Part 2A: Major Events Documentation Scenario: You visit a retail establishment

 
Part 2A: Major Events Documentation
Scenario: You visit a retail establishment, shop around, and finally carry several products to one of the point of sale (POS) terminals visible around the store. You produce a credit card and the salesclerk processes the transaction, bags your goods, and hands you the receipt. On your way to the exit, a store employee asks to see your receipt and inspects the contents of the store bag. Document each of the major events just described and then describe the events in terms of the PCI compliance standard. Include this report in your assignment.
Part 2B: PCI Compliance
This part will cover PCI. Please refer to Figure B-1A in your responses.
Respond to and address the following:
Suppose HGA’s data server, depicted in Figure B-1, stored cardholder data in the private databases. What steps should be taken to protect that data in order to be PCI compliant?
HGA’s data server has network connectivity. Assuming that cardholder data is transmitted across these networks, describe how data should be protected in transmission.
Users are located at various sites connected to the HGA network. Suggest appropriate access controls to restrict unauthorized users from looking at cardholder data.
The PCI specification notes that all systems and network devices connected to a system that stores, transmits, or processes cardholder data is in scope and must comply with PCI specifications. To avoid having the whole network subject to PCI specifications, how would you partition the network to reduce the scope of compliance?
 Submit the usual double-spaced APA-styled report. At least four pages of material are expected beyond the title page, table of contents, abstract, and references page. 

One of the most important documents within a project is the project charter. Rev

One of the most important documents within a project is the project charter. Review the research to learn more about what is commonly found within a project charter. Using your research, evaluate the project charter below.
Project Title: SIS Implementation Date: April 7, 2000
Scope and Objectives: Everywhere University is undergoing rapid growth resulting in an urgent need for a more efficient access to internal and external policies related to the student experience and programs. To this end, we are implementing a new p Student Information System Portal that will satisfy both these needs and will enhance communication across the organization.
Defining Conditions, Constraints, and Assumptions: The SIS must be operational on the last day of the Spring semester.
Staffing: The project manager will determine the skill requirements for the project and provide them, along with specific team member names, by June 1 to the appropriate functional managers. The project manager is authorized to have one clerical person to assist. Because of other campus priorities, the project team is limited to no more than 2 technical members without specific authority from the President.
Communications: Status reports will be provided to the President, the Deans, and the Project Sponsor bi-monthly.
> What sections are missing from this document?
> Why are they important?
> Recreate this project charter to include those sections and offer suggested wording.
> What are the remaining areas which may need to be refined to prevent “scope creep”?
Outline your plan addressing these issues and other issues.
Need 8-10 pages in APA format with minimum of 9 peer-reviewed citations. Must include introduction and conclusion.

Effective cybersecurity often involves layering different control measures to ac

Effective cybersecurity often involves layering different control measures to achieve robust defense in depth. In this discussion, you will perform the process of layering. In Module Six, you completed a lab activity on closing security holes, and for part of that activity, you reconfigured a host-based firewall and applied a security patch that, in concert, defeated an exploitable system vulnerability.
For your initial post in this discussion, describe a different security measure you would apply to reduce the negative impacts of an attack on at least one of the following: organizational systems, operations, or personnel. Explain how this measure would work and evaluate its likely effectiveness. 

Whether you are an expert witness on the stand, working with your organization’s

Whether you are an expert witness on the stand, working with your organization’s attorney, or speaking to a group of C-level executives, you need to communicate technical information in a consumable fashion. In your initial post, discuss some techniques that you might use to convey technical topics to non-technical people. 

  Instructions: You must submit a rough draft at the end of Week 5. This is to b

 
Instructions:
You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final draft at the end of Week 8
Include in the paper: A description of the scope and principal features of writing a technical paper, cite core theories and practices, and offer a similar explication (explanation) of a related field such as business field that would benefit from technical writing.
1) 10 pages (double-spaced).
2) Choose any technical topic to write your report about.
3) Identify the purpose and audience of your report.
4) Use at least seven references outside of your textbook (you may use your textbook too, but are not required to).
5) In addition to the required number of pages for the assignment, you must also include an table of contents, reference page (bibliography), written in APA style (see Appendix B), and a title page. Be sure to give all of your papers a descriptive title!
6) Use your approved topic.
7) Use your approved outline.
8) Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
9) Arial 11 or 12-point font or Times New Roman styles.
10) Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
11) Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly!
Submission Instructions: Submit your Rough Draft. See attached rubric for further guidance.

  Instructions Goal: The goal of this assignment is to research your topic, eval

 
Instructions
Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources.
Description: 
During the Week 3 Assignment, Project Plan, you chose a topic and created your project plan. In the Week 3 Lesson, you read about location and access and in Week 4, you learned about organizing your digital information and storing that information responsibly. Now it is time to take the work you did in the Week 3 Assignment, Project Plan, and locate and evaluate sources  (CO2 & 5) that that will lead to your Week Week 7 Assignment, Final Project. 
Please follow these instructions: 
Download the Source Evaluation Worksheet template (in Word).
Complete Parts I and II in the worksheet.
Find a minimum of three (3) sources. One (1) source must be an academic source and from the APUS Trefrey Library and the other sources must be credible and appropriate for college research.
Please include robust source summaries in your own words that explain the contents of the source and the relevance of the source to your topic.
Consider the following: 
Once you complete the Source Evaluation Worksheet, please upload the completed worksheet.
See the COMM120 Week 5 Source Evaluation Rubric for grading guidelines.
Attachments
Source Evaluation Worksheet Template.docx(16.19 KB) 
IVE ATTACHED WEEK THREES OUTLINE