Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

Research assignment

Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select your choice of providers if you had to make the decision for your business. Write up a comparison on the services offered 

Discussion, Assignments

Discussion:

Focus on the social and organizational issues that exist with better understanding why changes occur. Discuss the phases of change noted in the Linear Development in Learning Approaches section in the Information Technology and Organizational Learning text.

Need 125 words and Textbook is attached.

  

Assignment 1:

Chapter 3 – study questions 1-8, Exercise 2 (Information Systems for Business and Beyond)

1. Come up with your own definition of software. Explain the key terms in your definition.

2. What are the functions of the operating system?

3. Which of the following are operating systems and which are applications: Microsoft Excel, Google Chrome, iTunes, Windows, Android, Angry Birds.

4. What is your favorite software application? What tasks does it help you accomplish?

5. What is a “killer” app? What was the killer app for the PC?

6. How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.

7. Explain what an ERP system does.

8. What is open-source software? How does it differ from closed-source software? Give an example of each.

Exercise 2:

What ERP system does your university or place of employment use? Find out which one they use and see how it compares to other ERP systems. (Write about Saas Based related)

Chapter 4 – study questions 1-13, Exercise 5 (Information Systems for Business and Beyond)

1. What is the difference between data, information, and knowledge?

2. Explain in your own words how the data component relates to the hardware and software components of information systems.

3. What is the difference between quantitative data and qualitative data? In what situations could the number 42 be considered qualitative data?

4. What are the characteristics of a relational database?

5. When would using a personal DBMS make sense?

6. What is the difference between a spreadsheet and a database? List three differences between them.

7. Describe what the term normalization means.

8. Why is it important to define the data type of a field when designing a relational database?

9. Name a database you interact with frequently. What would some of the field names be?

10. What is metadata?

11. Name three advantages of using a data warehouse.

12. What is data mining?

Exercise 5:

Conduct some independent research on the process of business intelligence. Using at least two scholarly or practitioner sources, write a two-page paper giving examples of how business intelligence is being used.

The above assignments should be submitted in one-word document.

Assignment 2:

Chapter 3 – Complete the two essay assignments noted below: (Information Technology and Organizational Learning)

1) Review the strategic integration section. Note what strategic integration is and how it ties to the implementation of technology within an organization.

2) Review the information technology roles and responsibilities section. Note how IT is divided based on operations and why this is important to understand within an organization.

The above submission should be two pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

2 DISCUSSIONS 1 CASE STUDY 1 WEEKLY SUMMARY

Discussion 5.1

Describe IAD’s set of top strategies to fit these goals of “Confidence in Cyberspace” guide.

Discussion 5.2

Describe PKI, what is it? What components/parts/parties is it constituted of?  

Case Study 5.1

Describe Four Major Concepts of Cryptography. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer-reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

REFRENCES SHOULD NOT BE OLDER THAN 2015

REFRENCES SHOULD NOT BE OLDER THAN 2015

Weekly Summary 5.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

1-3 Final Project Review and Topic Submission

 The final project for this course is the creation of an information technology incident report. The rubric (Topic) attached covers the topic, while the “Final Rubric” covers the actual final project broken down in modules. The project is broken down into 3 modules.  The person chosen will come up with a topic for this specific question and I will work with them throughout the remaining modules.  Willing to pay $10 just to come up with a topic that will be used for the remaining modules and final.

cys6paper

Go online and search for information about companies that have been harmed or bankrupted by a disaster. Choose one such company and create a brief case study about it. Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for layoffs. Your assignment should be 3-4 paragraphs in length.

MS 3

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include the following sections:

a. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

b. Conclusion

c. References

Notes:

1. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

2. Must cite at least 5 peer reviewed scholarly journals.

3. This paper should be in APA format and should be a minimum of 4 pages in length