Prompt analysis research paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper

 

  • Section 1: Statement of the Problem and it’s Setting (Citations are required)
  • Section 2: Hypotheses and/or Guiding Questions
  • Section 3: Assumptions
  • Section 4: Delimitations and Limitations
  • Section 5: Importance of the Study
  • Section 6: Review of the Literature
  • Section 7: Outline of the Proposed Study (Steps to be taken, timeline, etc.)
  • Section 7: References 

Risk Management Framework

 

Unit 3 DB: Risk Management Framework

Unit 3 DB: Risk Management FrameworkAs the CISO, you are heading a newly assembled project team to focus on securing the PCS Corporate network. You have selected the NIST Risk Management Framework (RMF) as the basis of your program due to the large number of government contracts you support. Your first tasking is to analyze the system and determine what security requirements are appropriate.Consider the six phases of the Risk Management Framework and how each phase adds value to securing the corporate network. Make a case for the phase that PCS should spend the most time and resources in accomplishing. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other ideas presented by the RMF team. 

Discussion with 500 words

 

Explain in 500 words or more what NIST Is and how it should be used by a dba.  

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.  

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

Data and System Security & Computer and Information Networking

 

NoSQL database system simulation or different systems comparison report( need it in 2 pages)

Ref websites:

https://www.mongodb.com/nosql-explained

https://bigdata-madesimple.com/18-free-and-widely-used-open-source-nosql-databases/

Cover page with Short introduction of what kind of tools used and the possible simulation process (with screen shot), and short comparison/discussion, final concluding

  • MongoDB. This highly scalable and agile NoSQL database is an amazing performing system. …
  • Redis. This is an open source, key-value store of an advanced level. …
  • Couch DB
  • RavenDB. …
  • MemcacheDB
  • Riak
  • Neo4j
  • HBASE

Just choose one, have a simulation and write the simulated report, must including lab screen in your report

Note: If you cannot do it, please do some articles reviewing for NoSQL, such as Comparison between different NoSQLs

Research Paper: Develop a Computer/Internet Security Policy

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.Your paper should meet the following requirements:

  • Be approximately 2 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Policy Review and Modification

 

ou are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 6: Develop the Policy Review and Modification section of your ISP

In this week’s Lab you will develop the review and modification policy portion of your ISP to ensure it is a ‘living document’. This must include:

· At least an annual review

· Identification of who is responsible for making updates and revisions

· Detail concerning where these updates are published and how employees can access them

Remember that every company is in a constant state of change and your network infrastructure is constantly evolving. The risks that you face today are not the risks that you will encounter next year nor are they the same as those you have encountered in years past. It is crucial that you routinely review and update the company’s information security plan as threats change as well as the company.