Ethical Obligations in Information Security Proposal

Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.

Enterprise Risk management – Practical connection assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making and enterprise risk management. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. 

Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  • Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).

CIA Triad

In 80 words or more review and discuss the tutorial on the following link

https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-CIA

Excel Grader

I have two excel graders that I need done. Please do them correctly the last guy did not and I did not pass them. 

3 Discussions S

Discussion 1.2

What is so special about GIS? Is GIS art or Science?

Discussion 2.1

What is the difference between GIS and CAD? Why GIS and CAD both exist?

Discussion 2.2

Imagine you are looking at a geodatabase that contains 50 states, 500 cities, and 100 rivers. How many feature classes are there? How many features? How many attribute tables? How many total records in all the attribute tables? 

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

Discussion Presentation. Ms Powerpoint.

Power Points/ Class Discussion Topics
  1. Discuss the importance of mutual exclusion and synchronization in the case of process cooperation. What problems could arise if the system lacks these two features?  How could semaphores help? 
  2. Compare threads and processes and discuss their similarities and differences.  
Additional Resources
  1. Concurrent processing: http://docs.oracle.com/cd/A60725_05/html/comnls/us/fnd/over.htm
  2. Multiprogramming and multiprocessing: http://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zconcepts/zconcepts_75.htm