Select two specific pieces of items, equipment or technology that are critical to your chosen commodity. Explain why these items are critical to the operation, how they improve the task they are designed for and why the machinery is unique compared to another option.

Agricultural industry equipment

You will need to select two specific pieces of items, equipment or technology that are critical to your chosen commodity. You will explain why these items are critical to the operation, how they improve the task they are designed for and why the machinery is unique compared to another option. Make sure you don’t just list an item like “tractor” you must identify a specific item such as the JD 6410 4wheel drive Tractor because of the efficiency on fuel, longevity of the tractor, and it has the power range needed to power the rest of my equipment.

Create an Entity Relationship Diagram (ERD) of the normalized version of this table using Visio’s crows-foot notation. The ERD should show the PK and FK columns, plus all of the appropriate column attributes (column name, data type/size, null/not null) plus the relationships (with minimum and maximum cardinality) between tables.

To demonstrate your understanding of using ERDs and solving the multi-column problem

Assignment: This is a continuation of the previous Assignment 3 as an example of a horrible database design. Create an Entity Relationship Diagram (ERD) of the normalized version of this table using Visio’s crows-foot notation. The ERD should show the PK and FK columns, plus all of the appropriate column attributes (column name, data type/size, null/not null) plus the relationships (with minimum and maximum cardinality) between tables.

Create a new database, and name it ABCPublish-FirstnameLastname. Save it onto your computer. In this database, create two tables (Authors and Textbooks) from scratch, using the field information and data records provided above.

DISCUSSION QUESTION

Your Tasks in this Assignment
1. Create a new database, and name it Publishable-FirstnameLastname. Save it onto your computer.

2. In this database, create two tables (Authors and Textbooks) from scratch, using the field information and data records provided above.

3. Import the third table – Authorship Log from the spreadsheet file provided.

4. Create a relationship board with all three tables and two relationships.

Your completed relationship board should look similar like the data model on Page 1 of this instruction document (symbols would be slightly different though).

List three social media platforms you would use to promote your brand and explain why you have chosen the platform. Research niche platforms. Would a niche platform benefit your brand? How? or Why not?

Niche platforms for real estate business

List three social media platforms you would use to promote your brand and explain why you have chosen the platform. Research niche platforms. Would a niche platform benefit your brand? How? or Why not?

After learning about tort laws in this module, address the following questions: How are tort laws helpful in protecting against invasion of privacy? What limitations do internet torts have? How can people protect against these limitations?

Discussion: Principles of Tort Law

After learning about tort laws in this module, address the following questions: How are tort laws helpful in protecting against invasion of privacy? What limitations do internet torts have? How can people protect against these limitations? Include an example that illustrates the difference between internet torts and traditional torts.

Review the Point-Counterpoint on page 95 regarding loyalty. Discuss your views on this debate. Include examples from your experience that support your arguments.

Employer-Employee Loyalty Is an Outdated Concept

Review the Point-Counterpoint on page 95 regarding loyalty. Discuss your views on this debate. Include examples from your experience that support your arguments. Include a title page and reference list (no abstract). Include citations and references.

  • https://www.proficientwriters.com/download/26869810-1af0-4508-8fc7-8bfa3ef09313

Write in the template provided by the instructor and then develop a PowerPoint in relations with understanding the topics for this week. Write about all three topics per column in the K-W-L

Humanities Question

PowerPoint Presentation. Learning how to use PowerPoint is vital due to the business world of today. Technology has changed our dynamics into a dynasty of which you must become familiar in order to stay current with today’s trends.

  • You are to write in the template provided by the instructor and then develop a PowerPoint in relations with understanding the topics for this week.
  • Write about all three topics per column in the K-W-L

Outline security operations program activities. Select three methods to monitor events and detect suspicious activity. Compare the relationship between security monitoring and incident response.

Security Operations Program

Scenario: After the security team investigation of the Petya ransomware attack, it is determined that several critical security patches were missing from the CFO’s computer that led to the infection. Furthermore, the ransomware spread across the network to other connected systems, including the servers that manage online credit card transactions and personal records of past and present students. Due to the nature and extent of the cyberattack, you decide to call on your computer security incident response team (CSIRT) to track down other infected systems, clean them up, and restore any lost data. While the CSIRT responds to the threat, the chief technology officer (CTO) emails you asking for details of the tools the incident response team will be using and what other mechanisms should have been in place to detect the cyberattack.

As you are preparing a response to the CTO, the CSIRT team lead comes to your office and informs you that they have evidence that someone extracted personal information of staff members and students during the ransomware attack. You immediately contact your on-call security vendor to conduct a digital forensics investigation. As part of the communication and planning to address these issues, you decide to create some guidance.

Part 1

Using the Wk 5 Assignment Template, create a 2- to 3-page security operations program outline in which you:

  • Outline security operations program activities.
  • Select three methods to monitor events and detect suspicious activity.
  • Compare the relationship between security monitoring and incident response.

Part 2

Write a 1- to 2-page email response to the CFO and CTO in which you:

  • Select five incident response tools.
  • Outline event monitoring and detection, stating the purpose of each.
  • Explain response and recovery, and describe their importance from your current perspective.
  • Frame a digital forensic investigation, and explain the three benefits they can provide.
  • Format your references according to APA guidelines.

Note: Images should not be copied unless author permission is obtained or copyright-free images are used.

Research and compare some of the current SIEM products on the market. As the CISO presenting to senior management, prepare a 1- to 2-page recommendation summary of your recommendation. Describe the capabilities you are looking for as a CISO.

Security Information and Event Management

The readings from Wks 4 and 5 in Security Operations Center: Building, Operating, and Maintaining your SOC covered SOC operations. One of the tools of the SOC is the use of a Security Information and Event Management (SIEM) system. Many vendors provide these systems. We read in Wk 4, “Taking the same multiple failed login attempts example used in the discussion about first-generation SOC, the Microsoft Windows systems would most likely be configured to forward logged events to a SIEM tool.

The SIEM tool should be capable of receiving, parsing, normalizing, and correlating the different events and eventually alerting a security analyst that there have been multiple login failures for the account “administrator” on multiple systems. This behavior could indicate a possible brute-force attack, assuming that the SIEM tool is configured with correlation rules that can detect and assign a relevant and meaningful alert to this suspicious activity.“ By using a SIEM tool, we are able to correlate events from multiple devices. This allows the SOC to identify patterns that may have been overlooked by an administrator.

Your company does not currently have a SIEM. You are standing up a SOC and want to add a SIEM as a tool for your team.

Research and compare some of the current SIEM products on the market.

As the CISO presenting to senior management, prepare a 1- to 2-page recommendation summary of your recommendation. Include:

  • Recommended SIEM tool for your company.
  • List two reasons for choosing that SIEM.

Describe the capabilities you are looking for as a CISO.

In at least 300 words, discuss your thoughts on harm reduction programs and whether they are effective in reducing harm within communities.

Short 300 word response

Several states have developed “harm reduction” laws or policies in an effort to curb the spread of disease that is often attributed to intravenous drug use or other drug use. This often includes needle exchange programs or other educational programs. In at least 300 words, discuss your thoughts on harm reduction programs and whether they are effective in reducing harm within communities.