Eassy(550 Words) APA format – 3 references

Write an essay of at least 500 words discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, or education, or science, medicine, finance, utilities, municipalities, etc.  Use an example from the news.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

700words: organizational culture and leadership

After reading the reference documents attached, 

  1. Discuss what power in the context of leadership is and how it relates to bullying within organizations.  Also note how this impacts productivity.
  2. Discuss what organizational culture is and how it impacts work productivity.  Also, note how organizational culture impacts the success of innovation implementation.
  3. How does culture impact leadership? Can culture be seen as a constraint on leadership?

ET WK10 Paper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • 4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Java Programming

 I have an assignment that is almost complete but there are some lines of code causing it not compile and I can’t get to any of the logic errors. I would like these fixed along with some explanation of what you did. You can put this is lines of comment and I can delete them later. 

The syntax errors I caught are as follows on the lines I see: Controller class: 167; Person class: 139, 143 (there was a third at the end but i got rid of an extra }) Several lines in the Controller class don’t have a syntax error but they probably are logic errors: 39, 42, 69, 74, 79, 82, 86, 108, 111, 127, 130, 150, 153, 159, 163. 

There could also be logic errors elsewhere. There may also be typographical errors as well because the professor has always had at least one. 

mid

 

You have been asked by management (manufacturing, healthcare, retail,  financial, and etc. ) to create a demo using a data analytic or BI  tool. It is your responsibility to download and produce outputs using  one of the tools. You will need to focus your results on the data set  you select.  

Ensure to address at least one topic covered in Chapters 1-5 with  the outputs. The paper should include the following as Header sections.

Introduction
History of Tool [Discuss the benefits and limitations] Review of the Data [What are you reviewing?] Exploring the Data with the tool
Classifications Basic Concepts and Decision Trees
Classifications Alternative Techniques
Summary of Results
References

Ensure to use the Author, YYYY APA citations with any outside content.

Types of Data Analytic Tools

https://www.octoparse.com/blog/top-30-big-data-tools-for-data-analysis/
Excel with Solver, but has limitations

R Studio
Tableau Public has a free trial
Microsoft Power BI
Search for others with trial options

Examples of Dataset

https://www.forbes.com/sites/bernardmarr/2016/02/12/big-data-35-brilliant-and-free-data-sources-for-2016/#4b3e96f1b54d

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 4

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not?

Chapter 5

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

Sarbanes-Oxley and

PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Policy and legal_8

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Using the Web or other resources, find out what your state's laws are regarding cyber stalking.

 

sing the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

Read and respond to at least two other students Discussions.

OVERVIEW

This week’s class covers Cyber Stalking, Fraud and Abuse

This week’s topics:

  • Review prior assignment
  • Investment and auction scams
  • Identity Theft
  • Cyber Stalking
  • Web browser security settings
  • Review the weekly reading and viewi assignments
  • Review this week’s lab discussionREQUIRED READINGSRead Chapter 3 of the Easttom text, Cyber Stalking, Fraud and Abuse.Primary topics:

You can take the state example as Delware