Please see attached document. Deliverables Answer the following for each of the above codes: What does the code say? Please see attached document. What kind of cryptography is this? Describe the basic approach you used to solve the cipher.
Review the video on CA ERwin Data Modeling. How and why would the use of data modeling software improve the development of data models for an organization? Why must these steps be addressed before the design begins? Video link mentioned above: https://www.youtube.com/watch?v=k5RopAn04Hk This is a discussion piece and only needs 1 or 2 paragraphs. it’s already late so the sooner it can be completed the better.
o prepare for the discussion, read the article “Bridging the Gap: The Difference Between Data Analysis and Data Modeling.” in the Module Resources folder on data manipulation. Next view the Power Point presentation “Data Manipulation with Structured Query Language PPT.” Discuss the challenges of accurate data analysis upon accurate data modeling. Why would you want to use structured query language (SQL) for database design? What would be the benefits of using SQL to create and manipulate the data in the database? What other ways are there to manipulate data in a database besides SQL? In your response, focus on both the technical challenges and on the data and information management challenges associated with data analysis conducted by business analyst. Links from the above paragraph: https://www.bridging-the-gap.com/data-analysis-data-modeling-difference/ powerpoint document mentioned attached
Overview Post your weekly current event discussion here. The topic of your posting should be related to information assurance since that is our class title. A Current Event is simply a newsworthy item that helps us to stay current on what is going on in information security today. You can select any reputable source to find your current event. Guidelines & Expectations Please give your analysis of the event and provide a link. Deliverables To receive full credit for this discussion: 1) Submit an original post in the discussion arena below (by Wednesday).
Overview The history of the use of cryptography is an interesting and educational area for discussion. Guidelines & Expectations Research a major event in history when cryptography played a role in the success or failure of the event. Provide the details of the event and links to the information. Deliverables Post your detailed analysis of what you find in the discussion area by Wednesday.
Follow the instructions on the assignment and make the specified changes to the Microsoft Word document.
PLEASE USE THE ATTACHED MEMO TEMPLATE FOR THE ASSIGNMENT You recently stepped into the role of information security manager at a medium-sized e-commerce company with roughly 500 to 1,000 employees organization-wide. The company has hired a third-party consultant to evaluate its information security posture. The consultant has concluded the evaluation and noted several high security risks. These action items must be addressed to ensure that the company’s information assets are secure. Your task is to provide recommendations to address multiple identified security risks and explain your decisions to your leadership team. Directions Memo Template: To communicate the identified information security risks and your recommendations and explanations, you will generate a memo to your leadership team. Your recommendations do not have to address all information security risks; however, they must address multiple risks. Be mindful that your leadership team is considered a nontechnical audience. You must complete each of the following sections: Introduction: Describe how addressing the evaluated elements of information security will support the company’s business objectives. Laws and Regulations: Explain how laws and regulations influence information security policies and procedures within this company. Technical Controls: Describe the technical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Administrative Controls: Describe the administrative controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Physical Controls: Describe the physical controls that you would recommend to address the multiple indicated information security risks from the consultant’s findings. Business Impact: Explain how your recommendations impact current information security policies and practices within this company. Conclusion: Explain why leadership should act on these control recommendations to improve the company’s information security posture. Your conclusion can also include a brief summary, although it is not required. What to Submit To complete this project, you must submit the following: Memo Template This should be a 2- to 3-page Word document (.docx) with the following sections completed: introduction, laws and regulations, technical controls, administrative controls, physical controls, business impact, and conclusion.
There are several vulnerability scanners available to assist organizations in scanning their networks and systems to detect potential risks and vulnerabilities. Review at least three of these tools and compare and contrast their features and functions. In your opinion, would you implement any of these scanners? Explain your rationale in choosing this particular tool. Here are a few resources to assist you with this assignment. https://www.comparitech.com/net-admin/free-network-vulnerability-scanners/ https://www.networkworld.com/article/2176429/security-6-free-network-vulnerability-scanners.html https://www.g2.com/categories/vulnerability-scanner
PLEASE USE SRS TEMPLATE ATTACHED FOR THE ASSIGNMENT. You are employed as a systems engineer at Millennia HealthCenter (MHC), an organization in the healthcare industry that offers patient care in person and online. MHC will be implementing a new software system within the next three years, and you are the systems engineer leading the project. The software system that Millennia HealthCenter currently uses has several problems, as described in the business case document (see Supporting Materials section). MHC’s technical problems are reducing efficiencies, accuracies, and the quality of patient care. The vision and the ultimate goal of MHC is to effectively improve the patient’s health and well-being through innovative approaches in health information technology. The question is: as a systems engineer on this project, how will you design a new system to improve the patient’s experience? To design a new system to sustain the vision of MHC, you will create a system requirements specification (SRS) document. The SRS will determine all aspects of the system that need to be considered prior to the start of the development process, from the perspective of the stakeholders. As you create this document, you will also have to make ethical decisions that consider legal, organizational, and industry considerations. Directions Review all of the details of the software system outlined in the business case. Be sure to read through the entire case. You will refer to its specifics throughout your SRS, and you do not want to miss any important information. Also in the Supporting Materials section: Watch all of the interviews with the stakeholders who will be using the software system once it is implemented. Review the codes of ethics for the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE). Review the security guidelines regarding the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulations. Read the Workflow of Existing System and Processes document. Download the System Requirements Specification Template, and develop its content. Fill out the sections in the template that apply to the specific system that is described in the scenario. If you believe that a section does not apply to the system within the scenario, enter “Does not apply.” Provide a brief rationale as to why you believe that the section does not apply. Your system requirements specification must include: An introduction, which may include: System purpose System scope System overview System context System functions User characteristics A description of functional system requirements that clearly explains how the functionality addresses the problem statement within the business case and meets the organizational vision A description of the non-functional requirements, which includes: Usability requirements Performance requirements A description of other requirements, which may include: System interface System operations System modes and states Physical characteristics Environmental conditions As you complete these sections of your SRS, pay particular attention to the interviews with stakeholders referred to in the Supporting Materials section of this document. Since you do not have access to the actual end users and other stakeholders of the system, you may use your judgment in specifying the precise nature of the capabilities that the users will need. If you have questions about system functions, you should research the nature of the user’s work, and you may also want to use your instructor as a resource. As you develop the SRS, you will demonstrate how to make ethical decisions. Your SRS must also include: An explanation of the system security requirements, which includes how the system will need to sustain proper levels of security A section on information management requirements, which determines how the system will need to manage and encrypt information between its databases, interaction with other systems, and interfaces, while considering the ethics of privacy An explanation as to how the system must comply with organizational and federal policies and regulations requirements (e.g., HIPAA compliance) An application of the ethical considerations throughout the SRS by addressing the codes of ethics for ACM and IEEE
You are to create a 10-minute multimedia presentation on one of the following topics below: Understand basic concepts in Information Technology, including hardware, software, networks, and the internet. Recognize and define critical components of Management Information Systems. Explain the value of technology and information as a competitive advantage to the organization. Understand key concepts of Supply Chain Management, Customer Relationship Management, and Business Intelligence and how these systems impact competitive advantage. Understand the key characteristics of a relational database. Compare and contrast the features of databases and data warehouses. Demonstrate how artificial intelligence and decision support systems can be used to solve business problems. Communicate the implications of electronic commerce in today’s business environment. Understand the systems development life cycle and trends in systems development, including outsourcing. Understand key concepts of IT Infrastructure. Communicate the mandates and strategies for protecting the organization’s people and information. Recognize and describe the emerging trends and technologies that will impact the organization. Instructions: Create a multimedia presentation that includes presentation that includes text, video, images, and sound. You will present one of the topics in bullet points. You will be creating a professional multimedia presentation. If you go into the Apple Teacher Learning Center. Go to Apple Teachers in Action. Look at those videos as examples of a multimedia presentation. You will save the production and submit it in D2L (here). Requirements: You are to use Microsoft Powerpoint or any other presentation software, Apple Keynote, GarageBand, Pages, Numbers, and iMovie to have an Apple Device. You can go to www.icloud.com to access Keynote, Pages, and Numbers on a PC. If you do not have an Apple device, you can use Microsoft Office and Movie Maker to create your presentation. Your presentation must be creative and informative on your chosen topic. You are to reference information from your textbook regarding the detailed knowledge of your production. The required length is 10 minutes. You will be recording your presentation and submitting the file. Your video must play and be in the appropriate format. You are to test your video and make sure it plays on all devices before submitting, or you will not be credited for submission. If I am unable to play video, you will not receive credit. You also must type up in a Microsoft word document and submit along with your multimedia presentation and transcript word for word what is in your presentation in a professional format. Class Text Book Management Information Systems By: Ken J. Sousa; Effy Oz