Discuss each question in a paragraph of at least five sentences. Give an example from the book where insufficient testing was a factor in a program error or system failure. What was one cause in the delay in the completing of the Denver Airport. Why didn’t the healthcare.gov website work at first? What is one characteristic of high reliability organizations? Describe the potential risks of alert fatigue in EHR systems. What were 2 common factors in both the Therac-25 case and the space shuttle disaster. What does design for failure mean?
——————————————————————————————————-
Discuss in an essay of at least 500 words a situation at work where you felt you had to consider the ethics of something you were being asked to do. Initial posts should contain at least 500 words and three quotes set off by quotation marks and in-line citations. Otherwise, write in your own words. Provide appropriate attribution. Do not use bulleted or numbered lists. Please do not submit attachments. Reply to two peer postings in paragraphs of at least five sentences. Your peer responses are not ‘attaboys’. They are meant to reflect a critical analytical approach to the original posting – challenge, ask questions, extend the conversation.
————————————————————————————————
M Datasecuirty
Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies?
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end.
Computer security
————————————————————————————————
Use the Web to search for examples of hacks that made the news.
Write a brief description of the attack indicating what type of hack was involved.
Read and respond to at least two other students Discussions.
Post your initial response by the end of day on Thursday and reply to at least two other students by the end of day on Sunday.
Post between 200 and 300 words.
————————————————————————————————
Week Eight Assignment
Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.
-
OriginalityReport.pdf
-
OriginalityReport.pdf