Duscussion

 

Conduct independent research to find a targeted recruiting strategy. Then answer the following:

  • Describe the strategy.
  • Who does it target?
  • Does it work?

Also share other recruiting strategies you personally think are worth using.

  • Please describe them
  • Share why you think they work

Cite sources.

one page excluding citations

 

People email on a daily basis. There are policies at work places regarding privacy of your email. Look into a few items.  You only need to address ONE of them in detail; however, you are free to address more.

  • Email privacy in the EU
  • What happens during a digital forensics investigation?
  • How does it apply to social media, Instant Messenger, TIKTOK, etcBe sure to respond to two of your classmates once you post yours.

Module 6 Case Project 11-2

A mother calls you to report that her 15yearold daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of e-mails in her inbox suggesting she has run away to be with a 35-yearold woman. Her daughter has also made related posts on Snapchat. Write a brief report on how you should proceed. 

Please only use online references. Do not use books or journals 

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

 

Week Seven | Preventive Controls 2 – Data Obfuscation, Redaction & Tokenization

Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. Make your initial post by Thursday 11:59 pm EST. Respond to two of your classmates by Sunday 11:59 pm EST.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

OVERVIEW

This week we will be examining the benefits of redaction, tokenization, and patch management in the protection of data.

REQUIRED VIDEOS

https://www.youtube.com/watch?v=sWjic4xMHbM

https://www.youtube.com/watch?v=VDVhWro8to0

https://www.youtube.com/watch?v=iVeenkfa-0s

https://www.youtube.com/watch?v=Z77twyRQ5mY

https://www.youtube.com/watch?v=Xycb5wyTL4k

https://www.youtube.com/watch?v=QuMCvkqZbCQ

https://www.youtube.com/watch?v=avRkRuQsZ6M

Briefly respond to all the following questions

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Discussion 14

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 16-17 (Jamsa, 2013).

Chapter 16 topics:

  • Define and describe total cost of ownership. List at least 10 items to consider when determining a data center’s total cost of ownership.
  • Define and describe a capital expense. How are capital expenses different from operational expenses?
  • Define and describe economies of scale and provide a cloud-based example.
  • Define and describe “right sizing” as it pertains to cloud computing.
  • Define Moore’s law and discus how it might influence cloud migration.
  • Given company revenues of $2.5 million and expenses of $2.1 million, calculate the company’s profit and profit margin.

Chapter 17 topics:

  • Compare and contrast functional and nonfunctional requirements and provide an example of each.
  • Discuss why a designer should avoid selecting an implementation platform for as long as possible during the design process.
  • Discuss various trade-offs a designer may need to make with respect to nonfunctional requirements.
  • Discuss why the system maintenance phase is often the most expensive phase of the software development life cycle.

Chapter 18 topics:

  • Using Google App Engine, create a page that displays the following Python script:
    • print “Content-type: text/htmlnn”
    • print “Cloud Computing, Chapter 18“

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

project 3

 

Class Discussion Topics

prepare 2 slide powerpoint for each question with diagram too 

  1. Discuss the pros and cons of the memory management schemes presented in this chapter. If given an option, which scheme would you implement and why?
  2. Discuss the difference between associative memory and cache memory and the steps involved in using these types of memory.
Projects

write 2 page paper for each question 

  1. Choose an operating system and submit a report on approaches to manage its virtual memory.  
  2. Working in teams of four, write pseudocode for the first-in-first-out (FIFO) and least-recently-used (LRU) page replacement policies.