Blockchain Economy

https://www.youtube.com/watch?v=KhPrxD1MgMs

In chapter 1, the author presents several use cases for blockchain technology. Describe the use case that aligns most closely with your current job role, including how blockchain technology would change things that you currently do in your job. If you are not working in a job role that aligns nicely with a use case presented in chapter 1, describe a job role that you would like to hold after finishing your degree program, and how blockchain technology may affect those job functions.   

All journals must follow the APA guidelines and be submitted with the following headings:

  • Title
  • Introduction 
  • Related Content
  • Conclusion
  • Reference list

Other notes:

  • The expected number of words is 450-550 words
  • Please follow the instructions for all assigned journals

Homework

Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats? (250 to 300 words)

PaPer

 1. Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

Write in essay format not in outline, bulleted, numbered, or other list formats.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

COMPUTER SECURITY FUNDAMENTALS – ASSG

 

After reading the assigned chapter please answer the following questions. Make sure you ask a question and answer another student question as well.

1) How is personal information safeguarded? Provides some standard procedures mainly used by businesses to safegaurd their data. 2) What are the vulnerabilities? Provides some examples. 3) What do we mean by secured system? Name some of the best practices for securing your personal computer.

Please, with 300 words plus, elaborate on each of these attacks and provide genuine examples and with supporting facts. 

To Ensure Getting a Full-Grade, check the Rubric as I will be using it to grade you!!!

DATABASES QUESTIONS

QUESTION 1

 Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure P6.1 into a dependency diagram that is in at least 3NF. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image047.jpg

  Make sure that the file is saved as ch6_problem1_deleon.doc

———————————————————————————————————

QUESTION 2 

 Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure P6.2 into a dependency diagram that is in at least 3NF. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image049.jpg

  Make sure that the file is saved as ch6_problem2_deleon.doc

———————————————————————————————————

QUESTION 3

 Using the INVOICE table structure shown in Table P6.3, do the following:
SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image051.jpg

 a. Write the relational schema, draw its dependency diagram, and identify all dependencies, including all partial and transitive dependencies. You can assume that the table does not contain repeating groups and that an invoice number references more than one product. (Hint: This table uses a composite primary key.)

b. Remove all partial dependencies, write the relational schema, and draw the new dependency diagrams. Identify the normal forms for each table structure you created.

Note: You can assume that any given product is supplied by a single vendor, but a vendor can supply many products. Therefore, it is proper to conclude that the following dependency exists:

PROD_NUM S PROD_lABEl, PROD_PRICE, vEND_CODE, vEND_NAME

(Hint: Your actions should produce three dependency diagrams.)

c. Remove all transitive dependencies, write the relational schema, and draw the new dependency diagrams. Also identify the normal forms for each table structure you created.

d. Draw the Crow’s Foot ERD. 

 Make sure that the file is saved as ch6_problem3_deleon.doc

———————————————————————————————————

QUESTION 4

 Using the STUDENT table structure shown in Table P6.4, do the following:

a. Write the relational schema and draw its dependency diagram. Identify all dependencies, including all transitive dependencies.

b. Write the relational schema and draw the dependency diagram to meet the 3NF requirements to the greatest practical extent possible. If you believe that practical considerations dictate using a 2NF structure, explain why your decision to retain 2NF is appropriate. If necessary, add or modify attributes to create appropriate determinants and to adhere to the naming conventions.

c. Using the results of Problem 4, draw the Crow’s Foot ERD. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image053.jpg

Make sure that the file is saved as ch6_problem4_deleon.doc

———————————————————————————————————

QUESTION 5

 To keep track of office furniture, computers, printers, and other office equipment, the FOUNDIT Company uses the table structure shown in Table P6.5. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image054.gif

 a. Given that information, write the relational schema and draw the dependency diagram. Make sure that you label the transitive and/or partial dependencies.

b. Write the relational schema and create a set of dependency diagrams that meet 3NF requirements. Rename attributes to meet the naming conventions, and create new entities and attributes as necessary.

c. Draw the Crow’s Foot ERD. 

Make sure that the file is saved as ch6_problem5_deleon.doc

———————————————————————————————————

QUESTION 6

 The table structure shown in Table P6.6 contains many unsatisfactory components and characteristics. For example, there are several multivalued attributes, naming conventions are violated, and some attributes are not atomic. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image057.jpg

 a. Given the structure shown in Table P6.6, write the relational schema and draw its dependency diagram. Label all transitive and/or partial dependencies.

b. Draw the dependency diagrams that are in 3NF. (Hint: You might have to create a few new attributes. Also make sure that the new dependency diagrams contain attributes that meet proper design criteria; that is, make sure there are no multivalued attributes, that the naming conventions are met, and so on.)

c. Draw the relational diagram.

d. Draw the Crow’s Foot ERD. 

Make sure that the file is saved as ch6_problem6_deleon.doc

———————————————————————————————————

QUESTION 7

 

Suppose you are given the following business rules to form the basis for a database design. The database must enable the manager of a company dinner club to mail invitations to the club’s members, to plan the meals, to keep track of who attends the dinners, and so on.

  • Each dinner serves many members, and each member may attend many dinners.
  • A member receives many invitations, and each invitation is mailed to many members.
  • A dinner is based on a single entree, but an entree may be used as the basis for many dinners. For example, a dinner may be composed of a fish entree, rice, and corn, or the dinner may be composed of a fish entree, a baked potato, and string beans.

Because the manager is not a database expert, the first attempt at creating the database uses the structure shown in Table P6.7.

a. Given the table structure illustrated in Table P6.7, write the relational schema and draw its dependency diagram. Label all transitive and/or partial dependencies. (Hint: This structure uses a composite primary key.) 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image059.jpg

 b. Break up the dependency diagram you drew in Problem 7a to produce dependency diagrams that are in 3NF, and write the relational schema. (Hint: You might have to create a few new attributes. Also, make sure that the new dependency diagrams contain attributes that meet proper design criteria; that is, make sure there are no multivalued attributes, that the naming conventions are met, and so on.)

c. Using the results of Problem 7b, draw the Crow’s Foot ERD. 

Make sure that the file is saved as ch6_problem7_deleon.doc

———————————————————————————————————

QUESTION 8

 Use the dependency diagram shown in Figure P6.8 to work the following problems.

a. Break up the dependency diagram shown in Figure P6.8 to create two new dependency diagrams: one in 3NF and one in 2NF.

b. Modify the dependency diagrams you created in Problem 8a to produce a set of dependency diagrams that are in 3NF. (Hint: One of your dependency diagrams should be in 3NF but not in BCNF.)

c. Modify the dependency diagrams you created in Problem 8b to produce a collection of dependency diagrams that are in 3NF and BCNF. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image061.jpg

Make sure that the file is saved as ch6_problem8_deleon.doc

———————————————————————————————————

QUESTION 9

 Suppose you have been given the table structure and data shown in Table P6.9, which was imported from an Excel spreadsheet. The data reflects that a professor can have multiple advisees, can serve on multiple committees, and can edit more than one journal. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image063.jpg

 Given the information in Table P6.9:

a. Draw the dependency diagram.

b. Identify the multivalued dependencies.

c. Create the dependency diagrams to yield a set of table structures in 3NF.

d. Eliminate the multivalued dependencies by converting the affected table structures to 4NF.

e. Draw the Crow’s Foot ERD to reflect the dependency diagrams you drew in Problem 9c. (Note: You might have to create additional attributes to define the proper PKs and FKs. Make sure that all of your attributes conform to the naming conventions.) 

Make sure that the file is saved as ch6_problem9_deleon.doc

———————————————————————————————————

QUESTION 10

 The manager of a consulting firm has asked you to evaluate a database that contains the table structure shown in Table P6.10.

Table P6.10 was created to enable the manager to match clients with consultants. The objective is to match a client within a given region with a consultant in that region and to make sure that the client’s need for specific consulting services is properly matched to the consultant’s expertise. For example, if the client needs help with database design and is located in the Southeast, the objective is to make a match with a consultant who is located in the Southeast and whose expertise is in database design. (Although the consulting company manager tries to match consultant and client locations to minimize travel expense, it is not always possible to do so.) The following basic business rules are maintained:

  • Each client is located in one region.
  • A region can contain many clients.
  • Each consultant can work on many contracts.

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image065.jpg

 

  • Each contract might require the services of many consultants.
  • A client can sign more than one contract, but each contract is signed by only one client.
  • Each contract might cover multiple consulting classifications. For example, a contract may list consulting services in database design and networking.
  • Each consultant is located in one region.
  • A region can contain many consultants.
  • Each consultant has one or more areas of expertise (class). For example, a consultant might be classified as an expert in both database design and networking.
  • Each area of expertise (class) can have many consultants. For example, the consulting company might employ many consultants who are networking experts.

a. Given this brief description of the requirements and the business rules, write the relational schema and draw the dependency diagram for the preceding (and very poor) table structure. Label all transitive and/or partial dependencies.

b. Break up the dependency diagram you drew in Problem 10a to produce dependency diagrams that are in 3NF and write the relational schema. (Hint: You might have to create a few new attributes. Also make sure that the new dependency diagrams contain attributes that meet proper design criteria; that is, make sure there are no multivalued attributes, that the naming conventions are met, and so on.)

c. Using the results of Problem 10b, draw the Crow’s Foot ERD.
 

Make sure that the file is saved as ch6_problem10_deleon.doc

———————————————————————————————————

QUESTION 11

 Given the sample records in the CHARTER table shown in Table P6.11, do the following:

a. Write the relational schema and draw the dependency diagram for the table structure. Make sure that you label all dependencies. CHAR_PAX indicates the number of passengers carried. The CHAR_MILES entry is based on round-trip miles, including pickup points. (Hint: Look at the data values to determine the nature of the relationships. For example, note that employee Melton has flown two charter trips as pilot and one trip as copilot.)

b. Decompose the dependency diagram you drew to solve Problem 11a to create table structures that are in 3NF and write the relational schema.

c. Draw the Crow’s Foot ERD to reflect the properly decomposed dependency diagrams you created in Problem 11b. Make sure the ERD yields a database that can track all of the data shown in Problem 11. Show all entities, relationships, connectivities, optionalities, and cardinalities. 

SEE ATTACHED: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image067.jpg

Make sure that the file is saved as ch6_problem11_deleon.doc

———————————————————————————————————

Quiz IT electronic documents management

1-The HIPAA Security Rule protects:

verbal data

electronic data

written data

All of the above

2-According to HIPAA, PHI does NOT include:

IP addresses

Patient’s past medical treatment information

Payments for  health care provision

Health information with the identifiers removed

3-Which of the following access control mechanisms used to prevent employees from copying a document labeled with high security to another document labeled with ‘public’?

Firewall

Zones

Encryption

Archive

4-It would be appropriate to release patient information to:

the patient’s (non-attending) physician brother

personnel from the hospital the patient transferred from 2 days ago, who is calling to check on the patient

the respiratory therapy personnel doing an ordered procedure

retired physician who is a friend of the family

5-Healthcare providers must ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI) that the covered entity creates, receives, maintains, or transmits under:

HIPAA

EHR

FCRA

FERPA

6-The mission of the law is to protect consumers’ personal financial information held by financial institutions

PCAOB

PHR

HIPAA

GLB

7-Which of the following statements about retention principles is true?

Organizations should keep business records as long as possible.

We only need to manage the records that are in use.

How long the records should be kept depends on  the legal requirements and business needs.

Due to the security consideration, organizations should retain records longer than required.

8-Red flag rule requires that financial institutions:

must implement a written Identity Theft prevention Program

must comply with PCI standards

notify the customer that they may be a victim of identity theft

All of the above

9-Restricting access to the IT Department office of a hospital would fall under which type of safeguard required by the Security Rule of HIPAA?

electronic

technical

physical

administrative

10-According to Omnibus Final Rule, which of the following statements are correct?

If one EMR software vendor needs access to PHI, it would need to complete a BAA.

Business associates does not include entity that  maintain PHI.

A BAA is required for the US Postal Service.

Cloud service providers for EMR storage and backup are not liable for compliance with the HIPAA privacy rule.

11-Which of the following is not part of the PII definition established by GAPP:

Address

Credit card number

Student ID

Medical information

12-This term refers to the security practice where no one has more access than is needed to do their job

Auditing

Least privilege

Authentication

CIA Triangle

13-The law “to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to securities laws, and for other purposes.”

CIA

PCI

SOX

SEC

14-Being able to recover records after a disaster:

Effectiveness

Efficiency

Competency

Continuity

15-Law that requires a free credit report annually

FACTA

Red Flag Rule

FERPA

FCRA

16-Any list, description, or other grouping of consumers (and publicly available information pertaining to them) derived using any personally identifiable financial information that is not publicly available

PII

NPI

FTC

PIN

17-Which of the following is specific to the health care industry?

PII

Non-public financial information

Student academic record

PHI

18-The statutory requirement that public companies submit quarterly and annual reports is promulgated by which agency:

FBI

SEC

CIA

CICA

19-Disposition is not part of the records management lifecycle.

True.

False.

20-In the CIA Triangle, the letters  refer to what:

Confidentiality, Integrity, and Availability

Central Intelligence Agency

Confidentiality, Intrusion, and Availability

Cybersecurity In Action