NEED DISCUSSION IN 10 HOURS
What is the difference between relational and spatial data?
What special properties do spatial data have that require specialized techniques for spatial data analysis and modeling?
Are you using spatial data for anything now?
What are some of the special techniques used for spatial data?
PLEASE EXPLAIN WHY YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTIONS? (A MINIMUM OF 125 WORDS)
CLASSMATE’S POST
In a relational database the data is stored and tabulated in an organized format of a series of data columns and rows, with the columns (attributes) containing well-defined field data, while the rows (tuples) contain the individual records. The relational aspects of these databases are contained within the attributes, and each record has a unique attribute called a primary key, which distinguishes that record from the others (Galati, 2006).
Spatial is the term which refers to anything which is located within a space which has physical and measurable dimensions, and spatial analysis is a type of geographical analysis of these items using mathematics and geometry. Spatial data, also known as geospatial data, is the information about the physical object represented by numerical value in geographic information systems (GIS). GIS systems are designed to system designed to acquire, record, store, analyze, manage and manipulate spatial or geographic data (Galati, 2006).
Although this sounds similar to a relational database, because of the characteristics of the spatial type of data, a programmer or developer can query the database based on location rather than straight numbers or text. An example of the differences between the two systems:
In relational databases, data of different types (numeric, text, and images) is stored, and when needed, the program queries (fetches) the data to answer a question, such as “How many people made purchases in the store on Friday?” In a GIS spatial database, the questions would be along the lines of “Where is the closest store?” or “Is the store located within the city of Miami?” with the answers showing geographical elements. The features of spatial data allow the programs and databases to be more robust and dynamic (Tjukanov, 2018).
There are numerous uses for spatial data and GIS, with benefits including allowing law enforcement agencies to do crime mapping of individual neighborhoods, allowing fire department personnel to map areas of concern for wildfires, and allowing first responders to determine the fastest routes for quicker response times. Spatial data allows meteorologists to track bad weather storms and to determine which areas could receive the heaviest damage from flooding or wind, and allows scientists to track the movements of people, animals, insects and reptiles. Spatial data allows governmental officials to perform different functions in municipalities, from determining water and sewer infrastructure needs to resolving which areas or communities require different resources (Galati, 2006).
References
Lance, M. (2016). “Commercial Spatial Database Management Systems include IBM DB2’s Spatial Extender [42], Oracle’s Spatial and Oracle Locator [66], and Microsoft’s SQL Server 2008 [58]”. An Efficient Query System for High-dimensional Spatio-temporal Data, 23-31.
Scott, A. (2015). “Relational Databases 101: Looking at the Whole Picture”. 16-19. Retrieved August 19, 2018
week 9 case study
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Assignment 6: VoIP Part 4 (Risk Register)
Due Week 9 and worth 100 points
Utilizing the Delphi technique, your team constructed the following risks register the VoIP project containing the risk, the likelihood of its occurrence on a scale of 1 (least likely) to 5 (most likely), and the potential negative impact on the project on the same scale. In addition, they recommended the appropriate response and identified its type for one of the risks identified.
# |
Risk |
Likelihood (1-5) |
Impact |
Response Type |
Response |
1 |
Project Delayed due to lack of resources |
3 |
5 |
|
|
2 |
Project runs out of funds before completion |
1 |
5 |
|
|
3 |
Users reject new system |
2 |
2 |
|
|
4 |
Defective Hardware |
1 |
5 |
|
|
5 |
New government regulations introduced during deployment increase the cost of running VoIP |
2 |
3 |
|
|
6 |
Yearly renewal fee issued on the legacy system due to delay of over 30 days in deployment of the new system |
1 |
4 |
Mitigation |
Schedule check 30 days before project deadline to determine if action needs to be taken to avoid delay. Decision tree will be utilized. |
Write a three to five (3-5) page paper in which you:
- Explain risk management and its associated activities and defend the need for a risk management plan.
- Describe the Delphi technique used to identify risks and infer on types of projects where this technique is most accurate.
- Examine the four (4) types of risk response (i.e., avoidance, acceptance, transference, and mitigation) and determine the appropriate situation where each should be used.
- Complete the table with the risk response type (i.e., avoidance, acceptance, transference, and mitigation) and a description of the response.
- Create a decision tree with the software of your choice to address risk number 6. Assume that when you check the schedule on day 60 of the project, it becomes evident that two (2) additional engineers are needed to ensure on-time completion of the project. The engineers cost $25,000 each and a fee of $120,000 is issued by the legacy provider. The probability of completing the project on time is as follows: With the current personnel – 60%; With one (1) engineer – 80%; With both engineers – 98%.
- Explain the methodology utilized to create a decision tree and recommend the appropriate action to take based on your decision tree from criterion 5.
- Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include the decision tree created in your chosen software. The completed decision tree must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
- Examine the human resource factors that can impact project management.
- Summarize how the PMBOK® process groups and knowledge areas are involved throughout the project life cycle.
- Compare and contrast the sources and mitigating factors of project risk.
- Use project management and graphic software to plan and manage a project throughout the project life cycle.
- Use technology and information resources to research issues in IT project management.
- Write clearly and concisely about issues in IT project management using proper writing mechanics and technical style conventions
Discussion- 1 Chepter- 1
Chapter 1
provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:
https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.
Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.
You must do the following:
1) Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.
2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)
To guide your discussions, please consider the following questions:
- What did you learn from your classmate’s posting?
- What additional questions do you have after reading the posting?
- What clarification do you need regarding the posting?
- What differences or similarities do you see between your posting and other classmates’ postings?
Due date is 05/10/2019 on Friday
3-1 man
Reply to the students response to the question in 150 words and provide 1 reference
question
- What is your company’s Inventory Carrying Cost rate? (Ask your Director of Logistics or the CFO. If that’s not possible, provide an estimation using all 4 categories presented in class.) Do you think it’s an accurate computation, a good estimate or a not-even-close estimate? Recommend one action that should be taken to improve the accuracy of this number.
Students response
Inventory carrying cost is a controversial topic as it is necessary for the supply chain to determine its cost of keeping an inventory. I am part of SK Hynix on the analytics side but since I have cross functional teams located in the Logistics side, I was able to obtain ours. Based on last year’s date, our inventory carrying cost rate was 24%. Hynix is the world’s second-largest memory chipmaker and the world’s 3rd-largest semiconductor company so it’s common to us to maintain a large number of inventories to keep up with the large demand. We basically need to have a good strategy as well in order for us to avoid seeing our costs surge. We have seen on the discussions in our book that U.S. inventory carrying costs since 2010 consistently have been between 19% and 20%. Fair enough, I can consider that our company is doing its objective to maintain our percentage in a healthy level.
As to its accuracy, I can say that these are close to estimate since our products are always moving. We have dead stocks, but these are part of obsolescence risks every company suffers. One action that I will recommend to improve the accuracy of your numbers is to maintain an updated carrying cost monitoring. Fixed costs such as rent can be reflected over a long period of time but your variable costs such as warehouse staff salaries, utilities, insurance of inventory and damages or expiration occurrence should always be tracked so you can get the right percentage accurately.
Reference:
Murphy Jr., P. Knemeyer, M. ” Contemporary Logistics, Twelfth Edition ” Chapter 8. (2018) p. 346
week 2 case 1
Click the link above to submit your assignment.
Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Assignment 1: Error Handling in an Activity Diagram
Due Week 2 and worth 150 points
Refer to the activity diagram Figure 2-15 on page 59 of the textbook. The diagram omits several error-handling pathways.
Write a two to three (2-3) page paper in which you:
- Using Microsoft Visio or an open source alternative such as Dia, update the diagram to include two (2) error-handling pathways. Note: The graphically depicted solution is not included within the required page length.
- Produce a narrative which describes the added error-handling pathways that includes:
- an overview of the errors being checked
- an explanation of the main reasons why checking for such errors is important
- an overview of other possible errors
- Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in Visio or an open source alternative such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
- Analyze techniques for requirements determination, collection, and organization.
- Use technology and information resources to research issues in systems analysis and design.
- Write clearly and concisely about advanced systems analysis and design topics using proper writing mechanics and technical style conventions.
Click here to view the grading rubric for this assignment.
IS216 DISCUSS
***DUE IN 4 HRS***
Please answer each question in AT LEAST 75 words.
1. Describe the difference between a NAS and a SAN and give examples where each are best suited in business.
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
2. Describe the evolution from IPv4 to IPv6. Why was it necessary to begin the move from IPv4 to IPv6?
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
3. Describe the process for Network Address translation. Why was this concept created and what are the main uses?
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
4. Describe the components of an ICS and a SCADA system. Provide examples of how each are configured and used in the industry.
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
5. Describe a WAN. How does it differ from a LAN and what are the major benefits and downfalls of a WAN?
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
6. Describe the difference between IPS and IDS.
Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
7. Research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
The Clinton Server/Email/Blackberry Scandal
ISOL 633 – Legal Regulations, Investigations and Compliance
HOMEWORK II – The Clinton Server/Email/Blackberry Scandal
Summer Main – 2016
Over the past year, a scandal has erupted over Former Secretary of State, Hillary Clinton’s
use of a private server during her tenure as Secretary of State which she had set up in her home,
and which she used exclusively to carry out U.S. State Department business, as well as her use of
a personal blackberry rather than a government issued communication device. The implications
of this related to cybersecurity is enormous. On the following pages are excerpts from the New
York Times and from Wikipedia related to this scandal.
You, in your capacity as cybersecurity professionals, may someday find yourself in an
employment position or as a consultant with the Federal government. It is imperative that you have
an overview of federal laws related to what U.S. government employees and officials may and
may not do as it relates to electronic communications, the need to protect electronic
communications, and to safeguard them from cyber threats.
A complete investigation and analysis of the Hillary Clinton email/personal server scandal
is an excellent learning experience for you. To that end please do the following:
1. Research completely the facts related to the Hillary Clinton home server/email/blackberry
scandal and give a thorough chronology of the facts as you understand them to be.
2. Explain how, if at all, Secretary of State, Clinton’s use of a home server/emails and
personal blackberry created potential cybersecurity threats. Include evidence of potential
breaches that you discovered through your research.
3. Outline the investigation(s) that have resulted from Secretary of State, Clinton’s, conduct
as it relates to her use of a personal server and blackberry.
4. Discuss to the best of your ability State Department protocol and procedures that Secretary
of State, Clinton, is believed to have violated, if any.
5. List and discuss to the best of your ability Federal laws and regulations that Secretary of
State, Clinton, is believed to have broken. For each, discuss the penalty for such violations.
6. Discuss the defenses that Secretary of State, Clinton, her supporters and legal staff have
raised in response to allegations that Secretary of State, Clinton, violated State Department
protocol and procedures and that she broke a number of federal laws.
7. Discuss how, in your opinion, the conduct of Secretary of State, Clinton, will (if at all)
impact the future of cybersecurity and cybersecurity laws in the United States.
8. Based upon the research you have conducted this semester related to Secretary of State,
Clinton’s conduct, and the laws you have researched, state your position as to whether you
believe that Secretary of State, Clinton, broke the law, and if so, which law(s), how she
broke them, and whether she should be prosecuted.
This assignment is due on August 19, 2016 at 11:30 p.m. NOTE THIS IS DIFFERENT FROM
THE SYLLABUS WHICH STATED THE ASSIGNMENT WAS DUE ON AUGUST 21,
2016. THE ASSIGNMENT IS DUE ON AUGUST 19, 2016 AS STATED IN CLASS AND
NOT ON AUGUST 21.
It is not necessary that you use any particular model formatting. However, your paper should be
submitted in a WORD format, using no less than a 1 inch margin, top, bottom, left and right.
Further the paper should be double spaced, and you should use subheadings where appropriate.
Cite all sources. You decide whether you will use endnotes or footnotes. Please include your name
and student id on your submission. You should plan to give your submission a title. Please
include page number on the bottom center of each page.
BELOW ARE DIRECT EXCERPTS FROM: New York Times; What We Know About Hillary Clinton’s
Private Email Server; by Alica Parlapiano, May 27, 2016;
http://www.nytimes.com/interactive/2016/05/27/us/politics/what-we-know-about-hillary-clintons-
private-email-server.html?_r=0
What Happened While Clinton
Was Secretary of State
January 2009
Mrs. Clinton becomes secretary of state and begins using hdr22@clintonmail.com, an
email account housed on a private server. At the time, the State Department’s policy
stated that “normal day-to-day operations” were to be conducted on an authorized
October 2009
Federal record-keeping guidelines for the use of personal accounts are tightened,
requiring that any such records be preserved in federal systems.
September 2012
A United States diplomatic outpost and a C.I.A. facility in Benghazi, Libya, are
attacked. Four Americans are killed.
December 2012
The chairman of the House Oversight Committee asks Mrs. Clinton in a letter if she has
used a private email account. She does not reply. The State Department later responds,
without answering the question.
February 2013
Mrs. Clinton leaves office. Four months later, State Department staff members
reviewing the Benghazi attacks discover correspondence, for the first time, between
her private email account and the government accounts of her immediate staff.
An Investigation Into the
Benghazi Attacks Puts More
Focus on Clinton’s Emails
Hearings on Benghazi spur the House speaker, John A. Boehner, to create a special
select committee to investigate the attacks and how the government responded.
Officials begin negotiating with Mrs. Clinton’s representatives, including her former
chief of staff, Cheryl D. Mills, to obtain all of her emails. Ms. Mills says Mrs. Clinton will
turn them over, but cautions that it will take some time.
The State Department provides the select committee on Benghazi with 15,000 pages of
documents, including a handful of emails from Mrs. Clinton, all from her private
account. The committee asks for the rest of the emails.
Clinton Hands Over Emails, and
They Are Eventually Made Public
December 2014
After a formal request by the State Department, Mrs. Clinton hands over 55,000 printed
pages of more than 30,000 emails.
January 2015
During a hearing of the Benghazi committee, State Department officials are criticized
for not providing all documents related to the investigation. Two weeks later, they hand
over roughly 900 pages of emails.
February and March 2015
Before The New York Times publishes an article about Mrs. Clinton’s personal email
account, the State Department tells committee investigators that she relied on it
exclusively as secretary of state. Soon after, Mrs. Clinton announces that she has asked
the State Department to release emails from the 30,000 she handed over, and says that
she deleted another 32,000 personal messages.
Mrs. Clinton announces her candidacy for president.
The State Department begins releasing several thousand pages of her emails, many of
them partly redacted. The releases continue until the last of the roughly
30,000 messages are made public in February 2016.
As the Campaign Continues,
Classified Information Is Discovered
Government investigators say they found classified information in emails from Mrs.
Clinton’s server. The emails were not marked classified at the time, and it is unclear if
Mrs. Clinton knew that the information was classified. The investigators refer the matter
to the Justice Department and shortly thereafter the F.B.I. opens an investigation.
January 2016
The State Department announces that it will not release 22 emails that contain “top
secret” material. The classifications of the emails were increased after the fact; they
were not marked when they were sent. Three days later, the first presidential primary is
held in Iowa.
The State Department’s inspector general releases a report criticizing Mrs. Clinton’s use
of the private server, saying that she should have asked for approval and that
she violated department policies by not surrendering her emails before leaving office.
How Many Investigations and
Legal Proceedings Are Happening?
F.B.I. investigation
An investigation by the F.B.I., which is expected to interview Mrs. Clinton, will
determine whether any laws were broken in the handling of classified information. The
investigation could drag on past the Democratic National Convention this summer.
Judicial Watch lawsuit
A conservative legal advocacy group, Judicial Watch, has brought a lawsuit against the
State Department under the Freedom of Information Act for records relating to the
special employment status of Mrs. Clinton’s top aide at the department, Huma Abedin.
Depositions are scheduled through the end of June, with Mrs. Clinton’s former chief of
staff, Ms. Mills, scheduled to testify.
Congressional and agency reports
The select committee on Benghazi interviewed Mrs. Clinton in October, and the
investigation is still in progress. Separate inquiries by the Senate Homeland Security
Committee, the Senate Judiciary Committee and the Inspector General of the
Intelligence Community may also result in reports.
New York Times; What We Know About Hillary Clinton’s Private Email Server; by Alica Parlapiano, May
27, 2016; http://www.nytimes.com/interactive/2016/05/27/us/politics/what-we-know-about-hillary-
clintons-private-email-server.html?_r=0
According to the New York Times, 30,322 emails have been released. Of those, 2,028
emails have since been classified “confidential,” the lowest level of classification;
65 have been classified secret; 22 have been classified “top secret” information; 18
communications with President Obama, to be held until he is out of office, and it is unknown
how many missing emails, some discovered when they were handed over to investigators by
people she corresponded with.
THE EXCERPTS BELOW ARE TAKEN DIRECTLY FROM: Wikipedia;
https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy. June 10, 2016
The Hillary Clinton email controversy began in earnest in March 2015, when it became
publicly known that Hillary Clinton, during her tenure as United States Secretary of State, had
exclusively used her family’s private email server for official communications, rather than official
State Department email accounts maintained on federal servers. Those official communications
included thousands of emails that would later be marked classified by the State Department.
Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.
Debate continues as to the propriety and legality of various aspects of Secretary Clinton’s
arrangement. Some experts, officials, and members of Congress have contended that her use of
private messaging system software and a private server, violated State Department protocols and
procedures, as well as federal laws and regulations governing recordkeeping.
Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy, Hillary Clinton Email controversy.
Security experts such as Chris Soghoian believe that emails to and from Clinton may have
been at risk of hacking and foreign surveillance. Marc Maiffret, a cybersecurity expert, said that
the server had “amateur hour” vulnerabilities. For the first two months after Clinton was appointed
Secretary of State and began accessing mail on the server through her Blackberry, transmissions
to and from the server were apparently not encrypted. On March 29, 2009 a “digital certificate”
was obtained which would have permitted encryption.
Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.
Former Director of the Defense Intelligence Agency Michael T. Flynn, former United
States Secretary of Defense Robert Gates, and former deputy director of the Central Intelligence
Agency Michael Morell have said that it is likely that foreign governments were able to access the
information on Clinton’s server. Michael Hayden, former Director of the National Security
Agency, Principal Deputy Director of National Intelligence, and Director of the Central
Intelligence Agency said “I would lose all respect for a whole bunch of foreign intelligence
agencies if they weren’t sitting back, paging through the emails.”
Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email
controversy. June 10, 2016
Clinton’s server was configured to allow users to connect openly from the Internet and
control it remotely using Microsoft’s Remote Desktop Services. It is known that hackers in Russia
were aware of Clinton’s non-public email address as early as 2011. It is also known that Secretary
Clinton and her staff were aware of hacking attempts in 2011, and were worried about them.
Wikipedia; https://en.wikipedia.org/wiki/Hillary_Clinton_email_controversy , Hillary Clinton Email controversy.
In 2012, according to server records, a hacker in Serbia scanned Clinton’s Chappaqua
server at least twice, in August and in December 2012. It was unclear whether the hacker knew
the server belonged to Clinton, although it did identify itself as providing email services
for clintonemail.com. During 2014, Clinton’s server was the target of repeated intrusions
originating in Germany, China, and South Korea. Threat monitoring software on the server
blocked at least five such attempts. The software was installed in October 2013, and for three
months prior to that, no such software had been installed.
EXCERPTS TAKEN DIRECTLY FROM: WASHINGTON POST, MARCH 27, 2016;
https://www.washingtonpost.com/investigations/how-clintons-email-scandal-took-
root/2016/03/27/ee301168-e162-11e5-846c-10191d1fc4ec_story.html?tid=magnet
How Clinton’s email scandal took root
By Robert O’Harrow Jr. March 27
Hillary Clinton’s email problems began in her first days as secretary of state. She insisted on
using her personal BlackBerry for all her email communications, but she wasn’t allowed to take
the device into her seventh-floor suite of offices, a secure space known as Mahogany Row.
For Clinton, this was frustrating. As a political heavyweight and chief of the nation’s diplomatic
corps, she needed to manage a torrent of email to stay connected to colleagues, friends and
supporters. She hated having to put her BlackBerry into a lockbox before going into her own
Her aides and senior officials pushed to find a way to enable her to use the device in the secure
area. But their efforts unsettled the diplomatic security bureau, which was worried that foreign
intelligence services could hack her BlackBerry and transform it into a listening device.
On Feb. 17, 2009, less than a month into Clinton’s tenure, the issue came to a head. Department
security, intelligence and technology specialists, along with five officials from the National
Security Agency, gathered in a Mahogany Row conference room. They explained the risks to
Cheryl Mills, Clinton’s chief of staff, while also seeking “mitigation options” that would
accommodate Clinton’s wishes.
“The issue here is one of personal comfort,” one of the participants in that meeting, Donald Reid,
the department’s senior coordinator for security infrastructure, wrote afterward in an email that
described Clinton’s inner circle of advisers as “dedicated [BlackBerry] addicts.”
Clinton used her BlackBerry as the group continued looking for a solution. But unknown to
diplomatic security and technology officials at the department, there was another looming
communications vulnerability: Clinton’s BlackBerry was digitally tethered to a private email
server in the basement of her family home, some 260 miles to the north in Chappaqua, N.Y.,
documents and interviews show.
Those officials took no steps to protect the server against intruders and spies, because they
apparently were not told about it.
Security Regulation Compliance
a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:
i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law
b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
a. Include an overview of regulatory requirements and employee responsibilities, covering:
i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law
- Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.
- Explain the concept of privacy and its legal protections.
- Describe legal compliance laws addressing public and private institutions.
- Analyze intellectual property laws.
- Examine the principles requiring governance of information within organizations.
- Use technology and information resources to research legal issues in information security.
- Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.
dq 4-2 michael
reply to the students’ response and not the question in 150 words minimum and provide 1 reference. Respond to the students response as though you are talking to them, use name
question
What do you plan to do with your hard-won degree? Set a SMART goal for yourself and then comment on a classmate’s. Add research but doesn’t have to be from a journal.
students response
This is a question that I have been throwing around for many years, asking myself what do I want to do when I grow up. As I have made this journey through my bachelor’s and halfway to my masters, I have looked at many different directions to pursue. After I graduate with my masters, I still have to play this game in the Navy for a couple of more years before I can grow up and get a real job. After researching the smart goals, I have learned that it is an excellent approach that brings the focus, clarity, and motivation that people can often neglect when goal-setting (Cechova, 2019). Right now, at this point in my career, I have been a leader, trainer, and mentor.
That being said, my goal right now utilizing the smart concept is first retiring from the Navy in two and half years then:
Specific: Working in a corporate company in the HR training and development department. One of my greatest rewards is being able to train and educate people; nothing is better than when they grasp a concept, and you see that light spark and turn on inside of them.
Measurable: When I get a job post-military, this is the direction that I will be heading in, so when I get the job in two and a half years, I will have accomplished this step.
Attainable: This is a very obtainable goal every company needs trainers, as we have learned in this class a successful company and employee never stop trying to learn and grow. When I retire from the Navy, I will have been leading, guiding, and training sailors for the last 22 years. I have been in many leadership roles, done a tour as a teacher teaching hundreds of sailors. I think I am pretty confident to say that I am qualified to teach.
Result-committed: The goals and that dreams that I have in mind are very obtainable, I live by the ideals and philosophy that no-one will outwork me, out hustle me, do more than me or work harder than me. There are 24 hours in a day right now I utilize 20 of them between work, family, and school. I will do whatever it takes and work harder and longer than anyone else to accomplish my goals.
Time Target: I have two and a half years to retire, and I will have a job in the HR field within six months of retiring or before I retire because failure is not an option for me I will not let myself fail.
Respectfully,
Michael
Reference
Cechova, D. (2019). What is the purpose of SMART goals? Retrieved from People goal: https://www.peoplegoal.com/blog/what-is-the-purpose-of-smart-goals