need someone good in excel and access

  

You have started a new business selling used cell phones, MP3/MP4 players, and accessories. You have been using an Access database to track your inventory. You decide to improve the data entry process by adding a few additional tables. After the new tables are added and the relationships are set, you will create several queries to analyze the data. You will also create forms, reports, and export/import data between Access, Excel, and Word.  

Corporate IT Security Audit Compliance

 Go to the following URL: https://www.blackstratus.com/best-practices-cybersecurity-compliance-audits/ 

This is the Information I require you to explain in your own words: (do not just tell me what it is research and explain it to me)

1) What does the executive order state, within the context of Cybersecurity?

2) What is the NIST FISMA Cybersecurity Framework (CSF), and what does it perform?

3)  What is HIPPA and what does it do?

4) What is SOX and what does it do?

5) What is PCI-DSS and what does it do?

6) What is GPG-13 and what does it do?

7) What are US State-Laws and what do they do?

8) What is Cybersecurity framework?

9) What is the cost of Non-Compliance? 

10) What items should be reviewed during a Cybersecurity compliance Audit?

These are not questions, but rather topics that must be included in the paper.

Cybersecurity Program

Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

This assignment serves to benchmark competencies: 

4.1:  Develop a cybersecurity program aligned with business needs, regulations,  and compliance standards to enhance an organization’s security posture.

4.2:  Determine appropriate business strategies to ensure business sustainability, availability, and reliability and articulate these needs to relevant stakeholders.

4.4: Interpret risk assessments, gap analysis, and current cybersecurity trends to formulate a cybersecurity governance strategy that establishes mitigation plans for future challenges to achieve security objectives.

CC-5

 
Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC. 

Journal Article Analysis

 Select any one from the below key terms.

Key Terms:

  • Styles of Negotiation
  • Anchoring in Negotiation
  • Mediation
  • Arbitration

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions

Course reflection discussion

My course is cloud computing and I work as a software engineer.

Write a brief reflection on this course and on how it will aid your professional career and development.

  • How will this course impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this course prepare you for further studies related to your chosen professional career?

Week 3 Research Paper

 

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2 Questions each on in separate document

Question 1 

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim, since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

 https://www.youtube.com/watch?v=8b9fYVG1FuY 

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Question-2::::

Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the https://libguides.nec.edu/az.php , not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Readings:

 Required Videos

https://www.youtube.com/watch?v=kpDhtutyWNU

 https://www.youtube.com/watch?v=1DIaZFeZkB0 

 https://www.youtube.com/watch?v=frCZMQcFQD8 

Feature Requests

Respond to the following in a minimum of 175 words: 

All projects are perfect at the beginning—but few are perfect when they end. Sometimes, project managers gather descriptions of features that weren’t included in the initial release of a product and slate them for inclusion into a “2.0” version of the deliverables. Imagine you have been asked to submit a feature request for the VitalSource application you use to read your textbook for this course.

  • What feature would you request?

Be sure to describe it in sufficient detail so that the VitalSource programmers could understand and implement your request.