Security Architecture and Design

Week 3 Group Discussion,I need this by Thursday. Minimum 300 words.

1. Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do?

Week 3 Lab Assignment I need this by saturday

2. Instructions: Using MS Access, create two tables. Input records. Establish a relationship between tables and create reports:

Create the table below.

File Name: Client_typeyourname

DO NOT DELETE THE ID FIELD!!!!!!

For each table, input 10 records.

A. Table Name: Client Information

B. Input 10 records. Make-up the data.

C. Create table TWO.

DO NOT DELETE THE ID FIELD!!!!!!

For each table, input 10 records.

Table Name: Client Amount

D. Establish a relationship using the ID key.

E. Create reports. Modify the reports as required.

Fields to use: First, Last, Phone, Amount, State

Report 1 – Use the name below that is in bold letters as the title.

Title: Client Information – Type your name

Fields to use: SSN, First, Last, Phone

Report 2 – Use the name below that is in bold letters as the title.

Title: Client General Information – Type your name

Fields to use: SSN, Phone, First, Last, State, Amount

Report 3 – Use the name below that is in bold letters as the title.

Title: Client Data – Type your name

F. Upload the MS Access file. This should be ONE file.

Week 3 Individual Assignment I need this by saturday Minimum of 600 words

Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences.

1. What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?

2. How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation— add up to a system’s particular risk posture?

Organ Leader & Decision Making

RR Communications Case Study I need this by Saturday Minimum 850 words

1. Read the RR Communications Case Study on pages 178-181 in the textbook. Answer Discussion Questions 1-3 at the end of the Case Study. Your responses must be complete, detailed and in APA format.