Analyze what is more important among these three dimensions of security in a system or application.

Three dimensions of security

Confidentiality, integrity, and availability, or the CIA triad of security, is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Use this forum to provide three examples and justification:

1. Where the confidentiality of a system is more important than the integrity or availability of that system.
2. Where the integrity of a system is more important than the confidentiality or availability of that system.
3. Where the availability of a system is more important than the confidentiality or integrity of that system.

For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Using an organisation of your choice as an example, write an essay on how the organisation can design, host, market, and host a digital platform to offer its products and/or services online. In your essay, critically discuss and justify your proposed database designed for the digital platform, taking into consideration the entities, attributes, data types, keys, and relationships.

Digital transformation

Your expertise in the application of digital technologies in business and society is required as the world slowly recovers from the COVID-19 pandemic. Many organisations are leveraging digital technologies to redesign products, services, business models, etc. and to support their digital transformation drive. For instance, with the support of digital technologies, some organisations have transitioned online to enable them to adapt to the pandemic. Similarly, other organisations are using the pandemic as an opportunity to completely digitalise their operations.

Task:
Using an organisation of your choice as an example, write an essay on how the organisation can design, host, market, and host a digital platform to offer its products and/or services online. In your essay, critically discuss and justify your proposed database designed for the digital platform, taking into consideration the entities, attributes, data types, keys, and relationships. In addition, discuss how you would market the new digital platform taking into consideration the marketing channel, platforms, etc and provide appropriate justifications for your decisions. Lastly, critically discuss how you would host the new digital platform and provide appropriate justification for your choice. Specifically, your essay should contain:
• Logical and relational designs of the digital platform’s database which should include a minimum of five (5) entities with associated attributes, keys, relationships, etc clearly outlined.
• A marketing plan for the organisations’ new digital platform and why this plan would work.
• A hosting plan for the platform and why this is suitable.
• Discuss how this new digital platform impacts the organisation’s business model.

Compare and contrast two different operating systems from the following list : Windows, Ubuntu, Apple Mac OS, Android, Blackberry OS, and Apple iOS.

Project 2

Compare and contrast two different operating systems from the following list : Windows, Ubuntu, Apple Mac OS, Android, Blackberry OS, and Apple iOS.

Write a report on how much it follows the guidelines of the National Institute of Standards and Technology.

National Institute of Standards and Technology

Go to https://txwes.edu/media/twu/content-assets/documents/it/policyprocedures/firewall-policy.pdf.

Read and compare against the guidelines in http://csrc.nist.gov/publications/nistpubs/800-41-
Rev1/sp800-41-rev1.pdf.

Write a report on how much it follows the guidelines of the National Institute of Standards and Technology. You don’t have to use the firewall policy from http://www.txwes.edu; you can use any firewall policy from a big organization to compare against the guidelines.

In children between the ages of 8 to 12, what are the detrimental effects on the brain with prolonged technology use in comparison to limited exposure?

Systematic review

Systematic review on the following research question: “In children between the ages of 8 to 12, what are the detrimental effects on the brain with prolonged technology use in comparison to limited exposure?”. The specific time frame while researching data across various databases was set between the years of 2012-2022 to ensure adequate, up to date research on this topic.

Write a paper about how qualitative data is analyzed. Demonstrate a clear understanding on how qualitative data is analyzed.

Analysis

Write a paper about how qualitative data is analyzed. Cite at least 3 qualitative dissertations published within the last 3 years, along with other sources as needed. Share enough information that you have demonstrated a clear understanding about how qualitative data is analyzed.

Create a 1-page Smart Art graphic in a Microsoft® Word document comparing generational learners using digital learning. Incorporate cognitive and psycho social development factors in this comparison. Write a 700- word reflection evaluating the future impact of these generational differences on learning. Substantiate your claim by incorporating paraphrased material from your two scholarly articles.

Smart Art graphic in a Microsoft® Word document

Use the University Library to locate two scholarly articles on generational differences and digital learning.

Create a 1-page Smart Art graphic in a Microsoft® Word document comparing generational learners using digital learning. Incorporate cognitive and psycho social development factors in this comparison.

Write a 700- word reflection evaluating the future impact of these generational differences on learning. Substantiate your claim by incorporating paraphrased material from your two scholarly articles. Follow APA guidelines.

NOTE: In your Microsoft® Word document, click on Insert, and then Smart Art. Identify an appropriate Smart Art graphic. Use the text pane to add information to the chart. In the same document, write your reflection response below your chart1.

Review the Agricultural to Industrial to Idea Economy Education table on page 13 of Getting Smart: How Digital Learning is Changing the World. Select one of the factors listed and explain how digital experiences changed learning.

How Digital Learning is Changing the World

Respond to the following in a minimum of 175 words:

Review the Agricultural to Industrial to Idea Economy Education table on page 13 of Getting Smart: How Digital Learning is Changing the World (Vander Ark, 2012).

Select one of the factors listed and explain how digital experiences changed learning.

How has Women Who Code impacted your career, and why is it important to you?

 Women Who Code

How has Women Who Code impacted your career, and why is it important to you?

 

Chose an emerging technology to solve just one of Techfite’s, a fictional company, many IT issues.

Techfite Emerging Technology Proposal

Chose an emerging technology to solve just one of Techfite’s, a fictional company, many IT issues. Examples of technologies that may count as emerging include: Arctic Wolf Security Operations Center as a service(SOCaas) and Servicenow integrated risk management (IRM). If you find your own solution that you feel will be easier to write about please ensure it counts as emerging using the Gartner Hype Cycle. Also, Reddit searching WGU c850 may provide insight into what other students may do for this paper.