Milestone 2

In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as Target, OPM, Equifax, Home Depot, Capital One and so many more. 

In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident. 

Guidelines for Submission: Your paper must have a title and reference page, be submitted as a two page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format.  As a reminder, every assignment goes through a plagiarism checker so follow all the guidelines that we have discussed as you read your articles, books, etc. and summarize the author’s thoughts. 

ERM Week 2

Q1.  275 words

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper among above two was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Q2. research paper – SEPARATE Document – 5 full pages

  Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Intro to CyberSecurity homework

 

1. (a)  In an environment in which several users share access to a single  database, can one user ever block another’s access for an unlimited  period of time? (This situation is called indefinite postponement.) (b)  Describe a scenario in which two users could cause the indefinite  postponement of each other. (c) Describe a scenario in which a single  user could cause the indefinite postponement of all users.

2. Using  the two-step commit presented in the beginning of this chapter,  describe how to avoid assigning one seat to two people, as in the  airline example. That is, list precisely which steps the database  manager should follow in assigning passengers to seats.

3. Suppose  a database manager were to allow nesting of one transaction inside  another. That is, after having updated part of one record, the DBMS  would allow you to select another record, update it, and then perform  further updates on the first record. What effect would nesting have on  the integrity of a database? Suggest a mechanism by which nesting could  be allowed.

4. Can a database contain two identical records without a negative effect on the integrity of the database? Why or why not?

5. Some  operating systems perform buffered I/O. In this scheme, an output  request is accepted from a user and the user is informed of the normal  I/O completion. However, the actual physical write operation is  performed later, at a time convenient to the operating system. Discuss  the effect of buffered I/O on integrity in a DBMS.

6. A  database transaction implements the command “set STATUS to ‘CURRENT’ in  all records where BALANCE-OWED = 0.” (a) Describe how that transaction  would be performed with the two-step commit described in this chapter.  (b) Suppose the relations from which that command was formed are (CUSTOMER-ID,STATUS)  and (CUSTOMER-ID,BALANCE-OWED). How would the transaction be performed?  (c) Suppose the relations from which that command was formed are  (CUSTOMER-ID,STATUS), (CREDIT-ID,CUSTOMER-ID), (CREDIT-ID,  BALANCE-OWED). How would the transaction be performed?

7. Show  that if longitudinal parity is used as an error detection code, values  in a database can still be modified without detection. (Longitudinal  parity is computed for the nth  bit of each byte; that is, one parity bit is computed and retained for  all bits in the 0th position, another parity bit for all bits in the 1st  position, etc.)

8. Suppose query Q1 obtains the median ml of a set S1 of values, and query Q2 obtains the median m2 of a subset S2 of S1. If m1 < m2, what can be inferred about S1, S2, and the elements of S1 not in S2?

9. One  approach suggested to ensure privacy is the small result rejection, in  which the system rejects (returns no result from) any query, the result  of which is derived from a small number, for example, five, of records. Show how to obtain sensitive data by using only queries derived from six records.

10. Cite a situation in which the sensitivity of an aggregate is greater than that of its constituent values. Cite a situation in which the sensitivity of an aggregate is less than that of its constituent values. 

Block Chain Development discussion 6b

This week’s reading introduced an overview of blockchain security. Create a new thread and choose a security threat from Chapter 11. Then describe the impact of the chosen threat if it would be realized in a blockchain environment, and what you can do to mitigate the threat. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from Chapter 11. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread and choose a security threat from Chapter 11. Then describe the impact of the chosen threat if it would be realized in a blockchain environment, and what you can do to mitigate the threat.  Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from Chapter 11. You’re not trying to test each other, but you are trying to start a discussion.

Discussion: The Future of Offices

q1) Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? 

q2) Will offices as we think of them today exist in the next ten years? Why or why not? 

note:1. the whole discussion should be Minimum 250-300 words. 

2. Use at least one scholarly article.

power point presentation Topic related to subject “Decision Mkg/Essent Bus Comm “

question 2. 

power point presentation Topic related to subject  “Decision Mkg/Essent Bus Comm “

Audit Report Presentation  (power point presentation)

what is audit report (audit report means opinion on whether a company’s 

financial statements comply with generally accepted accounting principles)

below i have attched , how to make audit report presentation.

please read every step and work on the power point presentation

 

power point presentation(total 150 points ).  Must and should cover below points 

Content            40 points

Quality of Content 60 points

Organization       15 points

Written Communication  15 points

Visual Aids          10 points

Presentation Style   10 points

assignment Urgant

6pages and Format APA

Based on your previous work in the previous week,createa 700-word entry in yourDatabase Management Plan.

Paper 2 OP

  

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. What does it mean for a company to have a competitive advantage? Use at least three unique references. Length: 4-5 paragraphs. 

2. What is an ERP system? How does an ERP system enforce best practices for an organization? Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages and disadvantages of centralizing the IT function? Use at least three unique references. Length: 4-5 paragraphs. 

4. What is the difference between the pilot implementation methodology and the parallel implementation methodology?  Use at least three unique references. Length: 4-5 paragraphs. 

4 Pages – 15 dollars with in 12 hours