Discussion1

Answer the following the question:

We live in a world of data, perhaps too much data. Organizations continue to store data indefinitely. In fact, about 90% of the data stored on todays databases is deemed worthless within 3 months. Think about your email. How often do you ever go back to an email from six months ago. But you still keep it for what? How should organizations government personal data in a data warehouse? What are some best practices you might suggest to your organization if you were the CIO to ensure that the data in the system was maintained properly?

Instructions

  • This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

EH week15 DB2

 

Hello,

i need this paper by 01/06 afternoon.

Strictly No plagiarism please use your own words.

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. 

The strategy around Zero Trust means that you should not trust anyone. This means cutting off all access until the network knows who you are. Don’t allow access to IP addresses, machines, etc. until you know who that user is and whether they’re authorized. 

Discussion/Research Questions (300 words)

  1. Briefly explain your views on what the zero trust architecture is attempting to solve? 
  2. How do you build a Zero Trust Architecture?

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

MF- group

  1. Research and then describe your company “Carnival Corporation” primary business activities. Include:
    1. A brief historical summary,
    2. A list of competitors,
    3. The company’s position within the industry,
    4. Recent developments within the company/industry,
    5. Future direction, and
    6. Other items of significance to your corporation.
  2. Include information from a variety of resources. For example:
    1. Consult the Form 10-K filed with the SEC.
    2. Review the Annual Report and especially the Letter to Shareholders
    3. Explore the corporate website.
    4. Select at least two significant news items from recent business periodicals
  3. Submit a written report that is 5-7 pages long. The report should be well written with a cover page, introduction, the body of the paper (with appropriate subheadings), conclusion, and reference page. References must be appropriately cited. Be sure to address all of the points in Section A above, using all of the resources listed in Section B. Format: Double-spaced, one-inch margins, using a 12-point Times New Roman font. Use APA format throughout.

Enterprise Risk Management

  1. Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
    In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

    • Introduction
    • Why should an organization Implement an ERM application?
    • What are some key challenges and solutions to Implementing an ERM?
    • What is Important for an effective ERM?
    • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
    • Conclusion, final thoughts for future research
    • Recommendation
    • Your paper should meet the following requirements:
    • Be approximately seven to ten pages in length, not including the required cover page and reference page.
    • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

CC-16

 

Write an essay of atleast 500 words on what you would like to learn for future study in Cloud Computing.

Write in essay format, not outline or bulleted.

Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.

Need it in 1 hour

  

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Course: Info Security & Risk Management

Job title: UI Developer