Explain the purpose of PCI DSS. Analyze business factors that influence PCI DSS compliance. Describe potential consequences of failing to demonstrate PCI DSS compliance.

PCI DSS Compliance Requirements

To complete the project, you will need the following:
1. Course textbook

2. Access to the Internet to perform research for the project

  1. PCI Security Standards Council:
    https://www.pcisecuritystandards.org

  2. Important PCI Compliance Information for Merchants:
    http://www.pciassessment.org/pci-dss-framework/merchants

  3. COSO Internal ControlIntegrated Framework Executive Summary (2013):
    http://www.coso.org/documents/990025P_Executive_Summary_final_may20_e.pdf

  4. COSO Internal ControlIntegrated Framework PowerPoint (2013):
    http://www.coso.org/documents/COSOOutreachDeckMay2013.pptx

  5. COSO Internal ControlIntegrated Framework (2013) whitepaper:
    http://www.kpmg.com/Ca/en/External%20Documents/Final-New-COSO-2013-
    Framework-WHITEPAPER-web.pdf

Note: The 2013 version of the framework is also available for purchase, or you may be able
to retrieve it through your school.

Learning Objectives and Outcomes
You will be able to:

  • Explain the purpose of PCI DSS.
  • Analyze business factors that influence PCI DSS compliance.
  • Describe potential consequences of failing to demonstrate PCI DSS compliance.
  • Apply standards and frameworks to the development of information security internal control
    systems
    .
  • Analyze the use of information security controls within IT infrastructure domains.

Define the term using between 50 and 100 words. Share an actual application for the function.

MAKE UP ASSIGNMENTS

For each of the functions identified below, perform the following:

  1. Define the term using between 50 and 100 words. Cite the reference you use for your definition (web site, blog, etc.) by using URL or page.
  2. Share an actual application for the function. You can copy and paste something you find online (provide the reference) or create your own example using Excel or Access.

Excel Chapter 2

Exercise 1
• Relative cell reference
• Absolute cell reference
• Mixed cell reference

Exercise 2
• Sum function
• Average function
• Median function
• Min, max, count function
• Today function

Exercise 3
• VLookup function
• PMT function
• IF function

Excel Chapter 3
Exercise 1
• Clustered column chart
• Bar chart
• Pie chart
• Combo chart

Exercise 2
• Format chart titles
• Add and format axis titles and format axes
• Add and format data labels
• Format chart area

Exercise 3
• Apply chart style
• Apply chart filter
• Insert and customize sparklines

Excel Chapter 4
Exercise 1
• Freeze rows and columns
• Display and change page breaks
• Set and clear a print area
• Print titles

Exercise 2
• Create a table
• Rename the table
• Add and delete fields in table
• Add records in table
• Remove duplicate rows in table
• Apply table style

Exercise 3
• Create a structured reference in a formula in a table
• Sort one field in a table
• Sort multiple fields in a table
• Create a custom sort in a table
• Apply text filters in a table
• Apply a number filter in a table
• Apply a date filter in a table

Exercise 4
• Add a total row in a table
• Apply highlight cell rules in a table
• Specify top/bottom rules in a table
• Display data bars in a table

Access Chapter 1
Exercise 1
• Open, save, and enable content in a database
• Recognize database object types
• Modify data in table datasheet view
• Add records to a table
• Delete records from a table
• Use database utilities

Exercise 2
• Use a selection filter to find exact matches
• Use a selection filter to find records containing a value
• Use filter by form
• Sort table data
• View relationships

Exercise 3
• Create a database using a template
• Add records to a download desktop database
• Explore the database objects in a downloaded desktop database template

Access Chapter 2
Exercise 1
• Create a table in datasheet view
• Delete a field and set a table’s primary key
• Work with field properties
• Create a new field in design view
• Modify the table in datasheet view

Exercise 2
• Import Excel data
• Import data from an Access database
• Modify an imported table’s design
• Add data to an imported table
• Establish table relationships
• Enforce referential integrity

Exercise 3
• Use the query wizard
• Specify query criteria and sort order
• Change query data and run, copy, and modify a query

Exercise 4
• Add additional tables to a query
• Create a multitable query
• Modify a multitable query
• Summarize data using a multitable query

Explain the importance of digital transformation for organizational success and gaining competitive ad-vantage in healthcare industry.

Digital Transformation

Explain the importance of digital transformation for organizational success and gaining competitive ad-vantage in healthcare industry.

What is the impact of IOT device data breaches using 5G networks to the organization and stakeholders who rely on the device? How can data breaches of IOT devices on 5G networks be mitigated or prevented?

Influence of 5G Technology on IOT Devices and The Vulnerabilities Associated

Problem Statement:
The onset of 5G technology provides data speeds up to ten times faster than legacy LTE, with this in mind, it is reported that IOT devices are expected to increase from 700 million devices currently to 3.2 billion by 2023. While there are numerous factors for the exponential increase of IOT devices, one of the main reasons is 5G technology. As a result, a couple of issues arise, each relating to cyber security; one issue specific to the 5G network and the other to IOT devices. Legacy LTE was a hardware based network, 5G technology is a distributed software design. The hardware based network allowed for choke points where security could be implemented, 5G technology does not allow this. With so many IOT devices coming online and many of them having multiple access points (5G/WIFI/BlueTooth), an exploitation via 5G could give a bad actor access to the other networks linked to the IOT device.
This study will contribute to the current literature by explaining how not only 5G technology influences IOT devices but also what security vulnerabilities come about as a result.
The importance is to provide ideas on how to minimize or mitigate risk to IOT devices that use 5G technology.

Research Questions:
What are the causes of IOT device data breaches within 5G networks.
What is the impact of IOT device data breaches using 5G networks to the organization and stakeholders who rely on the device?
How can data breaches of IOT devices on 5G networks be mitigated or prevented?

Build new features to improve the UX for the Hazardous Waste Management Program in the DTSC official website. Create shortcut to create Solr Schema template and assists users to locate the errors immediately in VS Code.

SOFTWARE ENGINEERING EXPERIENCE

California Department of Toxic Substance Control Board Oct 2021

– Software Engineer Sacramento, CA

Build new features to improve the UX for the Hazardous Waste Management Program in the DTSC official website.

– Implement a map component for the website to assist users to look up HWMP facilities

Blackrock Inc

Software Engineering Intern  CA

– Re-designed and implemented an internal-use webapp (ADL Visualizer) to replace the old PHP version with an easy-to-maintain code base and intuitive GUI using React.js and Java

– Significantly saved the old app users time by adding auto complete features instead of manually typing

– Implemented a VS code Solr schema plugin with color highlighting and debugging features

– Create shortcut to create Solr Schema template and assists users to locate the errors immediately in VS Code

– Ensures the Solr Schema files are correctly formatted before attempting to initialize the database table

PROJECTS

BSOE Computer Equipment Inventory (Java)

Backend, Product Owner, Senior Project of UCSC

– Lead the design procedure with team, draft UML diagram, sprint plans, explain release plan to customer

– Use Sprintboot and Spring JPA to host a RESTful API server and do queries in MySQL database

– Integrate the authentication module with Google Sign-In to secure the web-app restricted to UCSC’s faculties

Aladdin Database Visualizer (Java)

Backend, Blackrock Inc.

– Developed a cross platform desktop application with electronjs that capable of deploying to the “Genie” tool bar

– Used Springboot to implement a Java server that utilizes Apache Solr API to query the ADL database

– Used React.js and Material-UI to build a responsive GUI that gathers data from the Java server endpoints

BulletinBoard Discord Bot (JavaScript)

Full Stack, UC Santa Cruz

– Created a discord bot that can push important notifications from school discord servers via direct messages

– Used docker to containerize the bot and run the bot on AWS EC2 instance

– Created a database (SQLite) for the bot to store users’ subscriptions and used Sequalize in the server to query data

– https://github.com/zkml/discordbulletinbot

Blackjack AI (Java)

– Utilized the card counting strategy inspired by the book “Bringing Down the House” by Ben Mezrich

– Designed a blackjack simulator that simulates 500,000 games per second to verify the strategy

-Successfully found a must-win formula that guarantees making average of 10% profit every 50 games

– https://github.com/EdwinKam/Blackjack_AI

Write and upload a personal statement on why you are pursuing a master’s degree in cybersecurity.

Cybersecurity

Write and upload a personal statement on why you are pursuing a master’s degree in cybersecurity. The statement should specify which track. you are applying to, why you selected that track, and your professional goals for pursuing this degree. If relevant, include content that describes your previous professional work in cybersecurity and academic research you have performed.

Are you planning to start a new career or advance in the field or position you currently have? What skills, certifications, or experience do you need to reach this goal?

Statement of Purpose

Technical skillset:

Starting or advancing your technical career starts with a personal assessment of your technical skill level. CIAT supports students at all levels (from beginners in the field to working IT professionals advancing their careers), so be honest about your strengths and weaknesses, so that we can match you with the right program.

Career plans:

Tell us about your career goals. Are you planning to start a new career or advance in the field or position you currently have? What skills, certifications, or experience do you need to reach this goal? If you’re brand new to the tech field and don’t know where to start, that’s what we’re here for. Be honest about what level of career planning support would help you be successful.

Overcoming challenges:

Committing to your education path takes dedication and commitment, but your time and energy investment will pay off. Tell us about a time when you’ve overcome a challenge (academic challenge, personal/family challenge, career challenges, etc.) and learned a valuable lesson.

Choosing CIAT:

We approach education differently. We believe your education should be centered around building confidence in your technical skills and helping you graduate ready to tackle the workforce. How is your CIAT program going to help you achieve your personal and career goals?

About You:

What else would you like us to know about you? Who is part of your support network as you pursue your education? Feel free to share details about yourself, your background, your family, your personal passion projects, or more. The more we know about you as an individual, the more we can support you.

The theories of change management add insight to how users deal with change. Discuss how they deal with change. Discuss the advantages of having a qualified project manager manage an organization’s information security project.

Theories of change management

You will be evaluated on how well you comply with each requirement. This assignment should take not less than 4 (four) pages. Include the selected question(s) with the completed answer.

1. Research and write a (2) two page paper about various elements of the outsourcing process—RFP, evaluation, contract award, and exit strategies.

Fully explain each of those concepts.

2. The theories of change management (based on the Lewin Model) add insight to how users deal with change. Discuss how they deal with change.

Research and write 1 pages about each.

3. Discuss the advantages of having a qualified project manager manage an organization’s information security project.

When Tidwell refers to a “user” who is this referring to? What is important for an Interface Designer to know about a “user”? Why? Describe any surprises you found about Interface Designers. Explain why?

Organizing the Content

After reading the assignment for Tidwell, et al., (2020) answer the following questions:

1. When Tidwell refers to a “user” who is this referring to?

2. What is important for an Interface Designer to know about a “user”? Why?

3. Describe any surprises you found about Interface Designers. Explain why?

Discuss a book that you consider great. We want to learn both about the ideas in the book and about you. What makes this book great in your view? What effect has it had on what you think or how you think?

The fiction novel 1963 from Stephen King

The paper must be about what you think is great about the book. what it has made you think about. made you think about the consequences of actions and how we all can have a great effect on people through our actions.

“Discuss a book that you consider great. We want to learn both about the ideas in the book and about you. What makes this book great in your view? What effect has it had on what you think or how you think?”