2 Questions each on in separate document

Question 1:

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Readings:

https://www.youtube.com/watch?v=b6xplJbic6s

https://www.youtube.com/watch?v=k6JhhL2Kfdw

https://www.campuscommerce.com/new-pci-security-standards/

https://www.youtube.com/watch?v=ubeiOkXbWr4

Question 2: 

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Readings:

https://www.youtube.com/watch?v=i-HIXgjWd-E

Discussion

If you are using colours in your presentation, how do you choose effective colours that provide good differentiation between the visualizations within a presentation? 

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Impact of Mobile computing on Businesses

 Find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Mobile Computing on Businesses. Your submission must include the following information in the following format:

ANALYSISUsing 750-800 words, write a brief analysis, in your own words of how the article relates to the selected chapters. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

Need a project report and presentation

  

Using the internet, search for an enterprise company (i.e Amazon) that you feel follows this enterprise architecture and consider the implications of each function represented. For each function in this diagram, define the purpose and interaction with other function, give examples. Define and discuss credible attack surfaces for each function, if any. Does the function include interactions with third party systems? If so, should they be trusted at the same level as the internal systems. Discuss threat agents and what targets may be of interest.  

Conceptual Sample Enterprise Architecture (attached diagram): Representations of the business functions and their interrelationships.

Project Report:

  

•Report should be no less than 10 pages of content. 

•You need to include outside sources and properly cite and reference your sources. 

•You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. 

•In addition to the 10 pages of content, you will want a title page and a reference sheet. 

•Please ensure to use the proper APA citations.

Report format:

Title Page

Introduction of Company and brief background (Establish date, Location, what makes this company an enterprise, etc.)

Company Architecture (What exactly does this company do…)

Company Functions (define each function that relates to the company)

Function Integration (how/if the functions integrate with other functions)

Discuss Credible Attack Surfaces for the functions 

Discuss interactions with 3rd party systems and trust levels

Discuss Threat agents and targets

Your thoughts/improvements/gaps, etc.

Conclusion

References

attached-presentation format

Apply: Ethical Challenges

 

Assignment Content

  1. Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data, information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and users’ intellectual property (e.g., photos, artwork, videos, etc.).

    Continue your work with your team on the features of the application by identifying ethical challenges and specifying the type of data the feature uses, a risk mitigation strategy for the risk you provided in Week 2, and a global ethical perspective of the choices you made in implementing a risk mitigation strategy.

    Develop a 1-page table using the Ethical Challenges Worksheet template provided. Turn in 1 table for the team.

    Note: This assignment will help you develop your individual assignments in subsequent weeks.

Ladder of Abstraction

  1. Read pp. 82-95 from Language in Thought and Action by S. I. Hayakawa and Alan R. Hayakawa. (OCLS)
  2. Create a ladder of abstraction for your operating paradigm as described by Hawakaya and Hayakawa. 
  3. Post your ladder for class review and comment.

Read from this link: https://medium.com/@tombarrett/up-and-down-the-ladder-of-abstraction-cb73533be751

450 words with in-text and 3 main references

case study

Using Security Policies and Controls to Overcome Business Challenges

Learning Objectives and Outcomes

  • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
  • Identify four IT security controls for a given scenario.

Scenario

  • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
  • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
  • The customer service department is the organization’s most critical business function.
  • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
  • The organization wants to monitor and control use of the Internet by implementing content filtering.
  • The organization wants to eliminate personal use of organization-owned IT assets and systems.
  • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
  • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.

Assignment Requirements

Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

Length: 1–2 pages