2 Questions each on in separate document

Question 1:

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. 

Readings:

https://www.youtube.com/watch?v=b6xplJbic6s

https://www.youtube.com/watch?v=k6JhhL2Kfdw

https://www.campuscommerce.com/new-pci-security-standards/

https://www.youtube.com/watch?v=ubeiOkXbWr4

Question 2: 

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Readings:

https://www.youtube.com/watch?v=i-HIXgjWd-E

Module 6 Discussion Questions

Your answers for each question must provide enough details to support your answers.

1.  Provide a definition for risk identification, threat assessment, and business impact analysis. Include references to support your definitions APA format. 

2.  There are three types of threats to an IT infrastructure – natural, man-made, and technical. List seven examples for each type of threat and their potential vulnerabilities to your IT infrastructure. HINT: Use a matrix or spreadsheet listing the three types of threats and their associated vulnerabilities.

3.  Explain the differences between an incident response plan, a disaster recovery plan, and business continuity plan. Include references to support your explanations in APA format. 

Please do not use books or journals as references. Please use online sources 

EH week1 p1

 

Hello,

i need this paper by 08/26 afternoon.

Strictly No plagiarism please use your own words.

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs (300 words), and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Click on the LINK to submit your WORD document for this week’s assignment.

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

https://www.youtube.com/watch?time_continue=5&v=eNQycQwKV7Y&feature=emb_title

Strictly No plagiarism

Blockchain

 This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity. The post should be 300 words at least.

Python coding

  

We are producing two types of products, product A and product B. Product A is defective if the weight is greater than 10 lbs. Product B is defective if the weight is greater than 15 lbs. For a given product, we know its product_type and its weight. Design a program to screen out defective products. Starting the program with variable definition:

product_type = ‘xxx’

weight = xxx

Hint: You need to figure out the product type first, and then check if the product is defective based on the weight. You may use a nested if statement like the following:

if product is A:

if product weight > 10:

the product is defective

else:

if product weight >15:

the product is defective

But you need to translate the English into Python codes. 

As a challenge, you may also try a one-step if statement. such as :

if some condition is met:

the product is defective

else:

the product is normal

And the key is the bolded “some condition”.

Write answer in 2 to 3 pages

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus?

Final Reflection

 

 it is now time for students to reflect on the knowledge obtained in  their course(s) and determine the effectiveness of incorporating  real-world experience into our academic curriculum. Please complete the  survey/reflection to the best of your ability.  

Students should;

  • Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
  • Be able demonstrate the application of theory to workplace in written form.
  • Be able to identify the benefits of incorporating real-world experience into an academic program.

My Subjects are : 1) Introduction to Data Mining 

                             2) Operational  Excellence

Note: This assignment should be atleast 500 words and in APA format