Week 3 Office Talk – Access Discussion

 

Topic Questions
As per our textbook, Access, a relational database application, is the most widely used PC-based database management system (DBMS) software for both personal and business users. Like other database systems, the structure of the database file is of the utmost importance. For this exercise, you must demonstrate your understanding of the Access database system by describing how you would begin to create a database file with one of its tables (No templates). Your example may be a personal or business database. In addition, what are the advantages of managing database information in Access versus using an Excel spreadsheet?

Thread Directions
Students are required to participate in these weekly online classroom discussion threads. Students should post at least 1 post on 3 separate days in the active week’s discussion thread. Please make sure to read all topic questions, thread directions, and assignment rubric criteria to ensure that responses are accurate and complete. Points may be deducted, at the discretion of the instructor, for not adhering to any of the following guidelines. Discussion posts will be graded according to the assignment rubric provided below.

How to Post:

1. First Post – Respond to the discussion topic questions listed above. Click on the Reply link listed below to make your response. Minimum word count=100 words

 

Class diagram and sequence diagram

As the head of information systems for a college you are tasked with developing a new student 
registration system. The college would like a new client-server system to replace its much older system 
developed around mainframe technology. The new system will allow students to register for courses 
and view report cards from personal computers attached to the campus LAN. Professors will be able to 
access the system to sign up to teach courses as well as record grades.
Due to a decrease in federal funding, the college cannot afford to replace the entire system at once. The 
college will keep the existing course catalog database where all course information is maintained. This 
database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in 
an open SQL interface that allows access to this database from college’s Unix servers. The legacy system 
performance is rather poor, so the new system must ensure that access to the data on the legacy system 
occurs in a timely manner. The new system will access course information from the legacy database but 
will not update it. The registrar’s office will continue to maintain course information through another 
system.
At the beginning of each semester, students may request a course catalogue containing a list of course 
offerings for the semester. Information about each course, such as professor, department, and 
prerequisites, will be included to help students make informed decisions.
The new system will allow students to select four course offerings for the coming semester. In addition, 
each student will indicate two alternative choices in case the student cannot be assigned to a primary 
selection. Course offerings will have a maximum of ten students and a minimum of three students. A 
course offering with fewer than three students will be canceled. For each semester, there is a period of 
time that students can change their schedule. Students must be able to access the system during this 
time to add or drop courses. Once the registration process is completed for a student, the registration 
system sends information to the billing system so the student can be billed for the semester. If a course 
fills up during the actual registration process, the student must be notified of the change before 
submitting the schedule for processing.
At the end of the semester, the student will be able to access the system to view an electronic report 
card. Since student grades are sensitive information, the system must employ extra security measures to 
prevent unauthorized access.
Professors must be able to access the on-line system to indicate which courses they will be teaching. 
They will also need to see which students signed up for their course offerings. In addition, the professors 
will be able to record the grades for the students in each class.
Give below are the UML Use Case Diagram and Use Case Specifications (Descriptions). Your task is to 
draw the Sequence and Class Diagram(s).

700 word discussion: According to Shneiderman and Bederson (2003),With this revelation in mind, identify, and discuss the benefits?

Chapter 15 – From the week’s chapter reading, we learn from the author’s case studies that, despite the alleged importance of scientific advice in the policy-making process, its evident that scientific results are often not used.  Why? The authors proposed a science-policy interface that would be realized by the inclusion of information visualization in the policy analysis process.  That way, the gap between both fields can be addressed based on the current challenges of science-policy interfaces with visualizations. 

Q1: According to Shneiderman and Bederson (2003), information visualization emerged from research in human-computer interaction, computer science, graphics, visual design, psychology, and business.  With this revelation in mind, identify, and discuss the benefits?

1. identify, and name these benefits.

2. provide a clear narrative to support your response — Not a general definition from the Internet

Week 5

 

In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

  • Paper should be developed in accordance to APA
  • Use citations with appropriate references
  • Submit to Drop Box for grading..

This assignment should be in APA format and have to include at least two references.

Cloud Computing Paper

Select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.   

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.    
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.    
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?    
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.   

Requirements:   
    The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time  New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.   
 

Week 9

Assignment 1: Email Harassment

Due Week 9 and worth 125 points

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email system and Internet-based Google Gmail email.

Prepare a report in you:

  1. Create an outline of the steps you would take in examining the email accusations that have been identified.
  2. Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation. 
  3. Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Google Gmail email system. Use this analysis to determine the challenges that exist for an investigator when analyzing email sent from an Internet-based email system outside of the corporate network.
  4. Select one (1) software-based forensic tool for email analysis that you would utilize in this investigation. Describe its use, features, and how it would assist in this scenario.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

physical security, security planning and Influence of Physical Design

write a research paper(6 pages) on approaches to physical security:

paper should contain abstract, introduction, body, conclusion

apa-format

no plaigarism.

CHAPTERS- 

Chapter 3 – Influence of Physical Design

Chapter 4 – Approaches to Physical Security

Chapter 5 – Security Lighting

Chapter 6 – Focus on Electronic Devices for Entry into locations.

Chapter 7 – Use of Locks – Focus on Key Operated Mechanisms

Chapter 8 – Explain why do employees steal?

Chapter 9 – External Threats and Countermeasures

Chapter 10 – Biometrics in Criminal Justice System and Society Today

Chapter 11 – Access Control Systems and Identification Badges

Course Objectives/Learner Outcomes:

Upon completion of this course, the student will:

· Recognize basic threats to an organization& physical security and identify the security mechanisms used

· in securing an enterprise environment.

·  Identify the security mechanisms and strategies used to protect the perimeter of a facility.

·  Identify the appropriate physical security mechanisms to implement in a given scenario.

·  Identify the appropriate mechanisms and controls for securing the inside of a building or facility.

 Select the most appropriate intrusion detection technology for a scenario.

Subject resources:

Fennelly, Lawrence. Effective Physical Security. ELSEVIER, 2017. 

Print ISBN: 978-0-12-804462-9

Other articles and readings may be assigned by course professor.

Recommended Materials/Resources 

Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.

• International Information Systems Security Certification Consortium, Inc., (ISC)²® – This Web site provides access to current industry information. It also provides opportunities in networking and contains valuable career tools. http://www.isc2.org/ 

• ISACA – This Web site provides access to original research, practical education, career-enhancing certification, industry-leading standards, and best practices. It also provides a network of likeminded colleagues and contains professional resources and technical/managerial publications. https://www.isaca.org/Pages/default.aspx