week 6

 Minimum 600 words

Students are required to create a portfolio related to an Ecommerce  Organization. You can select any type of Ecommerce based Organization.  Provide organization background, architectural landscape and products or  services being sold. Develop your balanced portfolio as per  instructions below.  Make sure to explain and backup your responses with  facts and examples. This assignment should be in APA format and have to  include references.

Assignement

 

Week 1 Assignment

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.
Complete your answers on a WORD Document.

security architecture 8

 

Read the attach paper “A survey of edge computing-based designs for IoT security” and write a comprehensive  summary/review of the paper as follows: 

  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free

NS3

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

new tech bus leaders

The Business Issue Facing

Company name: U of A XYZ hospital

An Evolving Business Landscape 

Health Care Consumers are becoming more aware that:

Medical Information belongs to them

Greater desire to access the information NOW

Information must be accessible to other providers within/outside of Network SECURELY

Geography should not be a barrier to access

Consumer Desire and Business Issue appear to be inter-related 

Using existing Hospital IT Systems to address Business Issue not enough

Must realize that hospitals are now either merging or consolidating for financial survival 

We are now forced into  a “Coopetition Model” to stay relatively independent

Blockchain can serve as a solution via “Honest Broker” Mechanism for Data Exchange

Yet, still allows U of A xyz Hospital to continue to use it’s internal EMR system w/o substantial institutional change

Requirement:

Need to prepare 7 slides on Associated Costs and Shared Risks

6 slides of information and 1 side is reference.

Research article:

Hasselgren, Kralevska. “Blockchain in Healthcare and Health sciences—A Scoping Review.” International journal of medical informatics (Shannon, Ireland) 134 (2020)

  Zhuang, Sheets. “A Patient-Centric Health Information Exchange Framework Using Blockchain Technology.” IEEE journal of biomedical and health informatics 24.8 (2020): 2169–2176

BI_Assignment_2

 

Complete the following assignment in one MS word document:

Chapter 2 – Exercises 4 and 15

Exercise 4:

In 2017, McKinsey & Company created a five part video titled “ Ask the AI Experts: What Advice Would you give to executives About AI” View the Video and summarize the advice given to the major issues discussed.

Exercise 15:

There are a few AI applications for tourism, such as Bold360 and AltexSoft, for dealing with customers and offering consultancy services. Discuss these in a report.

Include an APA cover page and include at least two APA formatted references

case study

Using Security Policies and Controls to Overcome Business Challenges

Learning Objectives and Outcomes

  • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
  • Identify four IT security controls for a given scenario.

Scenario

  • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
  • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements

Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Length: 1–2 pages

Discussion question

In this week’s reading, the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.