U DS
1) Week 1
Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
2) Week 2 Paper
Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.
3) Week 3 Discussion
In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
4) Week 4 Paper
Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
5) Week 5 Discussion
Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
6) Week 6 Paper
Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format. Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.
7) Week 7 Discussion
Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print?Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. Do not use attachments as a submission. Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
8) Week 8 Paper
Write an essay of at least 500 words discussing the reasons for the two new auditing roles in Oracle 12c. Why did Oracle consider them necessary? What problems do they solve? How do they benefit companies? Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.
8.1) Final Project Proposal
Select your final project topic. It must be unique. It should be a high level topic related to this course. Pick a topic that you will learn something from or that will be useful in your work. It must be specific not generic. Your final project will consist of a 12 minutes, 12 slide powerpoint presentation that you will present at residency and a 1 page single spaced summary and an annotated reference list as described below all of which will be submitted in Week 15.
You must also respond to two of your peers’ proposals. Help them make a better more focused more interesting presentation.
Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line. Provide an annotated reference list at the end. Annotations consist of two paragraphs of at least five sentences each about each of at least five references. The first paragraph should summarize the content of the source and the second are your thoughts or reflections about the source.
Topics:
- Database security compliance with anti-money laundering statutes
- Risks of overly privileged users
- Auditing v. monitoring
- Maintaining data integrity with hash functions
- Security risks in database migration
- Quantitative risk assessment methodologies
- Qualitative risk assessment methodologies
- Reducing costs with tiered storage
- Physical protections for your database
- IOT threats to database security
- TDE
- Tokenization
- Global data Integrity violation examples
- Efficient disaster recovery
- How to effect litigation holds
- Data as evidence: what is chain of custody?
- Data as evidence: The Federal Rules of Civil Procedure
- GDPR Compliance
- HIPAA Compliance
- SOX Compliance
- Database STIGs
9) Week 9 Discussion
Describe in 500 words the disaster recovery plan and who is responsible at your place of employment. Consider the critical business functions and your recovery point objectives and recovery time objectives.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission. Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
10) Week 10 Paper
Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Do not submit attachments.
Use the five paragraph format. Each paragraph must have at least five sentences.
Include an interesting meaninful title.
Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format.
11) Week 11 Discussion
In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions.
12) Week 12
Discuss SOX in 500 words or more. How do logging and separation of duties help comply with SOX? How might database auditing and monitoring be utilized in SOX compliance? How can a dba use automation to comply with SOX frameworks?
Respond to two posts with questions, experiences, critiques, or suggestions.
13) Week 13
Discuss in 500 words or more the relationship between NIST and FISMA. Explain how these resources aid database security
Respond with a paragraph of at least five sentences to two posts with critical questions, experiences, critiques, or suggestions.
14) Week 14
Discuss in 500 words or more the use of blockchain for the protection of medical, financial, or educational records.
Respond to two posts in a paragraph with at least 5 sentences with critical questions, experiences, critiques, or suggestions.
15) Week Final Project.
Submit a brief abstract describing your final project.
Week 14. Submit final project materials.
500-700 word, double spaced, written in APA format, showing sources and a bibligraphy
15- slides on the topic