See Notes for Instructions
Access Control System
Access Control System
HR 1
Discuss the following questions and submit as an attachment in a 500 word APA formatted paper. 1. What is Blockchain? 2. What are Blockchain’s potential applications in human resource management, accounting, supply chain management, and government. You are required to cite thisweek’s assigned readings in your paper. You may also cite external sources if you wish. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References.
Data Breach
In 80 words or more answer the following. Consider the risk of availability of backups. Suppose your company has 100 users and each user has there own personal allotted amount of data under their user account that they can store on the network shared drive. This data can be accessed as long as they are using a computer on the network or are VPN’d in. No other user can access another users data. Suppose there is a breach or security issue that exposes all user data to be exposed and stolen. Which IT team monitors this data and how would they react to this breach?
database disaster recovery plan
database disaster recovery plan
Computation
Continue the preparation of the glossary; add a new Excel worksheet to the glossary file used last week (see video “Adding a Worksheet.mp4” for steps how to add a new worksheet). The new sheet will contain the following terms:
PowerPoint
Presentation
Animations
Theme
Transitions
Text boxes
Narrations
HTML
Slide
HTML elements
The new worksheet will continue the format from the previous week:
- Concept
- Translation
- Definition
- References
online discussion
- Beasley, M. S. (2016). What is Enterprise Risk Management? Retrieved from https://erm.ncsu.edu/az/erm/i/chan/library/What_is_Enterprise_Risk_Management.pdf
After reading both articles this week, and any other relevant research you locate, please discuss the following:
Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
Case Study and Lab work
Case Study 3.1
-Complete 3.4
Southwest Border Apprehensions and Unemployment
Write a Summary Analysis of the problems and answers
Writing Requirements
3-4 pages in length
APA formatting
LAB 3
Chapter 4
Problems 43 and 44 (Tableau table is optional , Create an excel chart in the line of the tableau chart
The Assignment must be an APA formatted paper with embedded excel files.
new tech bus leaders
Many enterprise organizations believe that cloud computing is essential to their business operations. There are some; however, that argue it is not cost efficient and operationally appropriate. Provide a use case where cloud computing is not appropriate and explain why you feel this is an appropriate decision for the enterprise.
Incident Detection
select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.
Please respond to the following in a post of 500 words:
- Distinguish between incident detection precursors and incident detection indicators.
- For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.