Discussion and Assignment
Hi please find the attachment with the questions.
Security Architecture and Design
Week 3 Group Discussion,I need this by Thursday. Minimum 300 words.
1. Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do?
Week 3 Lab Assignment I need this by saturday
2. Instructions: Using MS Access, create two tables. Input records. Establish a relationship between tables and create reports:
Create the table below.
File Name: Client_typeyourname
DO NOT DELETE THE ID FIELD!!!!!!
For each table, input 10 records.
A. Table Name: Client Information
B. Input 10 records. Make-up the data.
C. Create table TWO.
DO NOT DELETE THE ID FIELD!!!!!!
For each table, input 10 records.
Table Name: Client Amount
D. Establish a relationship using the ID key.
E. Create reports. Modify the reports as required.
Fields to use: First, Last, Phone, Amount, State
Report 1 – Use the name below that is in bold letters as the title.
Title: Client Information – Type your name
Fields to use: SSN, First, Last, Phone
Report 2 – Use the name below that is in bold letters as the title.
Title: Client General Information – Type your name
Fields to use: SSN, Phone, First, Last, State, Amount
Report 3 – Use the name below that is in bold letters as the title.
Title: Client Data – Type your name
F. Upload the MS Access file. This should be ONE file.
Week 3 Individual Assignment I need this by saturday Minimum of 600 words
Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences.
1. What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?
2. How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation— add up to a system’s particular risk posture?
Organ Leader & Decision Making
RR Communications Case Study I need this by Saturday Minimum 850 words
1. Read the RR Communications Case Study on pages 178-181 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format.