IT 476 week 3

Discussion Questions:

1- What is referential integrity in a relational model?

2- Create an ERD for the following relation (see image below)?

Hint: The entities are PERSON, PERSONCREDITCARD, and PERSONPHONE.

The attributes for the above entities are the column headings below respectively.

Information Security Compliance

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

1. What is IT Security Auditing? What does it involve?

2. Why are Governance and Compliance Important?

3. Explain in details the roles and responsibilities in an organization associated with the following:

    Risk Manager

    Auditor

    Executive Manager

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.

MondoDB Database

Identify and explain the core modules of Hadoop.

Install MongoDB database on your local PC. Create a table with five columns and add ten rows. Write the SQL queries to provide create, read, update, and delete (CRUD) records to this table. Feel free to use any MongoDB database management IDE open source.

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

Professional Consulting in IS – Project Idea and description with project timeline

BIT 595: Professional Consulting in IS

** Minimum 1-2 page with details about Project Idea which include a brief description of your idea and project timeline. **

Mostly it will be complete design. 

Project Idea and Approval

1. Discuss your preliminary ideas with course professor.

Your project idea is your responsibility. Ideas may come from coursework; class or team discussions; your workplace; past experiences; needs identified; or prototypes developed to solve remembered problems.

2. Submit your project idea by end of second week of the semester. This must include a brief description of your idea and project timeline. The project timeline includes the processes involved in meeting the course objectives. Project approval will come from your professor.

The final Project Requirements is as below

In the Professional Consulting in IS course you must:

1. design, plan and/or implement an IS project demonstrating the skills and knowledge learned in the MSIS coursework,

2. prepare a structured written report describing that project and deliverables,

3. make a formal presentation to the MSIS faculty, and

4. submit the approved report to the course professor.

Ethical Hacking week 3

 

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.A reference citation is also required for this assignment. You may just include a link to your article.

cyberscecurity culture

 

examine rules governing the protection of human when participating in research, and to look at and explain the cybersecurity culture

  • Explain the cybersecurity culture
  • Describe and explain the IRB process
  • Identify technologies to log, monitor and audit networks and systems