SQL DATABASE SECURITY (CYBERSECURITY)

 For this week’s discussion, talk about why a database needs to be secured. In your initial post, answer at least two of the items in the bulleted list below:

  • Identify three actions that can be applied to a database environment to manage user access.
  • Is there such a thing as “overkill” with security? If so, how? (Provide an example)
  • Explain who should be in charge of making the security decisions for an organization’s database? Why?
  • Define and explain the difference between the authentication modes of at least two of the three database vendors mentioned in the chapter (SQL Server, MySQL, and Oracle).
  • Identify at least five best practices when adding and removing users.
  • Explain the principle of least privilege and how it should be applied within a database environment.

CSCI 457 Assignment 3 – Biography Viewer

Choose one of your favorite games, and implement an app that shows the biography of each character of the game.

Requirements:

  • Your app should show a list of characters in the main view using a table view.
  • A small icon and some brief information of each character should be displayed in the table
    view.
  • The user can scroll up and down to see the full list.
  • The user can swipe right to reveal two buttons to favorite a character or unfavorite a
    character.
  • A checkmark is displayed for each favorite character, and the checkmark is removed if the
    character is unfavored.
  • The user can touch a character to open a detail view to see the character’s large portrait and
    full biography.
  • Do not use parallel arrays. Use a class for the characters.

Computer Science Jenkins

Hello,

I do have a small project of mine for automation. In general, I do have automation Framework and have Jenkins installed in Linux and I do have two nodes Win7 and Win10. Selenium Grid and Hub installed and running successfully.

I do have knowledge and skillset of using the automation project with Java,Maven,Selenium and Cucumber. I need someone’s help in configuring Jenkins for Maven project and connecting two node machines to it to run my small project of automation via GitLab trigger setup as well.

There is no requirement document, and I am looking for someone who can deliver quality of work and I can work things around in Tutor’s comfort zone. I am in EST, but I am looking for reasonable price. If tutor is from India and have some knowledge in especially Jenkins, Maven, Java, Selenium, Selenium Grid. Please don’t hesitate to contact me.

I am new in this platform. Looking for help 🙂

Cyber Foundations

 

Application Assignment 2 – Krebs on Security

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  
 

SQL ( fund of data systems)

Answer the following question:

SQL is a pervasive querying language. While there is one primary SQL dialect that all SQL RDBMS implementations must support, and that’s ANSI SQL, each database platform comes out with its own context. Each of these dialects has its own  DDL (Data Definition Language). DML (Data Manipulation Language). and DQL (Data Query Language). Other than for marketing purposes (to sell the product as unique), what is the value of creating a new variation of a SQL dialect. 

Provide an example of one SQL dialect as part of your write-up. 

Instructions:

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Threat Categories [500 words]

Assume that you have been hired by a small veterinary practice to help them prepare a contingency planning document. The practice has a small LAN with four computers and Internet access. Prepare a list of threat categories and the associated business impact for each. Identify preventive measures for each type of threat category. Include at least one major disaster in the plan. [500 words]

Word Project

You will write a letter using the same format provided in Chapter 3 including:

  • creating a letterhead – use shape with shape effects and image
  • Add your contact information
  • Use 4″ Tab stop for date and closing
  • 2 – 3 paragraphs (3 sentences each minimum)
  • bullet list of at least 3 bullets
  • Table with title row and column or row headings
  • Use proper closing and signature line
  • Letter will fit on one page

Need ASAP

Technology Entrepreneurship

Que:1 

Discuss the types of decisions related to each element of the marketing program for delivering a value proposition and positioning it correctly in the minds of the target customer.

Que:2 

Discuss this statement: Collins and Hansen (2011) argue that good results in successful businesses are produced through a combination of paranoia, discipline, and creativity.

Collins, M. and Hansen, J. (2011) Great by Choice. New York: Harper Business.

Que:3

Read the attached case study and write 2 and a half-page summary analysis and answer the Case Study Questions.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition