COMPUTER SECURITY_Week 11

Read Chapter 10 of the Easttom text, Security Policies

Primary topics:

  • Recognizing the importance of security policies
  • Understanding the various policies and the rationale for them.
  • Knowing what elements go into good policies
  • Creating policies for network administration.Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

End search 3

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?

3000 words

Computer Crime

Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. The term computer crime encompasses a very broad range of criminal acts. Explain in detail the four categories of computer crime. Use examples to support your explanations.

Lab 12 Flowcharting

 

  • Follow the instructions in the Word document
  • Download the “Flow Chart Assignment” file
  • Flowchart the processes using Word and its available shapes
  • You can view a tutorial for creating flowcharts here:https://www.youtube.com/watch?v=0VR7iBImDB4&feature=youtu.be
  • Refer to figure 11-4 in your book for help on this assignment
  • Use only the symbols listed on figure 11-4
  • Upload the finished flow charts to Canvas for grading

Previous
 

DQ

How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.

bharg discussion

 

The rising importance of big-data computing stems from advances in many different technologies.  Some of these include:

  • Sensors
  • Computer networks
  • Data storage
  • Cluster computer systems
  • Cloud computing facilities
  • Data analysis algorithms

How does these technologies play a role in global computing and big data?

Data Base – Assignment

 

Research on the Internet each of the following topics: 

  1. Explore NoSQL database alternatives.
  • Document
  • Key-Value
  • Object
  • Graph 
  1.  Reporting and analytical databases.
  • Big Data
  • Datamart
  • OLAP vs. OLTP 

Select one topic from the four topics listed for your paper: 

  1. Database models for Big Data
  2. Alternatives to the Relational Database Model (describe at least four)
  3. Relational Database Models and data needs that support their use
  4. Database models for multimedia
  5. You may choose your own database-related topic if you get your instructor’s approval 

Your paper should be 3–5 pages, double-spaced, and in 12-point font. Be sure to provide an introduction and conclusion, and use appropriate section headers. Your paper should be free of spelling and grammar errors, well-written in Standard English, include a reference page and in-text citations, and be formatted in APA.