White \ Black Box Database security tests (Cybersecurity)

  

Part 1

White Box Database Security Test You have been hired as a security professional for your company. You are to create and implement a white box informal database security testing schedule for the organization. Create a paper that addresses the following: 

●Create a table that includes a rotating schedule for the 12 months of security testing. Include columns that identify time estimations for each test listed. 

●Create a planning and preparation checklist common to all security tests as a whole. 

●Identify any special planning and preparation needed for each test. 

●Identify the scope for each test and identify any special considerations that need to be addressed. ●Create a list of at least five testing activities for each audit. 

●Provide recommendations for securing the database that are unique to Oracle. 

●Provide recommendations for securing the database that are unique to MySQL. 

●Provide recommendations for securing the database that are unique to SQL Server. Hands-On Project 

Part 2

10-2: Black Box Database Security Test You have been hired as a security consultant for XYZ Company. You are to create and implement a black box, external database security test. Write a paper that responds to the following: 

● How will the scope be identified? 

● What will indicate the end of a test? 

● What special skills or characteristics will be required from the assessor that are not as necessary in white box testing scenarios? 

●Identify and describe the first three main goals of the test. 

●Explain at least three specific techniques that will be used to gather information. 

●Explain at least three specific techniques that will be used as an attempt to obtain access to the system. 

●Provide at least two special considerations unique to Oracle. 

●Provide at least two special considerations unique to MySQL. 

●Provide at least two special considerations unique to SQL Server. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer security and network

 The total word count must be 250 to 300 words in your posting. (20 points)Please provide references for your original postings in APA format.

  1. Is it better to have an in-house CA or a public CA? Which trust domain model is the best?
  2. A datacenter has just been dropped in this very room. We will not be able to move it. We are stuck with it here. The information is highly sensitive. What do we need to do in order to physically secure this equipment and the information?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

WK 3 – Assignment

Assignment 1

· Analyze the given case study on security breach.

· Recommend controls to avoid an enterprise security breach.

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.  

Assignment 2

In this assignment, submit a data mining topic, introduction and preliminary references, in APA format. Your submission should include the following elements:

1. Provide the title of your term paper. The topic can be anything relating to data mining.

2. Include an introduction on the topic. This introduction should be two-pages in length.

3. A minimum of 3-5 references in proper APA format.

Use the attached textbook for reference. 

Requirements:

· ****Separate word document for each assignment****

· Provide 2 pages of introduction content. Cover sheet, abstract, graphs, and references does not count.

· Use of proper APA formatting and citations. 

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

emerging issues risk analysis

  

Research Report #2: Emerging Issues Risk Analysis and Report

Scenario

The Entertainment Team (ET — part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management platform and is ready to go to contract with the vendor. This platform is a cloud-based service that provides end-to-end management for events (conferences, concerts, festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of this system. M&M believes that the data collection and analysis capabilities of the system will prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology could be leveraged to provide additional capabilities for managing participation in hotel sponsored “kids programs” and related children-only events. 

For an additional fee, the event management platform’s vendor will provide customized RFID bands to be worn by attendees. 

The RFID bands and RFID readers use near-field communications to identify the wearer and complete the desired transactions (e.g. record a booth visit, make a purchase, vote for a favorite activity or performer, etc.).

The RFID bands have unique identifiers embedded in the band that allow tracking of attendees (admittance, where they go within the venue, what they “like,” how long they stay in a given location, etc.). 

The RFID bands can also be connected to an attendee’s credit card or debit card account and then used by the attendee to make purchases for food, beverages, and souvenirs. 

For children, the RFID bands can be paired with a parent’s band, loaded with allergy information, and have a parent specified spending limit or spending preauthorization tied to the parent’s credit card account.

The head of Corporate IT has tentatively given approval for this outsourcing because it leverages cloud-computing capabilities. IT’s approval is very important to supporters of this the acquisition because of the company’s ban on “Shadow IT.” (Only Corporate IT is allowed to issue contracts for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud-based platform since this reduces the amount of infrastructure which IT must support and manage directly. 

The project has come to a screeching halt, however, due to an objection by the Chief Financial Officer. The CFO has asked that the IT Governance Board investigate this project and obtain more information about the benefits and risks of using RFID bands linked to an external system which processes transactions and authorizations of mobile / cashless payments for goods and services. The CFO is concerned that the company’s PCI Compliance status may be adversely affected.

The Chief Privacy Officer has also expressed an objection about this project. The CPO is concerned about the privacy implications of tracking both movement of individuals and the tracking of their purchasing behaviors.

The IT Governance Board agreed that the concerns expressed by two of its members (the CFO and CPO) have merit. The board has requested an unbiased analysis of the proposed use cases and the security and privacy issues which could be reasonably expected to arise. 

The IT Governance Board has also agreed to a request from the Chief of Staff that the management interns be allowed to participate in this analysis as their final project. Per the agreement, their involvement will be limited to providing background research into the defined use cases for cashless purchases. These use cases are:

1. Purchases for craft materials and snacks by children (under the age of 13) attending a hotel sponsored “kids club” program. 

2. Purchases by Individuals attending a music festival or other event where IDs must be checked to establish proof of age (legal requirement for local alcoholic beverage consumption).

3. Purchases by attendees at trade shows (attendees are “adults”).

Your Task

Pick one of the three use cases listed above. Then, follow the directions below to complete the required research and write your final report. 

Research

1. Read / Review the readings in the LEO classroom.

2. Read this introductions to RFID technologies: https://www.gettoken.com/beginners-guide-rfid-technology-events/ 

3. Research one or more of the Use Cases

a. Children: 8 Benefits of Using RFID Wristbands for Resorts & Attractions (see section 4: Family Freedom) https://www.idcband.com/en-us/blog-us/8-benefits-of-using-rfid-wristbands-resorts-attractions/ and https://tappit.com/rfid-wristband-safety/ 

b. Managing Adult Attendees at Music Festivals (includes RFID bands linked to twitter, Facebook, and credit/debit card) http://www.techradar.com/news/world-of-tech/rfid-wristbands-vs-nfc-smartphones-what-s-winning-the-contactless-battle-1167135 

c. Tracking Adults at Trade Shows http://www.universalrfid.com/product/rfid-labels-provide-technology-at-trade-shows/ and https://blog.printsome.com/rfid-wristbands-good-bad/

4. Choose one of the Use Cases then find and review at least one additional resource on your own that provides information about privacy and security related laws that could limit or impose additional responsibilities upon Padgett-Beale’s collection, storage, transmission, and use of data about guests. (Note: laws may differ with respect to collecting data from or about children.) You should also investigate laws, regulations, or standards which impact the use of the RFID bands for mobile purchases.

5. Using all of your readings, identify and research at least 5 security and privacy issues which the IT Governance Board needs to consider and address as it considers the implications of your chosen use case upon the adoption or rejection of the proposed IT project (Event Management Platform & RFID bands). 

6. Then, identify 5 best practices that you can recommend to Padgett-Beale’s leadership team to reduce and/or manage risks associated with the security and privacy of data associated with the event management platform.

Write

Write a five to seven (5-7) page report using your research. At a minimum, your report must include the following:

1. An introduction or overview of event management systems and the potential security and privacy concerns which could arise when implementing this technology.  This introduction should be suitable for an executive audience. Provide a brief explanation as to why three major operating units believe the company needs this capability. 

2. An analysis section in which you address the following:

a. Identify and describe your chosen Use Case

b. Identify and describe five or more types of personal / private information or data that will be collected, stored, processed, and transmitted in conjunction with the use case. 

c. Identify and describe five or more compliance issues related to the use of the RFID bands to make and track mobile purchases.

d. Analyze and discuss five or more privacy and security issues related to the use case.

e. Identify and discuss 3 or more relevant laws, regulations, or standards which could impact the planned implementation of the event management system with RFID wrist bands.

3. A recommendations section in which you identify and discuss five or more best practices for security and privacy that should be implemented before the technology is put into use by the company. Include at least one recommendation in each of the following categories: people, processes, policies, and technologies.  

4. A closing section (summary) in which you summarize the issues related to your chosen use case and the event management platform overall. Include a summary of your recommendations to the IT Governance Board.

5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Tracking a Route

 Tracing a Route 

Overview: 

In this assignment, you will use a command line interface to execute a network command that can help to diagnose system or network problems. You will then discuss the basics of internal and external network IP addressing. Instructions: Think of a website you visit frequently. Go to your computer’s command line interface and use the route tracing command for your platform to trace the route from your computer to that website. 

• For Mac users, use the Terminal utility. For Windows users, use cmd, or Command Prompt. 

• Take a screenshot of your route results. 

• Investigate the IP address for the first three hops in your route. Who “owns” them? 

• Discuss these first three hops, and why they are the first three for your computer/network. Requirements: • Submit a Word document in APA format.

 • Two – three pages in length. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Social Robots in Organizational Contexts

  

Paper – Social Robots in Organizational Contexts: The Role of Culture and Future Research Needs 

The integration of social robots in society and in organizations is explicitly a trend that is on the rise. We are witnessing the application of physically embodied robots who socially interact and collaborate with humans in various settings. In this week’s research discussion, you are to voice a critical opinion on the content of the paper mentioned above.
This paper is focused on the organizational contexts of social robots and required cultural challenges. The research looks at the cultural fit between values embedded in social robots and values lived in the organizational context in which the robot is deployed.

  1. What do you think about the place of social robots in the future general?
  2. What is your evaluation of the proposed future research into cultural challenges?
  3. What is the best way of introducing social robots into organizational contexts?

Answers should be based on the details provided in the paper.

Make sure you support your opinions with scholarly research!

For this assignment, following APA style Ver. 7.0, answer as comprehensively as possible the questions. Your answers should be based on the details provided to you in the paper.

Cite your sources (APA 7.0 ed).

NOTE: 800 words

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Fundamentals of Security (The Chief Financial Officer)

The Chief Financial Officer (CFO) made some complaints to the CEO regarding recent capital expenditures for security software. You try to lighten the blow by explaining the value of controlling security.In a point paper to the CEO, explain the cost-benefit analysis method you use to do a quantitative assessment before investing in security control.

Complete and include the table below in your paper.

The requirements for your assignment are:

  • 2-3 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

analysing 4.1

 Watch:

  1. Andy Kirk: Let’s have a think about data visualization thinking. (2015).

PowerPoint: Analyzing and Visualizing Data Ch 5.pptx Analyzing and Visualizing Data Ch 5.pptx – Alternative Formats
Videos:Chapter 5 video:   Analyzing and Visualizing Data – Chapter 5.mp4  Click for more optionsLink to video 1:   Analyzing and Visualizing Data – Chapter 6.mp4Link to video 2:   Histogram Chart.mp4  Additional videos that may assist you:https://www.youtube.com/watch?v=32o0DnuRjfg  

This week we focus on establishing your editorial thinking.  What does the author mean by editorial thinking?  Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic. 

In response to peers, add to their thoughts on the video and their topi

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

please answer this question

  

Radisson Blue Hotels stores information about their hotels in different countries. Every hotel is identified by hotel id, hotel name, hotel address, city and URL. Every country is identified by country code, country name and country currency. Guests staying in the hotel is identified by guest number, guest name, guest address and guest city. Every room in the hotel is identified by room number, and room floor. Every room booking is identified by booking id, starting date, and ending date. There are different types of rooms in the hotel. Each room type is identified by room type code, room standard rate, and description. In each country, there may be no hotels or more than one hotel. A hotel may have one or more rooms. A guest can book one or more rooms and a room may be booked by one or more guests. A hotel may have one or more bookings and each booking is associated with exactly one hotel. Each room type may have one or more rooms and a room belongs to one room type. 

1) Write the schema of the appropriate relations for the above scenario. Identify the primary key and the foreign key in each of the relations. 

How did you identify the primary key and foreign key? Explain.   

2) Use the designed relations to write SQL statements for the following questions:  –   Explain the working of each query in detail.

a. Display all the rooms having the same rate in the ascending order of room rate.   

b. List the number of hotels in each country. Only include countries with more than 4 hotels.   

 

c. Display the details of hotels that is not yet included in any booking. 

d. Display all the details of guests who booked hotels on ‘2021-05-01’. 

e. Display the room number, room standard rate and the hotel id. 

f. Display the details of countries with country name starting with letters other than any letter within ‘A’ and ‘P’.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer & Network security

Read the article “How to build your own public key infrastructure” and decide if this is something you could do. Explain why or why not. Your submission should be between 1200-1500 words with references and following APA writing standards.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now