Database design and ER Modeling

Please see attachment before proceeding with directions below.

                                                           

Case Assignment

Entity-Relationship Modeling 

  1. Fill in the column headings in row one of each table (Customer,  Employee, and Sales Order) with the data items (attributes) you believe  belong in the table.
  2. Draw an ER diagram for the three tables: Customer, Employee, and Sales Order.
    Suppose  the Sales Order Table also contains information for an employee who  makes a sale. If you have an ERD drawing tool such as Visio, you could  draw the diagram using the tool and copy it into your document. You  could also draw it on paper, scan it, and insert it into your document.  If you can’t do either of the above, you could write down the table  schemata and describe the relationships among them.
  3. Submit the document. Make certain the table title, course number, and module and Case ID are on the work you submit.
  4. Describe the major points you learned in the readings especially on  entity relationship modeling and what lessons you have learned in this  exercise. (at least half a page).

Please note that you will need to study the background materials for your assignment.

Assignment Expectations

You are required to:

  • Design tables based on domain requirements.
  • Represent database design using ERD.
  • Communicate effectively with the readers of your report.

Data analysis

Develop an APA-formatted paper that presents a detailed analysis and research-based information pertaining to ALL the following topics:

  • Describe the two key abilities brought by the data discovery technology.
  • List and explain types of data flaws and techniques and methodologies used to mitigate the risks that may be introduced by the flaws of the data and make data more meaningful to organizations.
  • List and demonstrate the types of the data applicable to different industries by looking at successful case studies of well-known organizations.

CAPS

 

Similar to playbooks, runbooks are more specific to systems and networks and best defined as a tactical method of completing a task. They are a series of steps needed to complete some process for a known end goal. Examples include “Restarting the web services on frontend servers” to “Deploying the newest build of staging application.” 

Runbooks can define the exact steps to make that action repeatable and usable as a programmatic approach to problem-solving. A well-written runbook not only lowers the difficulty of execution and ensures repeatability but also has the end goal of automating the action, making the runbook itself no longer necessary. 

The board of directors found your presentation on playbooks very informative and has asked you to create another presentation on runbooks that would be utilized as part of the incident response plan for the following 3 attacks: 

  • Credential Compromise 
  • Code Injection in Website 
  • DDoS Attack 

To complete this, you should create a 12 -slide presentation with speaker notes and media such as images, video, or tables that will be presented to the board of directors. Specifically, your presentation should do the following:  

  • Explain the importance of using runbooks to risk management. 
  • Summarize the risks of the 3 threats listed above and the recommendation of the remediation plan presented in the labs associated with SQL Injection, Website Compromise, and Exploitation of Windows 7 Workstations.
  • Summarize incident response plans for each of the 3 attack scenarios listed above.
  • Justify NIST implementation, including an explanation of why it is the best option rather than another quicker and easier process.
  • Identify additional tools and systems that might reduce or mitigate the risk of the 3 identified threats.  
  • Assess potential violations to user privacy from these attacks as well as the implications from going through the steps in the runbooks. 
  • Assess ethical implications of these attacks. 
  • Recommend ethical and privacy standards as they relate to any of the steps or tasks.

Include a title page, purpose statement for the presentation, and a reference slide.  

Sum-Wk-7

Assignment 1

Using the attached zip file “Legal Compliance” as reference.

Provide a reflection of at least 600-700 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 600-700 words. Cover sheets, abstracts, graphs, and references do not count.

· Add references separately for each assignment question.

· Strictly follow APA style. Follow multiple paragraphs. 

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Assignment 2

Please describe what components of cryptography impacted you the most.
 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheets, abstracts, graphs, and references do not count.

· Add references separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment Question

Review the Grading Rubric before completing this assignment.Research a scholarly paper or professional video on Gathering Requirements” and reflect on only one of the following:

  • “Business vs Functional”: How is the difference between a Business Requirement and Functional Requirement? 
  • “Structure”: How is a Requirement written? 
  • “Interactive Methods”: Which of the following is more beneficial: interviewing, questionnaires, sampling, document analysis, observation, or text analytics?
  • “CCB”: What is a Change Control Board?

NOTE:
You must copy and paste the topic of the question at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.

rp

Review The Power of Good Design and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 
Ensure there is data visualization in the homework and note how it relates to the three principles selected.

GSR—8.1 Practical Connection Assignment

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.

Assignment:   
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:   
Provide a 500 word (or 2 pages double spaced) minimum reflection.   
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.   
Share a personal connection that identifies specific knowledge and theories from this course.   
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.    
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.