Cloud Computing and Digital Forensics

1.) Describe in 500 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Use the  Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. Use 200-300 words.

Week 7: Informational Interview

Program and Career Exploration in Technology

 PACE 111T 6365 Program and Career Exploration in Technology (2208)Part 1 (recommend completing during Week 5)

In Part 1 of this activity, you will complete the following tasks: 

  • Watch “How to Do an Informational Interview.”
  • Select your prospective interview candidate. See below for guidance on identifying a suitable interviewee.
  • Gather professional/biographical details about your prospective interview subject.
  • Request an interview by email, by phone, or in person. If you’re going to send your request by email, review these email templates for suggested wording. Consider CC’ing me on the request.

To identify a suitable interview subject, find professionals in your career you would like to explore. Think about tapping these sources:

  • Check with your personal and professional networks and professors to connect you with professionals in your field of interest.
  • Check within Community Connect within CareerQuest or the UMUC/UMGC Alumni LinkedIn group for access to potential alumni and mentors. 
  • Consider members within student or professional organizations you have joined or would like to join. 

There are no restrictions on your interviewee’s location. CareerQuest has a video chat feature you can use if you connect with your subject through that platform. 

After you explore your interviewee options, request the interview. Reach out in a timely manner, as many professionals have demanding schedules and may not be available right away. It is also wise to consider having more than one potential interview candidate, in case your first choice doesn’t pan out.

As you prepare for your interview, bear in mind these tips: 

  • Maintain a professional demeanor, both in writing and orally.
  • Draft a list of questions in advance.
  • Schedule the interview for no longer than 20 minutes.

Part 2 (recommend completing during Week 6)

Prepare for your interview well in advance. In Part 2 of this activity, you will prepare for and conduct your informational interview by completing the following tasks: 

  • Determine the logistics of your interview. Will you meet in person? Via video chat or web conference (Zoom, Google Hangouts, FaceTime, Skype, etc.)? An interview in real time is preferable, but if you and your subject are unable to arrange that, you can use email.
  • Draft your interview questions. See below for guidance.
  • Conduct the interview.

Here are some questions you might consider: 

  • What sparked your interest in this career field? 
  • What does a typical day entail in your line of work? 
  • What do you like most about your career field? 
  • What are some challenges you face in this career choice? 
  • How do you handle your work-life balance? 
  • What suggestions do you have for someone who is interested in this field? 
  • Who else do you recommend I talk to? 

Part 3 (due by the end of Week 7)

After your interview, summarize your notes in two or three paragraphs. Include the name of the interviewee, a short biography describing his or her professional background and experiences, and a brief synopsis of your interview details/highlights. Be sure to include a list of the questions you asked during the interview. You may find this template helpful.  This documentation is due by the end of Week 7.

Week 7: Informational InterviewWeek 7: Informational Interview Due October 6 at 11:59 PM 

week-12-ft

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week Seven Discussion Topic Question:

  

Chapter 7 in the textbook discusses the different approaches of communication in change management. After reading the chapter, refer to the contingency approach features in communication. Offer a summary of the feature and discuss its role in organizational change. How can this change communication approach can aid in facilitating a change effort?

CYS-13-D

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 300 words

Practical Connection Paper

 

Assignment 2 – Practical Connection Paper

Develop a paper describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share how you could leverage the knowledge gained working as an IT consultant working for an organization of your choice.

Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.

Please refer to the attached text books for the 

Assignment

 For this assignment, create a continuous improvement plan for the Cloud.  If you would like, you may use the continuous improvement plan example as a template.   

Web Development Browser Compatibility Issues and Mobile Device Development one page paragraph

 You should be REPORTING EVIDENCE and EXAMPLES from what you read. Find, Read, and Share – THREE related sources of information 

Report – Three things about the topic that you want to remember forever

  1. Identify the topic for this week.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Safe Harbor Provisions

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

http://blog.securitymetrics.com/2014/05/hipaa-faq.html

https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/

https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465

https://www.medscape.org/viewarticle/810563_2

https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750