Review APA criteria and Lab 3 Document. Please read the document carefully and answer all the questions from Document HW 3.
Assignment( information governance ) – P1
Please follow the instructions in the document first (attached). ****************
Each milestone is a separate writing assignment
First Assignment – 1 (Introduction, summary )
For this piece of that assignment, you will write the introduction to your final portfolio project (1-2 pages), comprehensively describing the industry you are choosing to use in the paper and preliminary challenges with information governance that you have identified. Be sure to utilize 2-3 sources from the UC Library.
The scenario is in the attached document.
Expectations are that it will be a scholarly work, using largely peer-reviewed resources, formatted to APA 7 style. Grammar, spelling, and punctuation are significantly weighted.
No Plagiarism*********
rs
OSINT Open Source Intelligence
Students are asked to perform reconnaissance on a website using open source tools. During the assignment you are asked to detail the following:
What investigation method are you using and why?
What type of information do you hope to obtain using each of the methods?
In case you cannot find the information you are looking for, please try to
describe briefly why this information could be important to you…
Please provide a description of tools and search methods you have been using
e.g. search queries, configuration options, etc. – the amount of information provided should be sufficient for others to reproduce your results.
When conducting your analysis using Open Source Intelligence (OSINT), please try to establish the following:
information about IP address ranges related to the organization
DNS enumeration
List of internal email addresses
software used by the organization
Previous breaches
Any vulnerabilities which may be present in the IT infrastructure
Assess if the organization was subject to the data breach of any other cybercrime.
IP Address range (check if active with ping)
Email Server (match to pastebin.com)
Operating System Type (use finger)
Hosting Provider
Staff member’s Phone Numbers, personal details, email addresses
Removed web pages use Google cache
Scenario
You have just joined a Dublin-based cyber-security company and you are about to assist one of the engineers with the preparation of a security audit for a client who requires an OSINT report on their company. You have been asked to establish what digital footprint, important to security audit, can be obtained using an open-source intelligence technique.
Choose one from the following two target company websites below:
www.supermacs.ie or www.apache.ie
Hint: As a starting point you could.
Use the following tools in Windows:
Ping
Tracert
Nslookup , (switches) mx, ptr, ns, A, txt
Dnslookup
Use the following tools in Kali Linux:
NMAP
DIG
Nikto
Whois
netcraR
—————————————————————————
In your findings you should detail how you acquired your informaion, what tools you used and why, and detail what information you deem as important.
Your work should use appropriate academic referencing/crediting of supporting research materials and resources.
1. Provide 1 essay for the “Application Essay for the 2019 Selection Process” “To meet the goals of ending extreme poverty and boosting shared prosperity, the World Bank must work with countries to help them achieve their development priorities. Doing so
1. Provide 1 essay for the “Application Essay for the 2019 Selection Process”
“To meet the goals of ending extreme poverty and boosting shared prosperity, the World Bank must work with countries to help them achieve their development priorities. Doing so will take financial resources, certainly. But it also requires data, evidence, and knowledge on how to best use those resources for development gains. It demands a long-term commitment to see those investments through, from conception to completion.
The World Bank brings all of these elements—financing, knowledge, experience, and commitment—to each of its partnerships with countries that aspire to grow their economies and provide greater opportunities for their people. As an institution with 189 member countries, we have an unmatched global reach that gives us the ability to work across countries and continents. We use our convening power to amplify the voices of developing countries by bringing together international, national, and local leaders with stakeholders to share knowledge, leverage relationships, and partner for solutions. We provide a wide array of financial products, technical assistance, and support for countries to apply global knowledge to the challenges they face. By working with countries to implement development projects over the long term, we help to ensure that growth is not only attainable but sustainable as well.
Three priorities guide our work with countries: accelerating sustainable and inclusive economic growth; investing in people to build human capital; and fostering resilience to global shocks and threats. Working across interconnected sectors, with an increasing array of diverse partners, we aim to improve the economic prospects of countries and people around the world.” (Extract from the 2017 World Bank Annual Report)
Given this context, describe in fewer than 1000 words, how would you contribute to the meet the WBG goals of ending extreme poverty and boosting shared prosperity? (1000 words)
2. Furthermore Do some Research And Deliver some some capacity of development, and strategy steps by steps on how to Power Africa, Feed Africa, Integrate Africa, Industrialize Africa and Improve the life of the people of Africa (2000 words ).
1. Pages on strategy on how to power Africa (example converting waste into energy etc…
2. Integrate Africa.
3. Feed Africa.
4. Industrialize Africa and Improve the life of the people of Africa
And here is the link of the programs i’m applying for.
http://www.worldbank.org/en/about/careers/programs…
https://www.afdb.org/en/about-us/careers/employmen…
Database Management Systems
https://iopscience.iop.org/article/10.1088/1757-899X/995/1/012012/pdf
Article Review. 2 pages
Data science
Textbook: Introduction to Data Mining
Select one key concept until Chapter 5 from the textbook and answer the following:
- Define the concept.
- Note its importance to data science.
- Discuss corresponding concepts that are of importance to the selected concept.
- Note a project where this concept would be used.
Please include introduction and conclusion. The paper should be between 2-3 pages and formatted using APA 7 format. Two peer reviewed sources should be utilized to connect your thoughts to current published works.
Computerized Medical Office Management (MEA2346CG1-101102022)
What are the pros and cons of using an EHR system in a medical practice? Would the benefits vary depending on the size of the practice? How might an EHR system benefit patients and the practice?Reference
Help with Microsoft Access problem 2
For the Week 3 Microsoft Access Module 2 Lab Assignment, you create queries using a starter database. Use skills/techniques/concepts learned in the Microsoft Access Module 2. HINT: The finished Lab Assignment should include: 2 tables, 12 queries, 2 forms, and 2 reports.
Problem: The manager of the Milledgeville, Georgia, science museum gift shop has come up with a variety of questions he wants to answer using the database. You are to find the answers to these questions.
Perform the following tasks:
- Open the following starter database (Week 3 Microsoft Access Module 2 Lab Assignment), save the database as LastnameFirstnameAccessLab2.accdb.
- Create a query for the Item table that includes all fields and all records in the Item table. Save the query as Step 1 Query.
- Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code fields for all records where the vendor code is BW. Save the query as Step 2 Query.
- Create a query for the Item table that includes the Item Number and Description fields for all items where the description starts with G. Save the query as Step 3 Query.
- Create a query for the Item table that includes the Item Number and Description for all items with a Wholesale Cost greater than $15.00. Save the query as Step 4 Query.
- Create a query for the Item table that includes the Item Number, Description, and Wholesale Cost fields for all items with a Wholesale Cost between $5.00 and $10.00. Save the query as Step 5 Query.
- Create a query for the Item table that includes the Item Number, Description, On Hand, and Wholesale Cost fields for all items where the number on hand is less than 5 and the wholesale cost is less than $15.00. Save the query as Step 6 Query.
- Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Vendor Code for all items that have a Wholesale Cost greater than $20.00 or a Vendor Code of FD. Save the query as Step 7 Query.
- Create a query that joins the Vendor and the Item tables. Include the Vendor Code and Vendor Name from the Vendor table and the Item Number, Description, Wholesale Cost, and Retail Price fields from the Item table. Sort the query in ascending order by Description within Vendor Code. Save the query as Vendor-Item Query.
- Create a form for the Vendor-Item Query. Save the form as Vendor-Item Form.
- Create a report that uses the Vendor-Item Query but does not use all the fields in the query. Include Vendor Name, Description, Wholesale, and Retail. Save the report as Vendor-Item Report.
- Create a query for the Item table that includes the Item Number, Description, Wholesale Cost, and Retail Price. Calculate the difference between Retail Price and Wholesale Cost (Retail Price – Wholesale Cost). Assign the alias Mark Up to the calculated field. Save the query as Step 11 Query.
- Create a query for the Item table that displays the average Wholesale Cost and the average Retail Price of all items. Save the query as Step 12 Query.
- Create a query for the Item table that displays the Item Number, Description, On Hand, and Retail Price for the 5 items with the lowest retail price. Save the query as Step 13 Query.
- Update the author (use your name) and title (use ‘Week 3 Microsoft Access Module 2 Lab Assignment’) in the document properties.
Upload your assignment as a Microsoft Access database using the following naming protocol: LastnameFirstnameAccessLab2.accdb
Assignment
You are required to write at least five substantive pages.
Select one American financial institution that frames your research. Describe the organization, its business(es), its scope, and any additional descriptive information that will inform your reader about your subject matter. Describe and define at least one of the laws focused on compliance within the financial sector that came up during our course. Research the law itself, any legal cases that were based on that law, and the critique of the law that you found through your research. Of course, if your selected financial institution was involved in such litigation, or has published their critique, include that information too. In addition to compliance laws that directly target financial institutions, countless other laws apply to them. Use the U.S. Patent and Trademark Office’s website to discover whether your selected institution has been awarded intellectual property rights for their trademarks, patents, or IP. Describe whether and how it protects its trade secrets. Describe for your reader some of the most prominent criminal or tort risks that your entity faces; or perhaps has been involved in. In addition to risks in the realms of criminal or tort law, every organization faces the potential risk of enduring a cyberattack or other incident that must be followed by a forensics investigation. Keeping the focus on your organization and the financial sector, research and discuss an incident or case in which such an institution was compelled to go through the forensic investigation process. There are no sectors exempt from those incidents or cases, regrettably, so be diligent and you will find one to discuss. Conclude the Portfolio with your overall assessment of whether the legal system compliance mandates, to IT, criminal, and tort laws, to forensic investigations — from — benefits, hurts, or otherwise affects the organization. Assume the role of information security and privacy risk consultant in this section.
