Research Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.Your paper should meet the following requirements:

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper and Discussion

Discussion:

 

he readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Research Paper:

 Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

roles

One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

Part 1

Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

Use the following column headings:

  • Title
  • Role
  • Responsibilities

Use the following row headings:

  • Chief Executive Officer (CEO)
  • Chief Operations Officer (COO)
  • Chief Financial Officer (CFO)
  • Chief Information Officer (CIO)
  • Chief Information Security Officer (CISO)
  • Senior Security Manager
  • Information Security Architect
  • Information Security Engineer
  • Information Security Auditor
  • Information Security Analyst
  • Security Technician/Specialist
Part 2

Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:

  • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
  • Recommend an information security control framework.
  • Logically explain how an information security control framework benefits a business.
  • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.

Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

Format all citations according to APA guidelines.

Submit your assignment.

Block chain technology

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used? 

Requires 2 pages and references 

Discussio

What are some recruiting methods you could use? What are some of the issues which must be taken into consideration in recruiting? 

500 words with references needed.

Write a C++ program that asks

  

Write a C++ program that asks the user for the number girl scouts in their troop and the number of weeks they sold boxes of cookies.The program should collect the following information using nested for loops:•The first name of each girl scout.•The number of boxes of cookies sold each week by each girl scout.The program should calculate and display the following information:•The total boxes of cookies sold by each girl scout.•The total boxes of cookies sold by the entire troop.•The average boxes sold per week by the troop.•The name of the girl scout who sold the most cookies.Cookie Counter ProgramLab 7 –More LoopingSample Program Output on the next page.Make sure to include the following input validation:•Validate that the number of girl scouts is greater than zero.•Validate that the number of weeks sold is greater than zero.•Display an error message if either condition above occurs.

Ethical Hacking week 10

Conduct your own social engineering experiments.1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.Write your findings in either a list or in paragraph form. 

It is time to complete your sales tracker application

  

It is time to complete your sales tracker application. Your marketing department would like the current dollar amount of goods sold this year to be calculated. Total of the goods sold is the combined total of supplies, services, and paper sold, for all sales accounts. This information will be used to promote the success of the company.
Your application needs to be modified to allow all sales personnel to enter their sales data.
For each sales personnel in the company, complete the following:
F1: Accept a sales person’s entry for the dollar amount of office supplies sold, books sold, and apparel sold.
The sum of these three categories will be the total of their supplies sold.
F2: Accept a sales person’s entry for the number of hours of service hours sold and rate per hour.
F3: Accept a sales person’s entry for the number of pounds of paper sold and the price per pound.
Displays the total current sales to date in all 3 categories for the sales person: supplies, books, and paper.
Modify the application to display the total aggregate sales for all sales personnel combined.
Example: Total sales for 2010: $12,500,552
Your application will use the Accounts inheritance hierarchy designed previously to compute the total of goods sold.
There are three types of sales accounts that track sales for your company:
Supplies
Services
Paper.
Each has their own formula for computing the current sales:
Supplies = office supplies sold dollar amount + books sold dollar amount + apparel sold dollar amount
Services = number of hours * rate per hour
Paper = number of pounds * price per pound

Project part 1

  

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and provide an introduction to the      plan by explaining its purpose and importance. 
  2. Create an outline for the completed risk      management plan. 
  3. Define the scope and boundaries of the      plan. 
  4. Research and summarize compliance laws and      regulations that pertain to the organization. 
  5. Identify the key roles and      responsibilities of individuals and departments within the organization as      they pertain to risk management. 
  6. Develop a proposed schedule for the risk      management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

  

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

  

  

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point,      double-space
  • Citation Style: Your school’s preferred style      guide
  • Minimum 2 pages per task