essay

 In an essay (no more than 500 words) please discuss the following topic:

 

Describe your academic and career plans and any special interests that you are eager to pursue as an undergraduate in Informatics and Computing. If you encountered any unusual circumstances, challenges, or obstacles in completing your education, share those experiences and how you overcame them. 

 

3-4 paragraph

For this assignment, you are asked to conduct some Internet research on any malware, virus or DOS attack. Summarize your findings in 3-4 paragraphs and be sure to include a link to your reference source. Explain this occurrence in your own words (do not just copy and paste what you find on the Internet).

Include the following information:

1. Name of the Malware or Virus

2. When this incident occurred (date)

3. Impact it had or explanation of the damage it caused

4. How it was detected

5. Reference source citation

Cyber

 

Use a search engine to find the names of five different cyber viruses.

Using WORD, write a short paragraph on each.

Use your own words and do not copy  the work of another student.

Enterprise Risk Management – Research paper

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

cyber sec3 discuss

If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

appliancewarehouse case study 9

 

Hi J,

I hope you had a nice weekend! The database administrator has told me that he will have time next week to start building the database. In that case, I need for you to focus on the ERD and the database design this week.

When you start the ERD, be sure to focus on the entities previously employed when creating the DFD and Use Case Diagram. Think about all the major activities between each of these entities and determine the type of relationship between the entities. Remember, the best table relationships are 1:1 or 1:M. Use the M:N relationships sparingly.

Once you have created the ERD, you will be designing the tables for the database in 3NF.

If you have any questions, please let me know.

Carlie

_____

 

Hi J,

I wanted to further clarify the database requirement. As I previously stated, the database administrator needs the new database in 3NF. Each table should list all the necessary fields. You should have done some of this work when you created the user interface screens a few weeks ago. Highlight which field(s) is/are the primary key.

We need to get the field and table structures very soon. Let me know if you have any further questions.

Carlie

___

 

Hi J,

Once you have the database created, be sure to put in at least 3 records of “dummy” data in each of the tables. This way, we can better see the size and data types for each of the fields.

You should use some of the data in the data library as a guide for your sample data.

Thanks! Have a great weekend.

Carlie