SQL file (with 10 questions) attached. Remote access to database required.
Operational Compliance
Operational security compliance is a necessity in any working cybersecurity environment, as it sets the standard for policy, rule, and guideline regulation. Therein, it is necessary for security professionals to grasp the fundamental aspects of operational compliance, if they are expected to be able to manage day-to-day operations that require a different level of compliance throughout a given organization.
Students will create a web portal data flow diagram of their hypothetical organization’s operational environment using Visio or a similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must:
- Display the organization’s technical requirements (related and unrelated applications, services and links).
- Display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth.
- Identify related systems and assets, regulatory requirements, and overall risk approach.
- Demonstrate each IT task to the next as aligned to regulations/compliance. For example, start with the user logging in, and then go through each step and how it is validated.
APA style is not required, but solid academic writing is expected.
Refer to “CYB-650 Operational Compliance Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
Help3
Using MS PowerPoint, create a 7- to 10-slide presentation to communicate the goals and objectives of the security program described in your “Enterprise Security Program” assignment to the fictitious company previously selected.
The presentation must include:
- An appropriate cover slide and title that represents the company and the purpose of the presentation.
- Design elements from your “Enterprise Security Program” assignment.( Help2)
- Implementation Timelines: Use a phased approach for the various characteristics described (see “ITT-430: Security Program Roadmap Timeline Example”). (SEE ATTACHMENT)
- Roles and Responsibilities: List the titles and/or departments responsible for the implementation and management of each characteristic.
- Include in your presentation all security controls that have been deployed (e.g., polices, cryptographic protocols, etc.) in your enterprise security program.
- Describe the maintenance that is necessary to ensure effective and efficient information technology (IT) system performance and security within your enterprise security program.
- Analyze any security failures, and identify specific design principles that would be violated for incorrectly deployed security controls.
- Additionally, review the previous assignment’s controls, laws, and standards established to supplement the presentation.
write data visualization analysis
see require
Computer science
Discussion:
What is thought? Discuss.
Materials:
Brains, Minds, and Machines: Language and Thought – YouTube [https://www.youtube.com/watch?v=86vCvV4s5xU]
What Is a Thought? | Psychology Today[https://www.psychologytoday.com/us/blog/consciousness-and-the-brain/201202/what-is-thought]
Home work: Types of Memories
Question 1Application of Amdahl’s Law:Answer the following two questions and show your work:
- What is the overall speedup if you make 15% of a program 85 times faster?
- What is the overall speedup if you make 85% of a program 15 times faster
Question 2Consider a dynamic RAM that must be given a refresh cycle 64 times per ms. Each refresh operation requires 150 ns; a memory cycle requires 250 ns. What percentage of the memory’s total operating time must be given to refreshes? Explain your answer and show your calculations.Question 3List and briefly define three newer nonvolatile solid-state memory technologies.Question 4What is the difference between DRAM and SRAM in terms of application? What is the difference between DRAM and SRAM in terms of characteristics such as speed, size, and cost?
strategic Communication
The CEO has now asked you to develop an official piece of communication to distribute to employees about the implementation of a company-wide ethical framework. Strategize how you will include all employees at all levels in the development of the solution. You will need to address how employees in IT and in the company will be part of the solution. You will need to discuss the type of guidance that will be given to employees, how they will communicate with you and your team, how revisions will be done, what, if any, auditing tools could be used and any other areas that you think might be relevant.
Finally, the CEO would like a very high level deployment and integration timeline for implementation of the new policy and code of ethics. At this stage, it can be some implementation steps and an estimated timeline.
The finished product should be a comprehensive memo, including references, directed to the board of directors and CEO.
Be sure to review the content on the Course Project Overview page to gather all necessary information.
Interactive Computer Graphics -9
Weekly Assignment/Discussions via Unicheck:
Fun assignment:
Find a rotating cube with texture mapping. Show the original file, then replace the texture (picture) with one of your own – your picture.
Discuss the assignment in the “discussion assignment.”
Discussion 14- Project Risk
hapter 16: Strategic Risk Management
Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.
Also, provide a graduate-level response to each of the following questions:
- How can the success of an organizatio,ns risk management be measured?
- How can the success of an organization’s level of project quality be measured?
[Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]
Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13
Discussion post
Topics:
1. How operating systems control access to resources.
2.Network threats and vulnerabilities.
I want a 300-word discussion post for each of the above topics with references
Note: The matter should be like own words
No plagiarism
APA format