Network Security: Assignment2

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

Explain proper policy implementation steps and describe factors relating to its success.

 

Scenario

Two health care organizations have recently merged. The parent organization is a large medical clinic that is HIPAA compliant. The clinic recently acquired a remote medical clinic that provides a specialty service. The remote clinic is organized in a flat structure, but the parent organization is organized in a hierarchical structure with many departments and medical clinics. These organizations are in the process of aligning their operations. You are asked to make major refinements to the organization’s cell phone use policy immediately.

Assignment Requirements

Read the scenario carefully and then research examples of cell phone policies and implementation. Write a report citing examples of at least three successful cell phone policy implementations found in your research. Indicate how you would analyze your organization, and then how you would identify and finalize a cell phone use policy for the organization. In addition, provide a rationale as to what types of business challenges would be overcome or enhanced.

Required Resources

  • Access to the Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Times News Roman, 12-Point, Double-Space
  • Citation Style: Your school’s preferred style guide
  • Length: 1–2 pages

Self-Assessment Checklist

  • I wrote an academic paper clearly.
  • I provided an adequate analysis.
  • I provided at least three applicable policy implementations.

Discussion 2

 Please discuss the following topics and provide substantive comments to at least two other posts. Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter 2  (Jamsa, 2013).

Chapter 2 topics:

  • Define and describe SaaS.
  • Discuss a SaaS provider for each of the following: –Sales and customer relationship management
  • Accounting
  • Income tax filing
  • Web-Based Meetings
  • Human Resources
  • Payroll Processing
  • Backup Automation
  • Office Document Creation
  • Social Networking
  • Define and describe mashups.
  • List the advantages and disadvantages of SaaS solutions.
  • Describe the role of OpenSaaS.
  • Compare and contrast a web service and a SaaS solution.
  • Define and describe SOA.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

discussion

 

federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

 Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

MIS Discussion 14

 

Ethics and Information Management

Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please note that Wikipedia articles will not be accepted for this discussion.

1.    Write a comparative analysis of the articles noting the similarities and differences.

2.    Discuss what you learned from those articles. In your discussion, give example(s) of your organization handles ethic concerns as they relate to information management.