cc-9

 Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud. 

Discussion Emerging threats

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.

Assignment

 

1). Download and install the “R” Programming tool (CRAN) onto your computer. First install the “Basic” version of “R”, then (2) install the “R” Studio. (3). Download and install the MySQL plug-in for Excel onto your computer. (4). Download and install the Python programming tool onto your computer. Verify successful installation of all tools by attaching one screen shot of each that display your completion of each software installation. A total of  four screen shots (2 for “R”, 1 for MySQL, and 1 for Python) is expected. Save the screen shots as a MS Word document (*.docx).

Either click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename.). Also, please summarize in 1 -6 lines (in the Comment box) how the installation went for you. That is, what problems, if any, did you have and how were they solved?  What things went right for you during the installation?

wk 14

Prepare a 4 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

Organ Leader and decision making PHDIT

 

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Computer science

1.Enlist some commands of DDL, DML, and DCL.
2.Define DML Compiler.
3.What is DDL interpreter?
4.Enlist the advantages of SQL
5.Explain the terms ‘Record’, ‘Field’ and ‘Table’ in terms of database.

Discussion 2

 

The United States v. Dioguardi

428 F.2d 1033, 1038 (C.A.N.Y. 1970).

At least, a minimum standard of trustworthiness must be established to eliminate the theory of accuracy, the integrity of computer used to generate evidence, and the admissibility of such records in court. The original contents of free and fair evidence are deep-rooted in writing panache, recording, and photograph required by court standards to ensure that court decisions are based on reliable, and authentic evidence. The advent of photocopiers, scanners, related technology that can be used to create identical acceptable duplicates in place of the original and in the market.  A genuine question on the authenticity of the original and accuracy of a photocopy could be unfair to accept in place of the original. Presenting a copy of digital evidence is usually more desirable because it eliminates the risk that the original copy being unintentionally altered.

A paper printout of a digital document may be considered equivalent to the original unless essential portions of the original are not visible in printed format. Hearsay Digital evidence cannot be admitted in court if the author of the evidence is not present to verify and authenticate the evidence’s integrity. Computers is an electronic device can be programed to store and output information with limited human intervention; hence, the computer system can initiate the hosting, emitting errors and uncertainty in various ways in any location and at any time. Digital evidence is generally a suggestive of human activities; for example, the system clock on a computer can be incorrect, and date-time stamps can be misinterpreted. Furthermore, the source internet protocol (IP) address on network traffic may be assigned to a proxy device rather than the actual originating computer.

Scenario:   A genuine question on the authenticity of the original and accuracy of the photocopy of an evidence could be unfair to admit in place of the original copy.  Furthermore, presenting a photocopy of digital evidence is usually more desirable because it eliminates the risk of original being unintentionally altered. As an organization lead forensic investigator, which of this conclusive evidence will you present in court:

  1. Provide a comprehensive narrative on the importance of the original copy of the evidence in court?
  2. Provide a comprehensive narrative on the incongruity of a photocopy of evidence in place of the original copy in court?

Assignment on Cloud computing.

Minimum 900 words total excluding apa formatting:

1. Describe how cloud based data storage works

2. List the pros and cons of cloud based data storage

3. List the pros and cons of cloud based database

BSW11

 In 200 and 300 words

Do a bit of research on penetration testing techniques. Investigate and document the following

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration testing

BSW 11

In 250-300 words

 

You are the web master of a college website. You share a server with other school departments such as accounting and HR. create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.