Please include an in-depth analysis of the causes of the breach, the impact of the breach, and what could have been done to avoid it. Most generally all of this is well documented online. Frequently the vulnerability is shared so that other businesses do not suffer the same consequences. The paper should be 3-5 pages long, double-spaced, 1″ margins
What are some of the important
What are some of the important considerations regarding DBMS/Database design? Explain why these considerations are important
Paper 500 words
Week 10 Paper
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA. Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. Write in essay format not in outline, bulleted, numbered or other list format. Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Assignment
2-3 pages
Please read chapters 4, 5 and 6 of your textbook and answer the following questions:
1) ) What are the seven steps of a computer security defense plan. review chapter 4. (50 points)
2) What are the Three Categories of Security Policies. List and briefly discuss each category. Review Chapter 5. (30 points)
3) What are the Responsibilities of Security Director? Review chapter 6. (20 points)
1. Review the following request from a customer: We have a need to reed it to. The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved.
1. Review the following request from a customer:
We have a need to replace the aging Signage Application. This application is housed in District 4 and serves the district as well as two other districts. We would like a new application that can be used statewide to track all information related to road signs. The current system is old and doesn’t do most of what we need it to. The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved. We also can’t create our own reports, on-demand, when we need to. Currently, data is entered into the application manually by Administrative Staff, but in the future, we would like to be able to take a picture of the road sign using a phone app, and have it automagically populate the database with geospatial location and other information. We thought about having a Smart Watch interface, but we don’t need that. Also, the current method does not have any way to manage the quality of the data that is entered, so there is a lot of garbage information there. There is no way to centrally manage security access, with the existing application. We want to get real time alerts when a sign gets knocked over in an accident and have a dashboard that shows where signs have been knocked over across the state. This is kind of important, but not super-critical. We need to store location information, types of signs, when a new sign is installed, who installed it, etc. We plan to provide the phone app to drivers in each district who will drive around, take pictures of the signs, and upload them to the database at the end of each day, or in realtime, if a data connection is available. Back in Central Office, reviewers will review the sign information and validate it. A report will be printed every month with the results and a map. There are probably other things, but we can’t think of anything else right now.
2. List the main goal(s) of this request
3. Write all the user stories you see (include value statements and acceptance criteria, if possible)
4. Prioritize the user stories as
a. Critical
b. Important
c. Useful
d. Out of Scope
5. Are the user stories sufficiently detailed? If not, what steps would you take to split them/further define them?
6. What are the known Data Entities?
7. Is there an implied business process? Draw an activity diagram or a flow chart of it
8. Who are the actors/roles?
9. What questions would you ask of the stakeholders to get more information?
10. What technology should be used to implement the solution?
11. What would you do next as the assigned Business Analyst working on an Agile team?
Project
Overview
This is the second of a series of five sequential assignments (the course project) in which you continue to act as the Chief Technology Officer (CTO) of a hypothetical, e-commerce start-up company of your design.
You have been tasked with delivering an information technology project plan in anticipation of the company relocating to a new facility. In the first course deliverable, you created a project plan inception document and supporting Gantt chart. This deliverable spelled out the company’s background information and business and provided an overview of the company’s information system infrastructure.
In this second course project deliverable, you are responsible for developing the business requirements to be incorporated into the information systems design you are creating.
Procuring quality business requirements is a critical step when designing quality information systems. Completing a quality requirements document captures user needs and expectations to facilitate the proper design of the company’s infrastructure and information systems.
This assignment consists of two parts:
Part 1: Business Requirements
You will develop a 5–7-page business requirements document for your hypothetical e-commerce company as part of the overall information systems project plan you are creating. Using the Business Requirements Template [DOCX], you will speculate on the company’s current and future requirements. Your assumptions need to be carefully considered and realistic.
Discussion post
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
Personal reflection
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
At least 6 works cited of which 2 must be peer- reviewed works/articles and no plagiarism at all.
The course we are talking about us is information security and Risk management and some topics we learn are:
Managing Risk: Threats, Vulnerabilities, and Exploits
Understanding and Maintaining Compliance
Developing a Risk Management Plan
Defining Risk Assessment Approaches
Identifying Assets and Activities to Be Protected
Identifying and Analyzing Threats, Vulnerabilities, and Exploits
Identifying and Analyzing Risk Mitigation Security Controls
Planning Risk Mitigation Throughout an Organization
Turning a Risk Assessment into a Risk Mitigation Plan
Mitigating Risk With a Business Impact Analysis
Mitigating Risk With a Business Continuity Plan
Mitigating Risk With a Disaster Recovery Plan
Mitigating Risk With a Computer Incident Response Team Plan
Bubble sort analysis with graph
In this assignment, you will write a program to test bubble sort average efficiency. You need to implement the bubble sort version which runs another pass over the numbers ONLY if the previous pass had at least one swap. You will not do another pass over the numbers if the last pass had no swaps. In such a case, you will return to the calling function the number of passes used to sort the numbers. The goal is to run bubble sort many times (1000 or 10,000) over a randomized set of elements, then graph the results using Excel to see the likelihood of only a few passes to sort the data. If the likelihood (probability) is very low, then the swap-based bubble sort may not be a good performed on average. Below is my graph from 4 runs of 10,000 bubble sorts of 50 numbers. Note the average is about 42 passes (49 passes is the maximum) Bubble Sort Analysis Graph 50 elements in array 4 program runs of 10,000 trials each
Cybersecurity
Begin by discussing about the lost of theft of a mobile device and how several security features can be used to locate the device or limit the damage. Many of these can be used through an installed third-party app. Use the Internet to identify four apps, two each for iOS and Android, and create a table that compares their features.Include a paragraph that outlines which app you would prefer for iOS and Android.
Now expand your discussion to include IoT, use the Internet to research the Internet of Things (IoT). In your own words, what is IoT? How is it being used today? How will it be used in the near future? What impact will IoT have on technology, society, and the economy over the next five years? What are its advantages and disadvantages? Finally, visit the IoT List site (iotlist.co or http://iotlineup.com/) and identify five of the most unusual IoT devices. Write a one-page paper on the information that you find.
Include your Table, paragraph outlining which app you would prefer for iOS and Android, and IoT discussion and findings.