Legislated Privacy Concerns

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Essay and assignment

  

  1. Write an essay (500 Words)

discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. 

USE : https://libguides.nec.edu/az.php not google.

  1. Assignments (300 Words)

Learning About Cookies as Spyware.

Research what kind of information cookies store. You might find the following websites helpful:

www.allaboutcookies.org/ 

www.howstuffworks.com/cookie1.htm

Using WORD, write an ORIGINAL brief essay of 300 words or more describing cookies and the way they can invade privacy.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Submit references separately (or add as text) otherwise they cause the Safe Assign score to increase.

Activity Diagram

Create an activity diagram of the Request For Proposal (RFP)/Proposal interaction between a potential customer and Acme Electric, LLC (Acme).

You are an analyst tasked to create an activity diagram in the analysis phase of an object-oriented analysis and design project. What follows is the interaction between a potential customer and Acme. The activity starts when the potential customer creates and sends an RFP. This activity ends when the potential customer either accepts or rejects Acme’s Proposal and possibly informs Acme of the decision.

You are NOT documenting a system, you are creating an activity diagram for a business process. The business process that you will model using an activity diagram is as follows:

A potential customer (Customer) creates and sends to the owner of Acme (Owner) a Request For Proposal (RFP) which includes an Electrical Drawing (ED) for the proposed work. An ED is an architecture blueprint which only includes the electrical portion of the work.

Owner studies the ED and RFP for the following:

  • Amount and types of electrical materials required
  • Amount and types of special equipment that may be required
  • Amount of labor that may be required
  • Specific dates Customer may have asked for the project to occur
  • Any other information that Customer may have included in the RFP

Owner sends to his supply person (Supply) a:

  • Bill of Materials (BOM)
  • special equipment list

For both lists, Supply enters the wholesale price and availability of each item. The gathering of data for each list is not dependent on the other for completion and return. Supply obtains the information for the BOM either from stock on-hand or electrical supply vendors, completes the form, and returns the BOM to the Owner. Supply obtains the special equipment information from equipment vendors, completes the form, and returns the special equipment list to Owner.

Owner checks his crews’ calendars for availability during the time period that the customer has requested.

After Owner has gathered all the information, Owner decides on a proposal price. Owner prepares a proposal and sends it to Customer.

If Customer likes the proposal, they sign it and return it to Owner. If Customer does not like the proposal, they either ignore it or inform the owner of the decision.

– UML state/activity

Active Directory Recommendations , Course Subject : Application Security

 

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

  

Submission Requirements

Format: Microsoft Word (or compatible)

Font: Times New Roman, size 12, double-space

Citation Style: APA

Length: 2 to 4 pages

No plagiarism 

organizations

1. In 100-150 words, Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

2. In 100 -150 words, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency.

Portfolio Assignment

 

Portfolio Project: This week discuss a current business process in a specific industry.  Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

Cross Functional Essay- MM

 

Cross Functional Essay

Individually, students will prepare a 3-5 page essay (excluding cover page, abstract, and references) on the relationships and interdependencies between marketing and other functional areas. APA methodology applies to this assignment. 

Research: Annotation and Color

Background: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.

Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of the appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format).

Application Security in software development

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. How does Application Security relate to software development?
    1. Define application and software development
    2. Briefly describe the role of application security in software development
  2. Discuss two software development approaches
    1. For each briefly discuss the high-level principles/approach
    2. Discuss how Application Security should be included in each phase/step of the approaches
    3. Discuss what elements of the application should be addressed and how.  Examples: data at rest, data in motion, identity management, etc.
  3. Discuss the potential downfalls that can occur if Application Security is not integrated with application development

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.