Need help with a question
Project 4: Human Resources Insider Threat Guidelines
Project 4: Human Resources Insider Threat Guidelines
Step 9: Define Standards, Policies, and Guidelines
Before you can complete the Profile Matrix and develop solutions for your company, you will need to take a closer look at how standards, policies, and guidelines affect a company’s security posture. You probably already have questions about what policies were in place prior to the Childs incident. In this step, you dig deeper and learn more about the difference between standards, policies, and guidelines by creating a two- to three-page comparison report. Your report should answer the following questions:
- What is the difference between standards, policies, and guidelines?
- How do they relate to one another?
- How well do they work in securing networks and data within the organization?
- This report is particularly important because it will affect the recommendations you make to your boss regarding the case. You will use this report as Appendix C to your presentation.
Submit your Standards, Policies, and Guidelines Definition for feedback.
Submission for Standards, Policies, and Guidelines Definition
Assignment
Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. what do each of these terms refer to: copyright, patent, trademark, trade secret?
2. Why is intellectual property entitled to legal protection?
3. Why did copyright laws become stricter and more punishing in the late 20th century?
4. What is the Fair Use doctrine?
5. Make an argument for legalizing the copying of music or software.
6. Do I or don’t I own the books on my Kindle? If I own them, why can’t I transfer them? If I don’t own them, what is my legal right to them?
7. What was the 1984 Sony Supreme Court case about?
8. Was Napster responsible for the actions of its users?
9. Why did the court find in favor of Diamond in the Rio case?
10. What is Digital Rights Management?
Change Management and Dataflow Diagram
Assignment 1:
Research a scholarly paper or professional video on “Change Management” and reflect on only one (1) of the following topics:
- “Impact”: How is the impact of change management on projects?
- “CCB”: Who are the member of a change control board?
- “Management vs Control”: What is the difference between change management and change control?
NOTE:
This paper must be between 250-300 words on what caught your eye and reflect on what you read.
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.
Assignment 2:
Research a scholarly paper or professional video on “Data Flow Diagrams and Data Dictionaries” and reflect on only one (1) of the following topics:
- “Useful DFD”: When would a Data Flow Diagram be the most useful?
- “DFD Processes”: What processes are most likely to use DFDs?
- “Dictionaries”: Who is the audience for Data Dictionaries and how important is it for end-users to understand their data?
NOTE:
This paper must be between 250-300 words on what caught your eye and reflect on what you read.
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource.
have to pick a company
Describe how the interrogation process can be used to supplement your organizations collection plan.
reference videos- https://www.youtube.com/watch?v=3t4ngzvXZYg
https://www.youtube.com/watch?v=KfkOSYpMToo
https://www.youtube.com/watch?v=PuYJQsIJzhg
Exp19_Excel_Ch07_ML1_Admissions.xlsx
Need assignment completed in one hour.
Digital forensics
Describe the plain view doctrine, and why it has such a significant impact on digital forensics?
What are three approaches to determining whether the doctrine applies to a specific case.
350 words.
Directions
Directions:
Write C++ programs that use proper style and documentation
The purpose of this assignment is to assess if you can create a program that uses strings.
The file must be called stringProg.cpp
Main Method
1. Declare a string called myString.
2. Use Call-by-reference pass your string to a method called inputData(); (Hint: uses the &)
3. Use Call-by-value and pass your string to a method called outputData(); (Hint: does not use the &)
inputData Method (Receives string)
- Get input using cin >> into the string variable you received into this method. (I will be entering my full name in the format of: Last, First Middle.
- Using the string methods mentioned in this weeks lecture, have your program change the string to: First Middle Initial Last.
- I would like you to break the string you received apart into 3 separate variables: first, last, middle. (Hint: use find() to find the “,” and spaces and use substr() to extract the pieces)
- Use string concatenation to reassemble the string and overwrite the string you received with the new value.
- You must use each of the following string methods (at least once): substr(), length(), find(), insert(), erase().
- Notice the “,” is missing out of the name.
outputData Method (Receives string)
- Output the new string to the screen using cout <<.
- Comments are required, but pseudocode or flowchart are not.
- All Input/Output should be done using the standard C++ library string class.
- Include: system(“PAUSE”); after your output to pause the screen.
Provide documentation throughout the program. Ensure you include ALL files required to make your program compile and run. I would like to see your .cpp file and the .exe file that is inside your debug directory.
Logical Modeling Design & Relational Schema
work on the Logical Modeling Design and to specify the entries, columns and their relationship. Use an entity-relationship ER diagram to visualize the database.
Your schema should include some attributes that make it possible to include some transactions that involve aggregate functions. For example, a school schema would allow for queries to calculate enrollment in each section of the average enrollment in courses for a given department, or the total courses being taught by each instructor, etc. This should also make interesting constraints and triggers possible. Review this basic example of a requirements document and Conceptual Data Model.
Turn your ER diagram into a normalized relational database design for the (subset of the) domain (i.e. a set of tables, each with appropriate attributes, a primary key, and appropriate foreign keys. The database should be based on the ER diagram, but one-to-one and one-to-many relationships may be implemented by appropriate attirbutes in the “one” entity, rather than as separate tables. You relational database must be at least in 3NF. Remember to determine the cardinality of the relationships. You may want to decide on cardinality when you are creating an Entity–relationship diagram ERD relationship table.
see sample below
Access Project
PROJECT DESCRIPTION
Using Access, you will create a NEW database, including creating tables, queries, forms, reports, and advanced formatting tools.
Some sample Access ideas include (1) inventory of technology at work, (2) inventory of your home/possessions for insurance purposes, (3) a list of all contact information you have on others.
PROJECT REQUIREMENTS:
Our project MUST include the following:
1. Three tables that are linked (a minimum of 10 records per table).
2. Two types of queries.
3. Two types of forms.
4. Two types of reports.
5. Advanced formatting tools.
6. Organized, formatted, and professionally presented Access file, including grammar items (correct spelling, etc.).