CY d9

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.(300 words)

Discussion

 

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

  •  (please cite properly in APA)

essay

 

 Choose one of the aphorisms listed above.  Who first wrote/spoke the aphorism or where does it originate?  What does the aphorism mean?  What is the author’s truth?  Why do you agree or disagree with the aphorism and how if at all has it made you rethink what you thought about the topic before researching the aphorism?  How could you apply this “wisdom” to your life?     

2. “If you want a friend get a dog.”  

3. “It takes 20 years to become an overnight success.”  

4. “Nothing is certain but death and taxes.”  

5. “This too shall pass.”  

6. “Trust but verify.”  

7. “Genius is one percent inspiration and 99 percent perspiration.”  

8. “Failure to prepare is preparing to fail .”  

9. “If you want something done right do it yourself.”  

10. “There’s nothing new under the sun.”  

11. “Simplicity is the ultimate sophistication.”  

12. “Less is more.”  

13. “Buy land.  They’re not making it anymore.”  

14. “Misery loves company.”  

15. “Be careful what you ask for.  You might get it.”  

16. “Work smart, not hard.”  

17. “To everything there is a season and a time for every purpose under heaven…”  

18. “Brevity is the soul of wit.”  

19. “A rose by any other name smells as sweet.”  

20. “Carpe diem.”  

 For composition exercises two and three please write: 1. (format) a 500-word composition.  Use Courier New, 12-point font and double space.   

2. (content) Your composition needs a main idea, major points and specific details.  Respond to the topic/aphorism in your first paragraph.  Present your main idea in the first paragraph.  Then use the rest of your 500-word limit to support your main idea.  You must cite from the material you’ve read to support your ideas. As Abraham Lincoln wrote, “It is a pleasure to be able to quote lines to fit any occasion.”  Use two-three quotes from the sources in your composition to “fit” your interpretation of the aphorism.  

3. (focus) Stay focused on the topic.  Everything you write should have a connection to the topic and your main idea.   

4. (clarity) When you proofread check for common errors like fragments, run-on’s, commonly confused words, tense shift, subject-verb disagreement, spelling, etc.  Try to adhere to the KISS Principle.  Keep your sentences short and simple and divide your composition into paragraphs.

Essay

 Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

ETCM-Research-1

Four to six pages in length (1200-1800 words), not including the required abstract, cover page and reference page.

APA format (Remember, APA is double spaced)) , citation are key. (No Need of replies.)This is a research paper not discussion. 

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Attached the textbook below

Dynamic programming with MySQL and PHP

 

This assignment involves dynamic programming with MySQL and PHP (ch 18 and 19 Internet and world wide web 5th edition). The main activities you need to implement is to create a database connected web application. In this project, you will do listing, deletion, and insertion to a table in a MySQL database. This link http://mycoursework.mywebcommunity.org/p3/ shows a solution for this project using Student table (also a video is attached) In your project, you will use another table of your choice.

Project Description: Choose a data table similar to Student table. You cannot use Student table for this project. The data table could be about anything you want, such as movie, book, business, companies, song, cars, etc. Create this table in your MySQL database. You can use phpMyAdmin or your can use MySQL command. The data table will have at least 10 rows, and 5 columns. Note that my example of Student has 14 rows, and 6 columns.

Second step is implementations of the web applications in five steps:

#1 Implement a html page as index.html. This is main (landing) page listing all four operations (list, list with condition, search, insert).

Requirements about search box (#4): This is a form action without new line. The form action method is POST.

Hint:

#2 This is first link of index.html to list your data in a different .php page. You should list at least three column of the table. The data will be shown in html table. I listed SID, Fname, Lname in Student example in a table (

). Also, you should have “Delete” link to delete a row. This delete method should be implemented as “GET” method.

Hint: Delete

After listing all record, give a message saying how many records found in the data table, such as “14 student(s) records found.”

#3 Implement a .php page to demonstrate a conditional listing, such as Student from TX. You may choose any condition on your data, such as customers in Canada, products more expensive than $10, movies produced in 2010, etc.

#4 Implement a search box as a list item as demonstrated in video.

#5 Implement a .html / .php combination to insert new record to data table. The html (data collection) page should mandate at least there fields, as demonstrated in the video

Hint: HTML 5 support required keyword, such as  

All sub-pages should include a link to main / landing page.

Please use the link given above as a sample solution. And give me all project files (html, css, php),

Cybersecurity

 For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

No Plagiarism 

attribution theory and how it influences the implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing

Big Data Science Analytics

Your team will select a big data analytics project that is introduced to an organization of your choice … please address the following items: 

(a) Provide a background of the company chosen. 

(b) Determine the problems or opportunities that that this project will solve. What is the value of the project? 

(c) Describe the impact of the problem. In other words, is the organization suffering financial losses? Are there opportunities that are not exploited? 

(d) Provide a clear description regarding the metrics your team will use to measure performance. Please include a discussion pertaining to the key performance indicators (KPIs). 

(e) Recommend a big data tool that will help you solve your problem or exploit the opportunity, such as Hadoop, Cloudera, MongoDB, or Hive. 

(f) Evaluate the data requirements. Here are questions to consider: What type of data is needed? Where can you find the data? How can the data be collected? How can you verify the integrity of the data? 

(g) Discuss the gaps that you will need to bridge. Will you need help from vendors to do this work? Is it necessary to secure the services of other subject matter experts (SMEs)? 

(h) What type of project management approach will you use this initiative? Agile? Waterfall? Hybrid? Please provide a justification for the selected approach. 

(i) Provide a summary and conclusion. 

(j) Your written paper must have at least 10 reputable sources and 10-to-15-pages. 

(k) Please write the paper in APA Style

Provide an outline of the work to be performed. You can submit in MS Word or PPT. Please make sure to include company name, background, and how the work will be divided with the names of team members. You may start on the written paper. 

 Written Paper: The requirements for the written paper are provided above. Please note that each team member must have a deliverable. Please ensure that you avoid any plagiarism issues. Include name of team member and Student ID for the section they completed.  

Hands-On Project 1-1

In cyberspace, people can take on different identities and sometimes act in ways they normally would not if their physical presence were required. God created humans not just with souls but with bodies that were declared “good.”

  1. Complete the Hands-On Project 1-1 from the text (Examine Data Breaches). Document how the loss of government computers and PDAs can have an effect on confidentiality, availability, and integrity of the data stored on these devices.
  2. In a 250- to 500-word essay, explain how you can utilize your digital privacy rights as intended to be used from Christian perspective. Consider the legal and ethical side of your digital privacy rights.