Answer the questions below in 2-3 pages

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1, Business analytics logical data flow, from your textbook. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

The Role of Privacy in the Workplace

Conduct research via the internet and provide a brief yet detailed paper on Privacy in the Workplace. You may select a position as to whether you believe there should be Privacy in the Workplace, or that employees do not have the right to privacy at work. Things to take into consideration are outlined below:

 ·  What are the laws and regulations that impact privacy in the workplace?

 ·  Why would an employer want to monitor the activities of its employees?

 ·  What benefits / drawbacks are associated with monitoring employees?

 ·  What could an organization use to ensure that all employees are well aware of their rights and responsibilities with regard to privacy?

 ·  What type of monitoring systems are used in the workplace today?

For this assignment, submit a 5-6-page paper answering these questions as succinctly and completely as possible. 

Paper should conform to APA style. 

The page total does NOT include the title page or the reference page(s). 

Do not include an abstract of table of contents.

You should have a minimum of 4 references, none of which can be Wikipedia or Techopedia.

Your paper should be more of a narrative, and not just a series of bullet lists

AUtomated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code.

 
For this assignment, My task is to scan the WebGoat source code using the VCG SAST tool and verify the findings within the code. In particular, you will be be using VisualCodeGrepper, which is an open-source SAST tool running on Windows. It supports multiple programming languages(C++, C#, VB, PHP, Java, and PL/SQL).. Prepare a simple report based on OWASP Findings Report Guide, and submit the report in a PDF format   There should be a section summarizing all the findings by:

  1. Risk level
  2. OWASP Top 10 Threats

To install VCG and run your scans, follow these instructions:

  1. Download WebGoat 8.0 from GitHub in a zip format.
  2. Extract the zip file into a directory.
  3. Download VCG from the project page.
  4. Install VCG on a Windows machine. Consider the system requirements on the project page.

Project Part 2: Access Controls Procedure Guide Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 3 pages(Excluding References)

Self-Assessment Checklist

§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

Essay

 Write an essay of at least 500 words discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or other list formats.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your submission Do not use spinbot or other word replacement software. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Digital Forensics Tools&Tech week 11

 

Week Eleven Assignment

Using Chapter 10 as a reference, explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Bank network design and recomendation

  

Network Design and Architecture (4 pages)

The Network Design and Architecture section should include the following: 

The design and architecture will include network model drawings, descriptions, and justification of the design and architecture.

  • Infrastructure:
    • Describe the network architecture       that is suitable for this distributed network.
    • Include at least 1 visual       model of the system that identifies the major components.
    • Justify the physical design of the       system with reference to the requirements established in previous       sections of the proposal.
    • Summarize the estimated cost of the       network infrastructure.
  • Software:
    • Describe the software required for       the network.
    • Include the operating systems and       other software applications that are required to meet the functional and       operational requirements established in previous sections of the       proposal.
    • Summarize the estimated cost of the       network software.

Future Needs Analysis and Recommendations (3 pages)

  • Research current and future trends       in distributed networking.
  • Summarize at least three potential       changes in distributed networking that might affect your company.

Provide a modified design and architecture and discuss the changes from the original design proposal that would be required to support the new requirements 

Topic: [Revision] Data Structures and Algorithms

 Type of service

Academic paper writing

Type of assignment

Essay

Subject

IT & Technology

Pages / words

2 / 550

Academic level

Undergraduate

Paper format

Harvard

Line spacing

Double

Language style

UK English
Currently the paper explains nodes in detail, which is closer to my goal, however the assignment asks to design a data structure(s) suitable for the given scenario, and explain why it is good for that scenario. Here is the specification:
https://gyazo.com/00214761b67a4d34a4d832a716f8a575

I have attached the assignment document in full, but here is another link to the full document:
https://gofile.io/?c=E188so