Regulatory Compliance

Describe in 400 words the shared security responsibility model that a dba must be aware of  when moving to the cloud.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Discussion 8

Explain the impact of private equity firm acquisition of manufacturing and retail firms. 

minimum 250 words APA format with references 

week 6

 Minimum 600 words

Students are required to create a portfolio related to an Ecommerce  Organization. You can select any type of Ecommerce based Organization.  Provide organization background, architectural landscape and products or  services being sold. Develop your balanced portfolio as per  instructions below.  Make sure to explain and backup your responses with  facts and examples. This assignment should be in APA format and have to  include references.

Assignement

 

Week 1 Assignment

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.
Complete your answers on a WORD Document.

security architecture 8

 

Read the attach paper “A survey of edge computing-based designs for IoT security” and write a comprehensive  summary/review of the paper as follows: 

  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free

NS3

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

new tech bus leaders

The Business Issue Facing

Company name: U of A XYZ hospital

An Evolving Business Landscape 

Health Care Consumers are becoming more aware that:

Medical Information belongs to them

Greater desire to access the information NOW

Information must be accessible to other providers within/outside of Network SECURELY

Geography should not be a barrier to access

Consumer Desire and Business Issue appear to be inter-related 

Using existing Hospital IT Systems to address Business Issue not enough

Must realize that hospitals are now either merging or consolidating for financial survival 

We are now forced into  a “Coopetition Model” to stay relatively independent

Blockchain can serve as a solution via “Honest Broker” Mechanism for Data Exchange

Yet, still allows U of A xyz Hospital to continue to use it’s internal EMR system w/o substantial institutional change

Requirement:

Need to prepare 7 slides on Associated Costs and Shared Risks

6 slides of information and 1 side is reference.

Research article:

Hasselgren, Kralevska. “Blockchain in Healthcare and Health sciences—A Scoping Review.” International journal of medical informatics (Shannon, Ireland) 134 (2020)

  Zhuang, Sheets. “A Patient-Centric Health Information Exchange Framework Using Blockchain Technology.” IEEE journal of biomedical and health informatics 24.8 (2020): 2169–2176