Determine the steps in the development of an effective entity relationship model diagram and determine the possible iterative steps and factors that one must consider in this process.

Database Modeling and Normalization

Imagine that you work for a consulting firm that offers information technology and database services. Part of its core services is to optimize and offer streamlined solutions for efficiency. In this scenario, your firm has been awarded a contract to implement a new personnel system for a government agency. This government agency has requested an optimized data repository for its system, which will enable the management staff to perform essential human resources (HR) duties along with the capability to produce ad hoc reporting features for various departments. They look forward to holding data that will allow them to perform HR core functions such as hiring, promotions, policy enforcement, benefits management, and training.

Instructions
Using this scenario, write a 3–4 page paper in which you:

Determine the steps in the development of an effective entity relationship model diagram and determine the possible iterative steps and factors that one must consider in this process, with consideration of the HR core functions and responsibilities of the client.
Analyze the risks that can occur if any of the developmental or iterative steps of creating an ERM diagram are not performed.
Select and rank at least five entities that would be required for the development of the data repositories.
Specify the components that would be required to hold time-variant data for policy enforcement and training management.

Which information security control would you implement first as a disaster recovery tactic to try and prevent the problem in this scenario? Why?

Risk Management for Compliance

Within the Discussion Board area, write 200–250 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

For this Discussion Board, please complete the following:

Read the following article about the Colonial Pipeline cyberattack:

The Pipeline was hit by a ransomware attack . Around 100 gigabytes of data were stolen. Some operations had to be completely shut down due to the cyberattack. If you were the owner of Colonial Pipeline, think about how technical, administrative, and physical controls are applied in an organization to help ensure data confidentiality, integrity, and availability.

Watch the following video to review the three categories of information security controls:

To learn more about disaster recovery tactics, you may review this unit’s Intellipath® lesson: Developing Disaster Recovery Plans.

Based on your review of the video, the Intellipath lesson, and the pipeline scenario, discuss the following:

These are the 2 questions that need to be answered:

Which information security control would you implement first as a disaster recovery tactic to try and prevent the problem in this scenario? Why?

In your opinion, why is each control is specifically important to ensure the security of companies such as Colonial Pipeline as a component of disaster recovery?

Which database product will you recommend, and why?Describe distributed databases and how they might be used.

Advance Systems Data

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Now that the ERD is created, and as you are working on the logical model, you need to choose an RDBMS for the final solution. Using the method for DBMS selection, analyze 3 different DBMS products available and make a determination about which product you will recommend to management for selection.

Based on your analysis, which database product will you recommend, and why?

As you are designing and developing the database, you think to the future and want to be able to grow the database as required, not only expanding the data model as needed, but also in the event that the company wants to open remote data centers and have replicated copies of the data. Describe distributed databases and how they might be used.

 

Should organizations use software service providers for all their software needs? Why or why not? What management, organization, and technology factors should be considered when making this decision?

Software providers

PROOFREAD AND ADJUST THE DOCUMENT ATTACHED. USE WESTERN GRAMMAR AND MAKE SURE PAPER PAKES SENSE. THE PAPER ADDRESSES THIS QUESTION.

Should organizations use software service providers for all their software needs? Why or why not? What management, organization, and technology factors should be considered when making this decision?

Describe the limitations of using Access in this fashion, and describe the pros and cons of using a single enterprise-scale relational database management system instead.

The Database Models, Languages and Architecture

The company you are working for currently uses an Access database at its various locations. Your manager asks how many total customers the company is currently servicing. It is important to have a single central view into the data, but the use of Access at the many sites makes this task difficult.

Describe the limitations of using Access in this fashion, and describe the pros and cons of using a single enterprise-scale relational database management system instead. As you describe the benefits of an RDBMS, also discuss its features and components. Finally, you hear coworkers interchange the term database and DBMS; describe the difference of the two terms and how they work together. Your post should include the following details:

A description of Access and its limitations in a distributed business model

The features and components of an RDBMS

The pros and cons of an RDBMS

The difference between a database and DBMS

Describe how and why the company can benefit from spending time planning at the beginning of the project, instead of just jumping in and developing the applications to meet the perceived needs.

The Database Models, Languages and Architecture

The current database that your company is using keeps track of all of the customers and suppliers as well as products offered for sale, but the current environment has all of this data spread out across multiple different databases and it is difficult to see a complete picture of the environment.

To start, your manager would like to understand the benefits of following a formal design methodology, especially with respect to database design. Describe how and why the company can benefit from spending time planning at the beginning of the project, instead of just jumping in and developing the applications to meet the perceived needs. To ensure that you give the best response, you choose to describe the 3-level ANSI-SPARC architecture and want to make sure you discuss how the use of this will promote data independence to save time in the long run.

 

Explain your approach to enable Kubernetes and maintain server hardening.Determine if the hardening approaches will be effective against cyber attacks.

Enable Kubernetes and Maintain Server Hardening

Your IT manager is determined to use Kubernetes within the Windows Server environment. If the manager tasks you to configure this structure,

• Explain your approach to enable Kubernetes and maintain server hardening.
• Compare your response to those of your peers and
• Determine if the hardening approaches will be effective against cyber attacks.
• Justify your ideas with specific examples.

 

Identify the broad outline of the field of information systems and identify a number of key research areas within the constraints of the unit.

Research project in digital innovation

At the end of the course and having completed the essential reading and activities students should be able to:
• Identify the broad outline of the field of information systems and identify a number of key research areas within the constraints of the unit.
• Select a study topic within the field of information systems and relate it to broader themes and debates within the field.
• Locate and review materials within the specific areas of interest, going beyond standard
textbooks and including academic research literature.
• Design a research project, assess the resources and skills required to undertake it and prepare a plan.

Evaluate data asset classification levels for CIA Triad.Identify adequate data handling controls for operations, namely, access control , encryption and monitoring for high, moderate, and low sensitive data.

Security and threat management

Shows the operating landscape of Smart Care. The main Smart Care participants include patients, healthcare service providers,
pharmaceutical companies, regulatory bodies and Government entities.
Once you have moved from the Boardroom to the Break room, you have scribbled down the following requirements that you aim to complete as a
set of activities as part of the more complex process:
Question 1: Identify data assets, their owners, their sensitivity level and specify data handling controls:
a) Identify data assets
b) Identify data asset owner for all identified 15 data assets .
c) Evaluate data asset classification levels for CIA Triad.
d) Identify adequate data handling controls for operations, namely, access control , encryption and monitoring for high, moderate, and low sensitive data.