Computer foundations
Computer foundations :
Required Readings
Read Chapter 11 of the Easttom text, Network Scanning and Vulnerability Scanning
Primary topics:
Understanding how to secure a system
Probing a system for vulnerabilities
Using vulnerability scanning tools
Evaluating potential security consultants
Week Twelve Assignment
Do some basic research on security certifications.
See https://www.giac.org/.
Write a brief summary of certifications that are open.
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.
Write your answers in WORD and submit here.
Sample Abstracts
An abstract is a brief summary of your paper or project.
See this link for samples.
How to Write an Abstract
Follow this link for information on writing an academic Abstract
How to Write a Research Paper
Follow this link to the Purdue Online Writing Lab. You will find detailed information on writing a research paper.
Writing in APA Format with WORD
View this video for a quick overview of using APA format with WORD
Week Twelven Project Abstract
Submit your research paper abstract here.
Attach a WORD document and submit.
Your complete research materials are due next week.
Full Abstract
A PPT presentation for your project
Formal (academic) paper/essay: 900-1200 word, double spaced, written in APA format, showing sources and a bibliography
Database Security :
Required Readings
Required Readings
Review the SQL Server STIG’s here:
https://iase.disa.mil/stigs/app-security/database/Pages/sql.aspx
Required Videos
Required Videos
https://www.youtube.com/watch?v=OxusD0fMWOw
Week 12 Paper
Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.