECHNOLOGY IMPORTANCE IN STRATEGIC PLANNING subject help you when you are working as a quality assurance analyst in the healthcare organization?

How you will apply what you learn to your current job?

Access Control- Crime Prevention Through Environmental Design (CPTED)

 

Topic:  Perform a Vulnerability Assessment of your place of employment or  living area. If you use your work area make sure you inform the Security  Manager to get permission as to what you are doing. If you live in a  gated community inform the security guard of your activities.

Instructions:  Please download the Assignment 1 Vulnerability Assessment template (MS  Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. (click here for link).

For this assignment: The  4 Heading-1s are required. Each Heading-1 must have at least 3  Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. Once completed name your file: YourName_Assignment_1_Vulnerability_Assessment.docx and  submit to the appropriate assignment folder. 

Resubmission: You may re-submit ONLY if your initial grade is a “C” (70%) or less.

Plagiarism: Zero marks for the first attempt and second attempt will result in failing the course

Assignment 1 Vulnerability Assessment Template.docx 

 

Also review the additional files attached for detailed information on Vulnerability Assessments.