What type of data would you recommend that consultmatch tracks and stores in a database?

Scenario
You have been asked to design a database system for ConsultMatch, a company that wants to match consultants and clients via an online service.
They have an existing list of 1500 consultants who have signed up so far. For each consultant, they need to display their name, degrees/education, experience, expertise, rate, and previous clients.
Potential clients look for a consultant at ConsultMatch by browsing a free list of consultants or using the ConsultMatch search engine. Once they have found the person who meets their needs, they can sign in to provide an overview of their project via the website.
The potential client needs to provide information about the project: customer name, address, project description, tasks for consultant, preferred starting time, and a sample of the materials if available.
ConsultMatch provides an opportunity for consultants to agree or disagree with a project after reading the description. They can also request more information from the potential client.
Tasks
Design a database for this project.
Show the ER diagram for your database. There should be at least 4 entities with their relations. Clearly describe the symbols you use for your ER diagram (entities, attributes, relationships, cardinalities, etc) – 50 points
Show the corresponding Relational Model with PK, and FK constraints. Show the required vs optional attributes along with data types for each attribute. – 30 points
Show examples of Insert, Update, and Delete statements (DML). – 30 points
Describe at least one stored procedure for this project. Explain why using a stored procedure would be a good idea. Explain what the stored procedure would do. – 50 points
As a software designer, you already know that ConsultMatch will want to do data mining later on. What type of data would you recommend that ConsultMatch tracks and stores in a database? And why? – 40 points

The paper should address why the overall information security planning objective is important and outline methodologies in which an information systems infrastructure can be appropriately secured while ensuring confidentiality, integrity, and availability of the infrastructure.

The paper should address why the overall Information Security Planning objective
is important and outline methodologies in which an information systems infrastructure can be
appropriately secured while ensuring confidentiality, integrity, and availability of the
infrastructure.

Discuss the various ways through which this method can be used to improve an organization’s infosec practices.

Exercise 1:
(a) How many policy documents does the ISO 27000 standard provide? Briefly describe the content areas covered by each of them.
(b) Compare the ISO 27000 series of documents with the NIST documents discussed in Chapter 8. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST program compared to the ISO standard.
Exercise 2: What is SANS SCORE and why is it useful? Review the security policy documents provided by SANS SCORE and discuss contents of the relevant documents available under each of the following categories: (a) Server Security (b) Application Security (c) Network Security (d) Incident Handling.
Exercise 3: What is the fundamental difference between a security management model and a security architecture model? Explain with an illustrative example.
Exercise 4:
(a) What are the key principles on which access control is founded?
(b) What two access control methods that use a state machine model to enforce security? Compare and contrast the two methods by explaining their similarities and differences.
Exercise 5: What is separation of duties? Discuss the various ways through which this method can be used to improve an organization’s InfoSec practices.

For this assignment, you are asked to complete the hudson fisher associates (hfa) bring your own device (byod) registration form (attatched below) to ensure your device meets the organization’s minimum information technology (it) baseline specifications and security requirements.

For this assignment, you are asked to complete the Hudson Fisher Associates (HFA) Bring Your Own Device (BYOD) Registration Form (Attatched below) to ensure your device meets the organization’s minimum information technology (IT) baseline specifications and security requirements. The first part of the assignment requires you to access and document your machine’s specifications.
In the second part, you will provide explanatory details on the specifications.
By documenting your specifications and explaining your results in an effective narrative format, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill. Include a screenshot showing key system information.

Explain how each task can be improved.

Your task in this assignment is to perform a usability evaluation of
an existing e-commerce Website. The assignment should be between 8 –
10 pages each. Including images is highly encouraged to demonstrate
the usability issues within the site.
Use the following points as guidelines when writing the Website Review:
System Identification: What Website are you evaluating? What is its
main purpose, and what are the target users?
Tasks and Activities: As an evaluation participant, what are you
trying to complete with the system? Be sure to identify at least three
use cases. Upon identification, complete each identification path you
are trying to identify, including the strengths and weaknesses of each
task and activity.
Metrics: As much as possible, use measurable criteria as you’ve read
in the Preece text. Identify those methods you’ve applied in your
review of the Website.
Application: Using the Nielsen 10 heuristics for usability
design (https://www.nngroup.com/articles/ten-usability-heuristics/),
explain how each task can be improved.
Assessment: Recommend five changes the Website platform selected can
make to improve its usability posture.

Explain how each task can be improved.

Your task in this assignment is to perform a usability evaluation of
an existing e-commerce Website. The assignment should be between 8 –
10 pages each. Including images is highly encouraged to demonstrate
the usability issues within the site.
Use the following points as guidelines when writing the Website Review:
System Identification: What Website are you evaluating? What is its
main purpose, and what are the target users?
Tasks and Activities: As an evaluation participant, what are you
trying to complete with the system? Be sure to identify at least three
use cases. Upon identification, complete each identification path you
are trying to identify, including the strengths and weaknesses of each
task and activity.
Metrics: As much as possible, use measurable criteria as you’ve read
in the Preece text. Identify those methods you’ve applied in your
review of the Website.
Application: Using the Nielsen 10 heuristics for usability
design (https://www.nngroup.com/articles/ten-usability-heuristics/),
explain how each task can be improved.
Assessment: Recommend five changes the Website platform selected can
make to improve its usability posture.

Discuss what the most significant challenges are to ensure that all these standard elements are effectively implemented in an organization’s coop.

Part 1:
According to NIST (2010), standard elements of a Continuity of Operations Plan (COOP) include: Program plans and procedures, Continuity communications, Risk management, Vital records management, Budgeting and acquisition of resources, Human capital, Essential functions, Test, training, and exercise, Order of succession, Delegation of authority, Reconstitution, and Continuity facilities.
Discuss what the most significant challenges are to ensure that all these standard elements are effectively implemented in an organization’s COOP. Who in the organization should be responsible for the effective implementation of a COOP?
Part 2:
According to NIST (2010), the Information System Contingency Planning Process comprises the following seven steps:
Develop the contingency planning policy;
Conduct the business impact analysis (BIA);
Identify preventive controls;
Create contingency strategies;
Develop an information system contingency plan;
Ensure plan testing, training, and exercises; and
Ensure plan maintenance
Discuss how you would develop and implement an Information System Contingency Plan for a large hospital, or a large government agency, or a major manufacturing facility.

Produce a paper to evaluate the role of adopting cloud computing in accelerating startups’ journey to success, showing the positive the positive effects and value gained by adopting cloud computing along with evaluating cloud computing’s role in mitigating operational risk for startups.

Produce a paper to evaluate the role of adopting cloud computing in accelerating startups’ journey to success, showing the positive the positive effects and value gained by adopting cloud computing along with evaluating cloud computing’s role in mitigating operational risk for startups.

Identify all three ehr software options you have selected for consideration, and include the following in your presentation:

The purpose of this assignment is to compare electronic health record (EHR) software based on the needs of a health care organization. Though not all health care facilities are required to use EHRs to maintain and organize patient files, many medical offices and health practices are becoming increasingly digital to keep up with technology and evolving patient/customer needs.
Assume that you are a health care administrator who oversees a small conglomerate of local clinics. After the recent acquisition of a physical therapy clinic, it was brought to the attention of key stakeholders that the clinics were all operating with different electronic health records software, which was affecting interoperability between clinics. In an effort to streamline communication and improve efficiency, the CEO has asked you to look up some options for a new EHR software to implement across all of your health network’s clinics.
Research the different types of electronic health records software on the market and choose the top three that would prove most beneficial to your health network. In a 6-12 slide PowerPoint presentation complete with robust speaker notes, present your findings to the CEO and other key stakeholders.
Identify all three EHR software options you have selected for consideration, and include the following in your presentation:
1. System requirements and compatible interfaces for each
2. The cost of implementation
3. Timeline for integration and user training
4. Privacy and security options, including patient accessibility to records
5. Capabilities of what each software system will enable clinics to do that they were previously unable to accomplish
6. How each system would facilitate efficient communication and increase interoperability between clinics
7. Pros and cons of each software system in relation to the other options you have selected
8. Recommendation for which option you believe the network should adopt and why
Cite all sources used and include them on a reference slide, not included in the slide length requirement.