Categories
IT Management

Discussion 1: current events

Discussion 1: Current Events
No unread replies.No replies.
COURSE OBJECTIVES:
Gain an understanding of the Cyber Forensics Profession
Overview
Post your weekly current event discussion here. The topic of your posting should be related to information assurance since that is our class title.
A Current Event is simply a newsworthy item that helps us to stay current on what is going on in information security today. You can select any reputable source to find your current event.
Guidelines & Expectations
Please give your analysis of the event and provide a link.
Deliverables
To receive full credit for this discussion, submit an original post in the discussion arena below. Then, respond to 2 other students posts. Remember, this is meant to be a discussion, so add some new information in your replies. Be objective, clear, and concise.
NOTE: To receive full credit, original post due by Friday. Peer responses are due by Sunday.

Categories
IT Management

However, one always needs an active internet connection to use this system.

This project focuses on developing an e-Authentication system using a combination of QR code and OTP
for enhanced security. The e-Authentication system is designed to avoid hacking accounts through
shoulder surfing and misuse of login credentials. To be able to use the system, an online user must first
register by entering the basic registration details (name, address, zip code, etc.). Once the registration is
complete, the user can access the login module to authenticate the account by entering the email ID and
password combination they used during registration. Then, the user can proceed to the next
authentication step using either QR (Quick Response) code or OTP (One Time Password). As per the
option selected by the user, the system will generate a QR Code or an OTP. While the QR code will be
sent to the user’s email address, the OTP will be sent via SMS to the registered mobile number. The
system randomly generates the QR Code and OTP at the login time. It makes the login more secure.
However, one always needs an active Internet connection to use this system.

Categories
IT Management

However, one always needs an active internet connection to use this system.

This project focuses on developing an e-Authentication system using a combination of QR code and OTP
for enhanced security. The e-Authentication system is designed to avoid hacking accounts through
shoulder surfing and misuse of login credentials. To be able to use the system, an online user must first
register by entering the basic registration details (name, address, zip code, etc.). Once the registration is
complete, the user can access the login module to authenticate the account by entering the email ID and
password combination they used during registration. Then, the user can proceed to the next
authentication step using either QR (Quick Response) code or OTP (One Time Password). As per the
option selected by the user, the system will generate a QR Code or an OTP. While the QR code will be
sent to the user’s email address, the OTP will be sent via SMS to the registered mobile number. The
system randomly generates the QR Code and OTP at the login time. It makes the login more secure.
However, one always needs an active Internet connection to use this system.

Categories
IT Management

Complete the project by following the attached instructions and edit the ms acce

Complete the project by following the attached instructions and edit the MS Access Document that is in the attached word file (For some reason I couldn’t upload MS Access documents so that’s why it’s attached to a word document) s.

Categories
IT Management

Hopefully i will have everything needed back by this upcoming week.

Still awaiting feedback on the other documents that I will provide for this assignment. Hopefully I will have everything needed back by this upcoming week.

Categories
IT Management

You can use this test plan template to complete this activity, or you can create your own test plan.

Please use the attached test plan template for the assignment Overview Imagine that you are a systems analyst on the project team that is developing an IT system for Millennia HealthCenter, as described in the business case you saw earlier in this course. The same team is almost finished developing the system, and is about to start the testing phase. Before the team starts on the testing tasks, you have been asked to create the system test plan. Your test plan will ensure that all features within the developed solution have been validated. The plan will also ensure that when the system is tested in the future, what has been tested and all test results have been documented. Prompt To ensure that your test plan will test the functionality of the system in the projects, you should refer to the activities you completed in Module Two and Module Four, as well as Project One in Module Five. Reviewing the business case, use case diagrams, use case specifications, and system requirements specification can help you have a better idea as to what kind of testing needs to be prioritized. Your test plan should include the following components: Detailed test procedures, including how each testing task will be completed Who will participate in each testing phase Task dependencies within the testing phase, including when each testing task will be completed What test data will be used This test plan will be used to check the system for readiness. After you have developed your test plan, write a brief reflection on making ethical decisions in the testing phase by thoroughly answering one of the following questions: If you found out that there were bugs in the system after completing several testing tasks, what would you do? If you found some small problems with the system, what would you do? What are the ethical dilemmas if you don’t complete the test plan prior to system launch? You can use this Test Plan template to complete this activity, or you can create your own test plan. Something to keep in mind is that different industries and organizations will have their own templates, whether that’s for test plans, implementation plans, requirements specifications, etc.

Categories
IT Management

Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic.

All firewalls have some type of logging feature. This feature documents how the firewall handled various types of network traffic. The logs, if enabled, provide valuable information like source and destination IP addresses, port numbers, and protocols. You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall. Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic. Provide “screenshots” to document this process. What would you be able to determine from logging the firewall activity?

Categories
IT Management

Why must these steps be addressed before the design begins?

Review the video on CA ERwin Data Modeling. How and why would the use of data modeling software improve the development of data models for an organization? Why must these steps be addressed before the design begins? Video link mentioned above: https://www.youtube.com/watch?v=k5RopAn04Hk This is a discussion piece and only needs 1 or 2 paragraphs. it’s already late so the sooner it can be completed the better.

Categories
IT Management

Overview post your weekly current event discussion here.

Overview Post your weekly current event discussion here. The topic of your posting should be related to information assurance since that is our class title. A Current Event is simply a newsworthy item that helps us to stay current on what is going on in information security today. You can select any reputable source to find your current event. Guidelines & Expectations Please give your analysis of the event and provide a link. Deliverables To receive full credit for this discussion: 1) Submit an original post in the discussion arena below (by Wednesday).

Categories
IT Management

Next view the power point presentation “data manipulation with structured query language ppt.”

o prepare for the discussion, read the article “Bridging the Gap: The Difference Between Data Analysis and Data Modeling.” in the Module Resources folder on data manipulation. Next view the Power Point presentation “Data Manipulation with Structured Query Language PPT.” Discuss the challenges of accurate data analysis upon accurate data modeling. Why would you want to use structured query language (SQL) for database design? What would be the benefits of using SQL to create and manipulate the data in the database? What other ways are there to manipulate data in a database besides SQL? In your response, focus on both the technical challenges and on the data and information management challenges associated with data analysis conducted by business analyst. Links from the above paragraph: https://www.bridging-the-gap.com/data-analysis-data-modeling-difference/ powerpoint document mentioned attached