Coding a system for an ecommerce websie
Discussion and Problem Set
Need Help:
Discussion :
– APA Format
– 2 Scholarly References.
Problem Set:
– APA Format
– 2 Scholarly References.
discussion-3
Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.
Identify one cryptographic attack and how you can protect against it.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Cloud Security Threats and Mitigation (5 pages)
Competency
Describe cloud security architecture.
Scenario
You are the cloud security expert for a finance company. Your company is planning to store Personally Identifiable Information (PII) data on a public cloud medium. Your company will use this PII data to run analytics and then send credit card offers to its customers. It is a federal obligation for financial firms to protect PII data. A public cloud is a safe option but there are still many security threats to consider.
You need to analyze the various security threats and analyze various cloud services that are available to protect your data.
Instructions
In order for the leadership team to approve funding for this project, you will create a case study to help the leadership team decide how to enhance the security of the PII data in the future.
Your case study should include the following points:
- Security threats on the cloud
- Data encryption on a public cloud
- Threat detection tools for a public cloud
- Vulnerability scanning tools for a public cloud
- Cloud-native security services for a public cloud
Be sure to use a professional tone and check your spelling and grammar.
Length
Microsoft Word, 5-6 pages
References
Include a minimum of 5 scholarly resources
Resources
- Cloud Security Threats
- Encryption services- AWS
- Encryption service- Azure
- Threat detection tool on AWS
- Threat detection tool on Azure
- Cloud Native Security Services on AWS
- Azure Security Center
The requirement to PASS (RUBRIC)
Word document is 5 or more pages.
A full, robust, and detailed description of security threats on the cloud.
A full, robust, and detailed description of data encryption on a public cloud.
A full, robust, and detailed description of threat protection tools for a public cloud.
A full, robust, and detailed explanation of vulnerability scanning tools for a public cloud.
A full, robust, and detailed description of cloud-native security for public cloud infrastructure as a code tool.
5 scholarly references provided; documented correctly.
Business Intelligence system ( Bi )
Business Intelligence system ( Bi )
1) Information system (IS) definition and importance
2) Characteristics and features of the chosen IS
Physical security- Security Threats
Using proper APA formatting write a 400-word discussion paper describing:
- Discuss the theory and concepts Approaches to Physical Security
- Search the Internet for an article for examples of physical security threats
- Why is Physical Security so important?
3 Page Writing In APA 6th Standard – Explaining Data Presentation
Writing should be APA 6th standard. From the attached textbook Select 3 different data presentations from chapter 6 of the text (Grey Section). Pages 240-366
For each different data presentation answer the following:
What is the Page # and picture/snapshot of your Visual?
What is the visual that you selected?
What is the purpose of the visual?
What kind of data should be compiled in the selected visual?
What kinds of data should not be compiled in the selected visual?
How can you avoid making the visual misleading?
hello
challenges
Create new Security policies
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people and have been asked to write two new security policies for this company.
The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.
Project Plan
You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).
1. Overview
2. Purpose
3. Scope
4. Policy
5. Policy Compliance
6. Related Standards, Policies and Processes
7. Definitions and Terms
Assignment
Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples.
Why Is Enterprise Architecture Important for healthcare industry ?