Wk 1 – Apply: SQL Injection Outline

Assignment Content

  1. Imagine you have been asked to work at your organization’s booth at a high school career fair. You and other members of the IT security team must be ready to discuss important topics in IT security with the students on the topic you have been assigned. Your assigned topic is SQL injection attacks. 

    Write a 1- to 2-page outline of your talking points for the career fair in which you: 

    • Define SQL injection.
    • Identify common SQL injection attacks and explain what each attack does.
    • Identify SQL injection detection techniques.
    • Identify countermeasures to SQL injection.
    • Describe the effectiveness of the SQL injection countermeasures you identified.
    • Note: Be sure to consider your audience as you prepare your outline. Your descriptions must be accurate and easily understood by the audience. Make sure you explain any technical jargon in plain terms too. Examples may be especially helpful. 

      Format any references according to APA guidelines.

Advanced Modularization

  Overview: In this assignment, you will be analyzing the cumulative summing, the different number of parameters that can be passed to a method, and the design methods with no parameters. Instructions: Answer the following questions: 1. Describe how you create and use a method with multiple parameters. 2. Explain what happens when you call a method and the method ends. 3. Discuss the cumulative summing relationship. 4. List the four things you need to know when you call a method from a program or other method. 5. Modularized furniture comes with sections that can be assembled in a variety of configurations. What other everyday items are modularized? 6. As a professional programmer, you might never write an entire program. Instead, you might be asked to write specific modules that are destined to become part of a larger system. Is this appealing to you? 

ITS-530 – Analyzing & Visualizing Data – Paper

Homework:

Review The Power of Good Design- https://www.vitsoe.com/gb/about/good-design   and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First, note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve the problem.  Ensure the problem is simple enough to complete within a two-page document. For example, I need to purchase a house and want to know what my options are given x amount of dollars and x location based on a sample of data from Zillow within each location. 

Ensure there is data visualization in the homework and note how it relates to the three principles selected.

Parts of this assignment:

Part 1:  Review the 3 Principles that you are going to use.

Part 2:  Discussion of the Problem.

Part 3:  The dataset (where you got the data)

Part 4:  Explain how you can solve the problem

Part 5:  Make sure you have a data visual (you can create the visual with R-Language)

Note: plagiarism check required, APA7 format, include References, within 8hrs

Database Security

 13.

Explain in 450 words or more what NIST Is and how it should be used by a dba.  .

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in text format not in bulleted, numbered or other list format

14.

 Write an text of at least 450 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context.  

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in text format not in bulleted, numbered or other list format. 

IG Wk13

2 full pages – 550 words 

From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

 

Reading Assignments

Reading Assignments Textbook(ATTACHED):  Chapter 17 – Long-Term Digital Preservation

Park, S. H., Zhang, Y., & Keister, L. A. (2020). Governance Innovations in Emerging Markets. Academy of Management Perspectives, 34(2), 226–239. https://doi.org/10.5465/amp.2017.0177

P. C. Franks, “Government use of cloud-based long term digital preservation as a service: An exploratory study,” 2015 Digital Heritage, Granada, 2015, pp. 371-374, https://doi.org/10.1109/DigitalHeritage.2015.7419526.

Pike, E. R. (2020). Defending Data: Toward Ethical Protections and Comprehensive Data Governance. Emory Law Journal, 69(4), 687–743.

Zwarich, N., & Park, E. G. (2017). Toward E-Mail Governance: Policies and Practices in the Government of Canada. Canadian Journal of Information & Library Sciences, 41(3), 169–185