Assignment

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

 

Required Books and Resources

 Business Intelligence and Analytics 

Impact of IT week 2

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to three of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

20210112

  

Data Base Security:

1) Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

2) Write an essay of at least 500 words discussing discussing IAM in a federated cloud application. 

3) Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

4) Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

5) Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

6) Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

7) Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

8)   Learning About Cookies as Spyware. Research what kind of information cookies store. You might find the following  websites helpful:

www.allaboutcookies.org/

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

Honor and Emotional Reactions

Honor and Emotional Reactions
Click here to read the APA ethical principles of psychologists and code of conduct.
Using the Online Library, search the article, “A Bumpy Train Ride: A Field Experiment on Insult, Honor, and Emotional Reactions.”
Pay special attention to the Method section. Summarize the purpose of the study. Think about the specific issues or points they should have covered in the debriefing session. Consider the APA ethical requirements. Write the specific things the investigators would have had to include during the debriefing session if the study had been conducted in the United States. Explain why the investigators would have to include these specific things. Compile your work in a 1- to 2-page Microsoft Word document.
Submission Details:
Support your responses with examples.
Cite any sources in APA format.
Name your document SU_PSY2061_W9_A1_LastName_FirstInitial
Submit your document to the Submissions Area by the due date assigned.

week 5

 By default, Docker containers are very secure. However, there are a number of ways you can add additional layers of security to harden your containers. For this week’s assignment, use the web and include at least four (4) different best practice techniques or additional security controls that can be used to secure containers. Include the action or control to be performed, why it’s important, how it works, what it will help to prevent, and how organizations will benefit from it.  You may include the commands or steps required to enable the control. Your assignment should be 3 pages in length, with two or more references in APA Format cited in your response. 

Physical Security

 

Topic: My father use to tell me that “locks keep honest people honest”. What do you think he meant by that? Is there any such thing as total security? Once you make your original post comment on a classmates post.

Instructions: Note that the requirement is to post your initial response no later than Friday and you must post one additional post during the week (end of Sunday). I recommend your initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.