Assignment #012

1. Describe the importance of databases and database management systems in managing organizational data and information
2. provide the types and some examples of database management systems
3. address the advantages and disadvantages of using a DBMS.
1 page needed

Case study

 

Use the library and other Internet resources to research for answers for the following questions. Write a 2–3 pages research paper answering these questions.

  • Describe the complex email system as shown within the image “Example of a Complex Hybrid System.” below
  • Describe in detail with examples the benefits of this type of systems in real life.
  • Provide at least two references to support your initial post.

Please note:

  • Apply APA format on your academic writings.
  • provide 2-3 pages long (not including title and references) as a word document.
  • Include title page, table of content page.
  • Use time new roman or Arial as font type.
  • Use 12 a font size.
  • Use double spaces.
  • Add running head to the upper left corner of your document.
  • Add page numbers to the upper right corner of your document.
  • Add a references page to the end of your document.

Week 8 Discussion – Cyber Law

Describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it. 

Response should be in 450 words. Please add references in APA fomrat.

written assignment

 

Review the video below and write a two page review plus cover page and reference page.  The first page of your paper should be a summary of the video.  The second page is an opinion page covering how your company does or should use the information provided.

The Secret to Successful Crisis Management in the 21st Century – Melissa Agnes TEDx Talk

https://www.youtube.com/watch?v=VQGEPEaEWtgoutube.com

computing

 

File submission: Presentation - Autobiography



Objective of the activity

Through this activity, the student will be able to develop a presentation of his autobiography in which he applies the skills learned in the module.

Instructions

Before doing the exercise, access the resources, including the tutorials. This activity is graded only once. The activity is individual.

Before starting the creation of your presentation, learn what an autobiography is, the concept, characteristics and examples (Cáceres-Ramírez, 2018). Also, learn about the parts that make up an autobiography. (Educational magazine Partsdel.com, 2017-09).

The purpose of this activity is for the student to develop a presentation using MS Power Point.

What are we going to do?

The goal is to develop a presentation of your autobiography that carries the message in an engaging way.

How are they going to do?

Access the readings on Autobiography.
Please use MS Power Point 2016 application.
The document must be engraved with the title of your work; for example: Autobiography - María De Los Oliveros.
The parts of the job are:
Cover, Index, Introduction, Personal Data, Development, Conclusion, Recommendations
Use a theme (themes). Look at the recommendations given in the resources.
Titles and subtitles must be in "bold" and centralized
You must align the content of the slides in "justify"
The letter must not be less than 30.
It must contain header. The header must be your first and last name. It must have the creation date. It must have the slide number.
It must be free of grammatical and spelling errors. They can use the "Spelling & Grammar" must have configured the "Language" (Review).
Deliverable

Skills to be assessed (see assessment criteria):

Create the presentation and save with the correct name
Use themes
Add images
Transition movement on slides
Animation movements in text and graphics (images)
Use at least three types of layout (design)
Type and size of letters
Error free
Using the note area
Regarding content, it will be evaluated that all parts of the autobiography are present
The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). You must include references in APA format, three years old or less.

 
Basic review resources  Cáceres-Ramírez, O. (2018). The autobiography: concept, characteristics, examples. Recovered from https://www.aboutespanol.com/la-autobiografia-concopio-caracteristicas-ejembres-2879746 (Links to an external site.) Module resources and tutorials. Educational magazine Partsdel.com, professional writing team. (2017). Retrieved from https://www.partesdel.com/partes_de_la_autobiografia.html (Links to an external site.). Supplemental Review Resource  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b 

Assignment

 Cloud policies are the rules or guidelines through which organizations operate. Often applied with the intention to make sure the integrity and privacy of company-owned data, cloud guidelines also can be used for monetary management, price optimization, performance control, and network safety. Cloud computing offers organizations some of benefits such as low charges, excessive performance, and the fast transport of offerings. However, without the implementation and enforcement of cloud guidelines, businesses can be uncovered to the risks of records loss, spiraling fees, and underperforming property. 

W4. Discussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Case Study Analysis

 Read through this description of an actual case and conduct a full analysis of the case study with the attached document.

  • A defense contractor would be expected to take security very seriously, and this company, we will call it Department of Optional Defense (DooD), was diligent about security in every way. The physical location had round-the-clock guards and they had state of the art network security. Their customers require very stringent security measures, including rotating their physical security guards every 6 months. DooD contracted with a third-party company to provide the regularly changing security guards and had requirements for background checks for all assigned security guards. 
  • One of the contracted guards had been on the job for about 2 months when he started bringing his personal laptop to the job. He would hook it up to the company network and tell people that he was studying for his accounting degree at an online school. If someone walked by, they would see spreadsheets and numbers on his laptop and think he was just doing his homework.
  • The guard was well-liked and no one noticed that he was actually hacking into the CFO’s network traffic and he ended up gaining access to online banking IDs, PINs, and transaction information that the CFO had exchanged with the staff. Exploiting weaknesses in the IT infrastructure for the company, the guard was able to initiate bank transfers using the stolen data to multiple accounts. Each payment was fairly high, but not quite high enough to arouse suspicion. The guard was able to maintain his covert theft until his 6-month rotation was over and he was transferred to another company.
  • It was only after the guard had left DooD was it discovered that there had been multiple payments to outside accounts to the tune of a few million dollars. An external auditing company requested more information about these transfers from the CFO, and there was no further information. It took a full investigation well over a year to finally track the guilty guard and bring charges against him. 
  • The investigation found that there were multiple IT-related mistakes. First, IT policies did not require strong pass-phrases from all employees for all transactions. Second, the guard was allowed to connect a personal computer to the network. Access policies should have detected the intrusion and blocked access immediately. Third, there was no system administrative command oversight that would have been able to detect internal hacking. Multiple types of evidence were gathered and analyzed in order to determine the guilty party and the multiple security breaches.