• Home
  • Archive by category "Information Systems"

Search the Internet for an article where physical security failed Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario. Sub

Search the Internet for an article where physical security failed Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario. Sub

Search the Internet for an article where physical security failedPropose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario.Submit 4 pages double spaced.No photos or graphs.
Show more

Need A++ work

Need A++ work

Assignment 2: Course Wrap-Up and ReflectionIn this assignment, you will discuss the steps that could be taken to update a website. The specific reasons for updating a website, including the benefits, will be discussed in order to show the effects that can take place.Tasks:What are the advantages and disadvantages of web updation? What would be your policy for updating your website? Provide a rationale.In addition, answer the following questions:What did you like about the course and how do you think it can be improved?What did you learn from the course? Describe at least two key areas of your learning.What are your takeaways from this course as compared to your expectations?Submission Details:By Sunday, July 23, 2017, in a minimum of 200 words, post your response to the appropriate Discussion Area. Through Wednesday, July 26, 2017, review and comment on at least two of your classmates’ responses. Consider the following in your response:Provide a statement of clarification or a point of view with rationale.Challenge a point of discussion or draw a relationship between one or more points of the discussion.Discussion Grading Criteria and RubricAll discussion assignments in this course will be graded using a rubric. This assignment is worth 40 points. Download the discussion rubric and carefully read it to understand the expectations.
Show more

How are authentication and authorization alike and howare they different?what is the the relationship,if any between the two? paper should be 2 pages in length. You need to provide a minimum of two re

How are authentication and authorization alike and howare they different?what is the the relationship,if any between the two? paper should be 2 pages in length. You need to provide a minimum of two re

How are authentication and authorization alike and howare they different?what is the the relationship,if any between the two? paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section.
Show more

5.1

5.1

Review Figure 10.1 on p. 239 and the section “Billing Workflow” on pp. 238 to 239 of your textbook Health Information and Technology Management.Write a 225  word response to the following:Discuss at least two components described in the “Billing Workflow” section in Ch. 10 of Health Information and Technology Management.How do these components affect health care reimbursement?FIGURE 10-1 Billing workflow. ATTACHED
Show more

activity 4.3

activity 4.3

Part 1: Answer the module review questions listed below. These questions were chosen to demonstrate your understanding and help you assess your progress.Briefly discuss the key phases of the SDLC methodology.Discuss the alternative approaches of SDLC and the benefits of alternatives.Compare and contrast the three major ERP implementation categories.What is ERP implementation methodology? Give examples.What is the role of change management in the ERP life cycle? Part 2: Deduce two diagrams illustrating the major differences between ERP life cycle and SDLC.
Show more

database multiple questions

database multiple questions

this is about databases questions , maybe i miss copy some option D, if ABC there are all incorrecct please type D after that question thank you Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains a single attribute, VEND_CODE, with values 123, 124, 125, and 126, respectively. (The VEND_CODE attribute in the PRODUCT table is a foreign key to the VEND_CODE in the VENDOR table.) Given that information, what would be the query output for a INTERSECT query based on these two tables?What is the difference between UNION and UNION ALL?A(n) ______________ is a block of PL/SQL code that is automatically invoked by the DBMS upon the occurrence of a data manipulation event (INSERT, UPDATE or DELETE.)__________________ means that the relations yield attributes with identical names and compatible data types.Which of the following a parts of the definition of a trigger?Which of the following relational set operators does NOT require that the relations are union-compatible?Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table contains the records for employees John Cretchakov and Mary Chen. Given that information, what is the query output for the INTERSECT query?A _____________________ is a join that performs a relational product (or Cartesian product) of two tables.What Oracle function should you use to calculate the number of days between the current date and January 25, 1999?Using tables named T1 and T2, write a query example for a LEFT OUTER JOIN, assuming that T1 and T2 share a common column named C1.Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table contains the records for employees John Cretchakov and Mary Chen. Given that information, what is the query output for the MINUS query (specifically, SELECT * FROM EMPLOYEE MINUS SELECT * FROM EMPLOYEE_1)?What Oracle function should you use to return the current date?Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains a single attribute, VEND_CODE, with values 123, 124, 125, and 126, respectively. (The VEND_CODE attribute in the PRODUCT table is a foreign key to the VEND_CODE in the VENDOR table.) Given that information, what would be the query output for a UNION ALL query based on these two tables?_________________is a term used to refer to SQL statements that are contained within an application programming language such as COBOL, C++, ASP, Java, or ColdFusion.The order of the operands (tables) matter in a _______ query.Which of the following is true of Oracle sequences?Which of the following is true of Oracle sequences?A(n) ______________ is a named collection of procedural and SQL statements that are stored in the database and that can be used to encapsulate and represent business transactions.Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table contains the records for employees John Cretchakov and Mary Chen. Given that information, what is the query output for the UNION query?A subquery can appear in which of the following places in a SQL statement?A __________ is a query (expressed as a SELECT statement) that is located inside another query and is normally executed first.What string function (in Oracle) should you use to list the first three characters of a company’s EMP_LNAME values using a table named EMPLOYEE?_____________ is a term used to describe an environment in which the SQL statement is not known in advance; instead, the SQL statement is generated at run time.Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains a single attribute, VEND_CODE, with values 123, 124, 125, and 126, respectively. (The VEND_CODE attribute in the PRODUCT table is a foreign key to the VEND_CODE in the VENDOR table.) Given that information, what would be the query output for a MINUS query (VENDOR MINUS PRODUCT) based on these two tables?In the relational model, SQL operators are ________________ because they operate over entire sets of rows and columns (or tables) at once.Which of the followings explains the difference between a regular subquery and a correlated subquery?If you do not specify a join condition when joining tables, the result will be a ______________ or PRODUCT operation.A ______________ is a subquery that executes once for each row in the outer query; it will run the outer query first, and then it will run the inner subquery once for each row returned in the outer subquery.A relational view has which of the following characteristics?A(n) ______________ is a special type of object that generates unique numeric values in ascending or descending order; it can be used to assign values to a primary key field in a table and it provides functionality similar to the Autonumber data type in MS Access.which of the following is NOT considered an advantage of a stored procedure?What are the types of results a subquery can return?The SQL standard prescribes three different types of __________ operations: LEFT, RIGHT, and FULL.A(n) __________________ is a type of JOIN operation that yields all rows with matching values in the join columns as well as all unmatched rows ( those without matching values in the join columns).Suppose that a PRODUCT table contains two attributes, PROD_CODE and VEND_CODE. Those two attributes have values of ABC, 125, DEF, 124, GHI, 124, and JKL, 123, respectively. The VENDOR table contains a single attribute, VEND_CODE, with values 123, 124, 125, and 126, respectively. (The VEND_CODE attribute in the PRODUCT table is a foreign key to the VEND_CODE in the VENDOR table.) Given that information, what would be the query output for a UNION query based on these two tables?Triggers are critical to proper database operation and management in which of the following ways?A(n) ________ is a virtual table based on a SELECT query.Suppose that you have two tables, EMPLOYEE and EMPLOYEE_1. The EMPLOYEE table contains the records for three employees: Alice Cordoza, John Cretchakov, and Anne McDonald. The EMPLOYEE_1 table contains the records for employees John Cretchakov and Mary Chen. Given that information, what is the query output for the UNION ALL query?The ______________________ will yield all rows with matching values in the join columns, plus all of the unmatched rows from the right table.Use the following scenario for questions from this chapter:You have been given a database for a small charity used to track donations made to it. It has the following structure:and the following sample data in the tables:DonorReceiptTypeFundReceiptThe client wants a listing of donor id, last name, first name, receipt date, type, and amount for all receipts greater than $100.00. The client wants the result sorted by donor last name, first name, and the donation date. The query result from the sample data would look like:Fill in the blanks of the SQL Statement:         Donor.          , Donor_LastName, Donor_FirstName, Receipt_Date, Receipt.ReceiptType_Id, Receipt_Amount         Receipt                             Receipt.Donor_Id =                   Receipt_Amount          100.00                      Donor_LastName, Donor_FirstName, Receipt_Date;Fill in the blanks with words that would best complete the passage.from> donor.donor_id selectdonorwhereandorderby donor_id,The problems for this chapter use a database for a simple department store that sells items to customers and wants to keep track of the invoices, the selling price (if an item is on sale), and the sales tax (7%) to be collected on some items. Every customer and invoice are assigned unique numbers. All items have a Universal Product Code (UPC) number and bar-code assigned to each unique item. Food and non-carbonated beverages are not taxed, but clothing, home goods, and most other items are.The structure of the tables are described in the following crows foot ERD:Sample Data for the tables follow:CustomerItemTypeItemSizeItemInvoiceInvoiceDetailSuppose that we have a second table with vendor information (sample is below) in it and that we want to create a single telephone directory with both vendor and customer information in it.The phone directory should contain the state, a name column with either the customer last name and first name concatenated with a comma or the vendor company name, city, and phone number. Output should be sorted by state then by name. Your results should look like:Fill in the blanks (remember a blank, drop “blank” as answer)SELECT          ,          ,          ,           FROM ( SELECT          || ‘, ‘ || Customer_FirstName AS Name, Customer_City                    , Customer_State AS State, Customer_Phone AS Phone FROM Customer                     SELECT Vendor_CompanyName AS Name, Vendor_City AS City, Vendor_State AS State, Vendor_Phone AS Phone FROM Vendor          )                  State, Name;Fill in the blanks with words that would best complete the passage.blankPhonecityCityCustomer_LastNameblankNameASBYUNIONStateORDERThe problems for this chapter use a database for a simple department store that sells items to customers and wants to keep track of the invoices, the selling price (if an item is on sale), and the sales tax (7%) to be collected on some items. Every customer and invoice are assigned unique numbers. All items have a Universal Product Code (UPC) number and bar-code assigned to each unique item. Food and non-carbonated beverages are not taxed, but clothing, home goods, and most other items are.The structure of the tables are described in the following crows foot ERD:Sample Data for the tables follow:CustomerItemTypeItemSizeItemInvoiceInvoiceDetailYou have been tasked to generate a report from the database using a single SQL statement to do the following:List all items with the number of invoices that the items have been on and the total of the sales of that item. Display in order by type, description, and size.Your generated output should look like:Fill in the blanks (remember a blank, drop “blank” as answer)SELECT Item.UPC, Item.Item_Description, Item.ItemType_Id, Item.ItemSize_Id, COUNT(Invoice.Invoice_Number) AS Invoice_Count, SUM(InvoiceDetail.Detail_Quantity) AS Total_Sales         FROM item                 InvoiceDetail ON item.         =          .UPC                  Invoice ON          .Invoice_Number = InvoiceDetail.          GROUP BY Item.UPC ORDER BY Item.ItemType_id, Item.Item_Description, Item.ItemSize_Id;Fill in the blanks with words that would best complete the passage.InvoiceDetailLEFTJOINblankUPCLEFTInvoiceInvoice_NumberJOINWhich of the following is the data dictionary’s function in database design?In the decentralized conceptual database design approach, the aggregation process requires the lead designer to assemble a single model where which of the following aggregation problems must be addressed?______________ design begins by identifying the different entity types and the definition of each entity’s attributes._______________ is the last stage in the database design process.Which conceptual database design is best suited to relatively small and simple databases that lend themselves well to a bird’s eye view of the entire database and may be designed by a single person or by a small and informally constituted design team?A(n) ________________________ is a system that provides for data collection, storage, and retrieval; facilitates the transformation of data into information; and manages both data and information. It is composed of hardware, the DBMS and other software, database(s), people, and procedures.____________are narrative descriptions of the business policies, procedures, or principles that are derived from a detailed description of operations.The DBLC is composed of _____ phases.Business rules are particularly valuable to database designers, because they help define which of the following?The _________________ goal is to design an enterprise-wide database that is based on a specific data model but independent of physical-level details.Which of the following is NOT a step performed in the physical design stage in the database design process?Which of the following is established during the systems design phase, in which the designer completes the design of all required system processes?Which of the following is established during the systems design phase, in which the designer completes the design of all required system processes?The conceptual design is composed of _____ steps.Ultimately, the purpose of an _____________________ is to facilitate good decision making by making relevant and timely information available to the decision makers.Which conceptual database design is best when company operations are spread across multiple operational sites or when the database has multiple entities that are subject to complex relations?SDLC is the acronym that is used to label the _______________________________.A(n) ______________________ backup of the database creates a backup of only those database objects that have changed since the last full backup.Which of the following shows how systems analysis fits into a discussion about information systems?DBLC is the acronym that is used to label the _______________________________.The SDLC is composed of _____ phases.Which of the following is NOT a step performed in the logical design stage in the database design process?A(n) _____________ is the use of different names to identify the same object, such as an entity, an attribute, or a relationship.Database design must yield a database that does which of the following?__________ design first defines the required attributes and then groups the attributes to form entities.The ___________________ specifies that all the data defined in the data model are actually required to fit present and expected future data requirements.Which of the following is NOT one of the six (6) steps identified as part of the ER model verification process?How many steps are required in the development of the conceptual model using an ER diagram?Which of the following is NOT an important factor in the selection of a DBMS software product?2.Each of the following activities are commonly performed during the implementation of the Database Life Cycle (DBLC). Fill in the blank, before each activity, with the phase number of the DBLS that this activity would normally be performed.DBLC Task Numbers: 1. Database initial study 2. Database design 3. Implementation and loading 4. Testing and evaluation 5. Operation 6. Maintenance and evolution Load the initial values into the tables Finish user documentation Adding additional tables, attributes, and indexes Attempt to gain unauthorized access to the data Interview management Convert existing data Study the competition’s database Plan how to grant different levels of access to different user groups Install the database Train users Changing constraints to match changes in business rules Define budget and scope Select a DBMS software solution Draw a logical ERD Performing software patches to the DBMS Create the database Understand how this database will connect to other databases in the organization Develop a Conceptual Model Make sure application software updates the database Regular security audits Define objectives Create a detailed model that can be physically implementedTop of FormBottom of Form
Show more

Project Deliverable 5: Network Infrastructure and Security

Project Deliverable 5: Network Infrastructure and Security

Project Deliverable 5: Network Infrastructure and SecurityDue Week 8 and worth 120 pointsThis assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. Section 1: Infrastructure DocumentWrite a five to ten (5-10) page infrastructure document in which you:Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.Create and describe a comprehensive security policy for the company that will:Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.  Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.Section 2: Revised Project PlanUse Microsoft Project to:Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.The specific course learning outcomes associated with this assignment are:Describe the methods and best practices in implementing process change in IT organizations. Describe the role and methods of technology-induced process improvement in organizations. Use technology and information resources to research issues in information systems.Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.Points: 120Project Deliverable 5: Network Infrastructure and SecurityCriteriaUnacceptableBelow 70% FFair70-79% CProficient80-89% BExemplary90-100% ASection 1: Infrastructure Document1a. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.Weight: 20%Did not submit or incompletely identified possible network infrastructure vulnerabilities. Did not submit or incompletely addressed network vulnerabilities with the appropriate security measures. Did not submit or incompletely ensured that consideration is given to virtualization and cloud technology.Partially identified possible network infrastructure vulnerabilities. Partially addressed network vulnerabilities with the appropriate security measures. Partially ensured that consideration is given to virtualization and cloud technology.Satisfactorily identified possible network infrastructure vulnerabilities. Satisfactorily addressed network vulnerabilities with the appropriate security measures. Satisfactorily ensured that consideration is given to virtualization and cloud technology.Thoroughly identified possible network infrastructure vulnerabilities. Thoroughly addressed network vulnerabilities with the appropriate security measures. Thoroughly ensured that consideration is given to virtualization and cloud technology.1b. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network.Weight: 20%Did not submit or incompletely designed a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Did not submit or incompletely explained the rationale for the logical and physical topographical layout of the planned network.Partially designed a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Partially explained the rationale for the logical and physical topographical layout of the planned network.Satisfactorilydesigned a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Satisfactorily explained the rationale for the logical and physical topographical layout of the planned network.Thoroughlydesigned a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughly explained the rationale for the logical and physical topographical layout of the planned network.1c. Illustrate the possible placement of servers, including access paths to the Internet and firewalls.Weight: 15%Did not submit or incompletely illustrated the possible placement of servers, including access paths to the Internet and firewalls.Partially illustrated the possible placement of servers, including access paths to the Internet and firewalls.Satisfactorilyillustrated the possible placement of servers, including access paths to the Internet and firewalls.Thoroughlyillustrated the possible placement of servers, including access paths to the Internet and firewalls.1di. Create and describe a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.Weight: 15%Did not submit or incompletely created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.Partially created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.Satisfactorilycreated and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.Thoroughly created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.1dii. Create and describe a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Weight: 15%Did not submit or incompletely created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Partially created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Satisfactorilycreated and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Thoroughly created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.Section 2: Revised Project Plan2. Update the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.Weight: 5%Did not submit or incompletely updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization,with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.Partially updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization,with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.Satisfactorily updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.Thoroughly updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.3. Clarity, writing mechanics, and formatting requirementsWeight: 10%More than 6 errors present5-6 errors present3-4 errors present0-2 errors present
Show more

Risk Management Unit I Essay

Risk Management Unit I Essay

Course Textbook(s)Newsome, B. (2014). A practical introduction to security and risk management. Thousand Oakes, CA: Sage.Unit AssignmentsUnit I EssayRisk Management Essay: Short AnswersUsing the textbook required reading and the Unit I Lesson, please answer the following questions:What is risk management?What are the benefits an organization can receive from the adoption of a risk management program?Describe the risk management process.What roles do security and capacity play within the risk management process?What is the purpose of a risk management methodology?Describe the various risk management methodologies used for risk assessment.Write a paper consisting of at least two pages in APA format. You may also use outside sources. All sources used,including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Show more