Premium Essay

Week 7 Review and Analysis

In: Computers and Technology

Submitted By kadena19
Words 737
Pages 3
Week 7 Review and Analysis
Keller Graduate School of MGMT
Information Security Law

Chapter 22, Question 3, 4, & 5, Page 739. (Questions found on p743)
Question 3: At one time, in order to demonstrate their alleged intellectual superiority, a number of teenagers broke into computer systems that guarded records of schools, government generally, and the military. What are the current potential criminal risks associated with hacking illegally into computer systems? For starters, all of the information that is compromised could be sold and used for illegal purposes such as identity theft. Also, if hackers were to hack into the computer systems that control our infrastructure they could possibly turn off or damage our power grids or if they were to hack into the systems that control air traffic control, they could crash airplanes and disrupt travel for millions of people. On a larger scale if hackers were to hack into nuclear power plants they could possibly cause a nuclear meltdown. (GORMAN, 2009) Question 4: Criminal law statutes now protect your name and identity, your communications, and your ideas. Match each of these categories with the appropriate criminal law statute and explain how each statute can be violated. Name and identity = “Identity Theft and Assumption Deterrence Act of 1998” (Baumer, 2011). This statute protects individuals from having their identity stolen and used to commit a crime or make purchases in that person’s name that were not initiated by that person. Communications = “Electronic Communications Privacy Act of 1986” (Baumer, 2011). This statute was initially created to protect individuals from having the companies they worked for from spying on them and revealing information that they illegally obtained. This is a very good law and I personally run into this all the time as a systems administrator. For instance,…...

Similar Documents

Premium Essay

Week 7

...Week 7 2012 Internet Privacy Web Privacy Danielle Worrell XBIS/219 Internet Privacy When it comes to the privacy issues of the internet, I expect to have privacy and security. This is not possible in some instances though. When I use the internet in a public place such as the library, I know that there are many users on there and others may see what I do. This goes along with work as well. They have a secure web but can monitor your usage of the internet therefore seeing anything that you are doing on their internet. Others may not know your security settings for a specific site but it can be saved on a proxy or cookie in the computer. I know that when accessing the web I take my chances even when using it at home, as others can figure out how to sign in on my Wi-Fi. For example, I remember in school when using the computer lab all computers were connected together using the web and you could open a document from any computer using a user name and password. All the documents and usage were saved on a main computer, which was the teacher’s computer. When it comes to being at home and using a Wi-Fi connection, you should have your own connection. It is not legal to use anyone else’s connection unless you have permission from that person to use it. If you see an unsecure network, it is not ethical to use unless you have permission but at the same time, you are able to connect without a pass code. You information and anything you do can be seen by the one who......

Words: 373 - Pages: 2

Premium Essay

Week 7

...WEEK 7 INTERMEDIATE ACCOUNTING 1 DEPRECIATION Exercise 11-4 (a) $279,000 – $15,000 = $264,000; $264,000 ÷ 10 yrs. = $26,400 (b) $264,000 ÷ 240,000 units = $1.10; 25,500 units X $1.10 = $28,050 (c) $264,000 ÷ 25,000 hours = $10.56 per hr.; 2,650 hrs. X $10.56 = $27,984 (d) | N(n+1)/2 = 10(11)/2 =55 ……… the total for 2013 is appro. $44,800 | | | (e) | $279,000 X 20% X 1/3 = 18,600 | | | | | Exercise 11-8 June 1, 2010 Purchases $31,800 Freight 200 Installation 500 Total cost $32,500 Book value, old machine, June 1, 2014: | | [$35,200 – $3,000 – ($3,300 X 3)] = | $22,300 | Fair value | (20,000) | Loss on exchange | 2,300 | Cost of removal | 75 | Total loss | $ 2,375 | Basis of new machine | Cash paid ($35,000 – $20,000) | $15,000 | | Fair value of old machine | 20,000 | | Installation cost | 1,500 | | Total cost of new machine | $36,500 | Exercise 11-9 (a) | Asset | | Cost | | Estimated Salvage | | Depreciable Cost | | Estimated Life | | Depreciation per Year | | A | | $ 40,500 | | $ 5,500 | | $ 35,000 | | 10 | | $ 3,500 | | B | | 33,600 |......

Words: 523 - Pages: 3

Premium Essay

Chapter 7 Review Questions

...Chapter 7 Review Questions 1. What is a knowledge management system? a. A Knowledge management system attempt to help organizations achieve their goals. They usually help in means of increasing profits or reducing costs. 2. What is a chief knowledge officer? What are his or her duties? b. A chief knowledge officer is a top level executive who helps the organization work with a knowledge management system to create, store, and use knowledge to achieve organizational goals. The duties that the CKO is responsible for are to work with other executives and vice presidents, including the chief executive officer, chief financial offer and others. 3. What is natural language processing? What are the three levels of voice recognition? c. Natural language processing allows a computer to understand and react to statements and commands made in a “natural” language, like English. The three levels of voice recognition are converting sound waves into words, then the natural language system processing system reacts to the words or commands by performing different tasks. 4. What is a learning system? Give a practical example of such a system. d. A learning system is a combination of software and hardware that allows a computer to change how it functions or reacts to situations based on the feedback it receives. A practical example of such a system would be, some computerized games have learning abilities. If the computer loses a game, it......

Words: 605 - Pages: 3

Premium Essay

Week 2 Case Analysis Article Review

...making Appalachian coal less attractive to power plants along the East Coast. Falling international coal prices negatively affected the Appalachian coal companies and the region which is increasingly dependent on foreign market. The unfavorable state of the global coal market, making producers export resulting in recent lay-offs. Coal production methods have evolved over the decades in the industry as production has shifted from underground mining to surface mining, more mechanized and less labor intensive; resulting in falling employment for decades in the nation’s coal mines. How Appalachian coal company relates to week two topic Marketing Environment? The above article highly relates to week two topic on marketing environment and social responsibility and ethics in marketing. The topic of the week (Marketing Environment) elaborates on external forces that affects organization/business as a whole. These factors include, competitive, economic, political, legal and regulatory, technology and sociocultural forces. All the environmental forces play a role in the above article but the main forces that stands out are competition, sociocultural and legal and regulatory forces. Appalachian coal companies face legal and regulatory issues which lead to economic downfall that give competitors the upper hand to force in and take control of current market structure. We are faced with environmental factors every day, and while some......

Words: 648 - Pages: 3

Premium Essay

Week 7

...ASSESSMENT COVER SHEET |Student’s name |(Surname) |(Given names) | | |JIANG |Yifan | |Student’s I.D. number |26094207 | |Unit name |Business ethics in global environment |Unit code |MGF 5020 | |Title of assignment |Task 1---Week 7 | |Name of tutor | | |Tutorial day /time | | |Presentation date | | All work must be submitted by the due date. If an extension of work is required, please complete and submit a Special Consideration application (in-semester assessment task) form to your......

Words: 1156 - Pages: 5

Premium Essay

Ehr Chapter 7 Review

...Chapter 7 Review, Page 300 1. A problem list is an up-to-date list of the diagnoses and conditions that affect a particular patient’s care. 2. The idea of a problem list is to ensure that everyone who touches a patient knows what conditions are present. 3. Using a problem list is easy for clinicians to view active and history of problems. Most clinical information recorded in the charts are related to one or more problems. Problem lists are used to track both acute and chronic conditions. It helps clinicians remember to follow up on conditions from previous visits. They actually are required to use a problem list. Maintaining a problem list is a requirement for accreditation by JCAHO. 4. Wellness conditions on the problem list are used to generate preventative care recommendations for healthy patients. It is based on age and sex of the patient and are used in health maintenance and preventative screening programs to keep patients healthy. 5. The data that appears in the manage tab comes from previous encounters or patient visits. 6. Finding a citing means to bring a finding to the current encounter, usually as a follow up to a previous visit. 7. Lab values means to compare the change of certain test components over a period of time. 8. To graph a patient’s weight, all you need to do is click on the graph menu at the very top of the screen to the left, and click weight. 9. Anything with numerical values can be graphed. 10. A......

Words: 368 - Pages: 2

Free Essay

Intro to Networking Chp 7 Review

...Chapter 7 Review 1) A 2) A, B 3) B, D 4) B 5) D 6) B, D 7) A 8) C 9) C 10) B 11) D 12) D 13) A, C 14) C 15) C 16) B, D 17) C 18) D 19) C, D 20) A, B Key Terms Switched circuit-A circuit by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished. Dedicated circuit- An electric circuit created by a telco on behalf of a customer, with the circuit staying up all the time, dedicated for use by the one customer that ordered the circuit. Also known as a line, leased circuit, and point-to-point line. Circuit switching-The overall process by which a series of telco devices called circuit switches connect a circuit from one customer to the other, with the device’s logic taking incoming bits on one segment in the link and forwarding those bits out the matching outgoing segment, without storing bits. Packet switching-Process of forwarding customer data in a WAN by looking at the header of the messages sent into the WAN by the customer and making a per-messages decision as to where to forward each message. Leased line-A physical link between two locations, provided by a telco, that allows two-way communication between sites. Time-division multiplexing-A type of logic used by some networking devices, including circuit switches in the telco, in which the switch divides a faster line......

Words: 1592 - Pages: 7

Free Essay

Furious 7 Review

...greatest films of 2015 and one that you don’t want to miss is Furious 7. Since 2001 The Fast and the Furious movies have caught the attention of billions of viewers all around the world, especially Furious 7 directed by James Wan. It will have you on the edge of your seat and you won’t want to blink! It is a film about family and how this group of friends have come a long way living their lives in the fast lane trying to keep each other alive as they embarked in new missions every movie. As Dominic Toretto states, “I don't have friends. I got family.” They began to see each other as family ever since Fast Five and now they continue their journey together to fight a man that is after them for revenge. According to Matt Singer “This is a lot of revenge for one movie to contain, and that’s before Dom and the rest of his crew (which also includes computer expert Chris “Ludacris” Bridges and comic relief Tyrese Gibson) hook up with a shadowy government operative named Mr. Nobody (Kurt Russell) and then start skydiving out of planes behind the wheel of their custom cars, a sport I guess we have to call “skydriving” (Singer 1). Everything in this film was great, from actions scenes from begging to end and more action all throughout the movie was insane. You wouldn’t believe the stunts they pulled off in this movie, you have to watch it to believe “skydriving.” David Blaustein states in his review “Not only are the "Furious 7" car chases and stunts more creative, they’re damn-near......

Words: 1264 - Pages: 6

Premium Essay

7-Eleven Case Analysis

...Industry & competitor analysis Define industry: Convenience stores industry So for 7-eleven absolutely it belongs to convenience stores industry. Based on 7-eleven mission, The concept of convenience stores, developed by 7-Eleven, was shaping the way Americans shopped; in turn, American buying behavior and the American landscape were both shaping the identity of convenience stores. As a matter of habit, American shopped at big-box stores and supermarkets for all their weekly or monthly supplies. Convenience stores served as sources for supplementary shopping, for picking up daily-use items that had run out. Convenience stores were thus stuck in a warp. They could not gain top-of-mind recall among American consumers; they seemed destined to stay on the fringes. The concept of convenience stores had evolved in countries outside the United States along the same lines as it had evolved in the United States. Convenience stores served as a source of supplementary purchases of essential items that could be readily consumed by shoppers. The format established in the United States could be replicated in any part of the world. Operators in this industry are retail businesses that primarily sell basic food, beverage and tobacco merchandise in convenient locations that are generally open during extended hours. This industry…. In the not too distant past, every convenience store looked about the same -- 2,400 square feet of packaged consumer items. Today, companies in...

Words: 1228 - Pages: 5

Premium Essay

Bus 599 Week 7 Bus599 Week 7

...com/q/bus-599-complete-course-bus599-complete-course/21454 http://workbank247.com/q/bus-599-complete-course-bus599-complete-course/21454 BUS 599 Week 1 Discussion "Company Description" Throughout this course, you will develop a series of written papers / projects that you will later combine into a complete business plan for a Non-Alcoholic Beverage company. For this discussion, you must first review the “NAB Company Portfolio”.  The mentioned portfolio contains the company parameters and details you must follow when developing your company. Provide the following information to set the foundation for your non-alcoholic beverage (NAB) business plan. Please respond to the following: * Create your NAB company name and explain its significance. * Develop your company’s Mission Statement and provide a rationale for its components. BUS 599 Week 2 Discussion "Growing Honest Tea"  Please respond to the following: * Review the following documents: * Honest Tea’s business plan for 1999 (PDF). * A strengths, weaknesses, opportunities, and threats (SWOT) analysis based on Honest Teas’ business plan (PDF). * Suppose Honest Tea has hired you as a consultant to evaluate the completeness of their strategy for future growth. Base your evaluation on the provided SWOT analysis. Provide a rationale for your response. BUS 599 Week 3 Discussion "Don't Miss the Mark"  Please respond to the following: * Watch the following......

Words: 5722 - Pages: 23

Premium Essay

Bus 519 Week 7 Bus519 Week 7

...519 Week 1 Discussion "What is Risk?"  Please respond to the following: * There are three (3) schools of thought regarding risk. The first considers the positive and negative aspects of risk, but sees them as separate. The second group believes that there are benefits from treating threats and opportunities together, while the third school does not label uncertainties, but addresses uncertainty as part of “doing the job.” Argue the value of having a risk strategy despite the cost associated with it. Include an example to support your response. Provide a rationale for your selection and determine how this approach helps a project to be successful. BUS 519 Week 2 Discussion "Need for Risk Management" Please respond to the following: * There are four (4) critical success factors that are important for effective risk management: supportive organization; competent people; appropriate methods, tools and techniques; and simple, scalable process. Determine three (3) obstacles for an organization to manage risk effectively. Suggest strategies from the perspective of a project manager to avoid the obstacles. BUS 519 Week 3 Discussion "Project Initiation" Please respond to the following: * Using the “Stakeholder Analysis Template” (Appendix B2 in the Hillson and Simon text) for a company that you currently work for or you are familiar with, determine the key stakeholders and categorize them by their attitude, power, and interest dimensions. Explain how stakeholder analysis......

Words: 2422 - Pages: 10

Premium Essay

Chapter 7 Review Questions

... 2. A false positive seems like an alert. False negatives seem like normal activity. False positives are just a problem, and false negatives are failures in the systems. 3. A network-based IDPS monitors traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause harm. 9. Network footprinting is the organized research of the internet addresses owned or controlled by a target......

Words: 541 - Pages: 3

Free Essay

Mgmt 530 Week 7 Dq 2 Estate Case Analysis

...MGMT 530 Week 7 DQ 2 Estate Case Analysis To Buy This material Click below link http://www.uoptutors.com/mgmt-530/mgmt-530-week-7-dq-2-estate-case-analysis This week, we move from the theoretical to the real world. The following group decision problem scenario is outside of the formal organizational structure but highlights the difficulty in making decisions in group settings and the need to collectively arrive at a group decision-making process. Estate Case Decision Problem Scenario The matriarch of a family passes away after a long illness, leaving a house that needs major repair work, a few antiques, and a small insurance policy. In her Will, she bequeaths everything equally to her three grown children (two sons and a daughter), but leaves no instructions on how to go about the disbursement of the estate. The three children have drifted apart over the years and are not very close, but are cordial to one another. The eldest son, who lives locally, is named the executor of the Will. He is somewhat resentful that he served as the primary caregiver of the matriarch and the others were less involved. The other two don’t get along very well. The son that is the executor is not sure what to do, but would like to hang on to the house for a while until the real estate market improves and eventually try to sell it for more money than it is worth today. The daughter thinks that the house should be fixed up with the insurance money and then sold immediately. The other son......

Words: 556 - Pages: 3

Premium Essay

Week 7 Assignment

...Week 7 Assignment Click Link Below To Buy: http://hwcampus.com/shop/finc600-week-7-assignment-homework-problems/ Complete this assignment according to the following: 1.Design a class that you would like to teach someday. The class must be at least 4 hours in length and must be multiple sessions. It can be four sessions of 1 hour each, or two sessions of 2 hours each, depending on your topic and target audience. 2.Begin by describing the institution that is sponsoring the class (e.g., academic, hospital, or community agency). Include the philosophy of the sponsoring organization and how that will affect the course you are developing. 3.Explain how you determined a need for this class (needs assessment). 4.Write a one-paragraph description of the class. 5.Identify the target audience. 6.Identify the learning resources you will use for the class (textbooks or other resources). 7.Write the program outcomes for the course and the learner objectives for each class session. Indicate which domains of learning are represented by each learner objective. There is no predetermined length criterion for this assignment. It is intended that each student will develop a class that they can use in their selected area of education. You will complete this project in your next class NUR 649E. While APA format is not required for the body of this assignment, solid academic writing is expected and in-text citations and references should be presented using APA documentation......

Words: 301 - Pages: 2

Premium Essay

Busn 350 Week 7 Business Analysis Planning and Monitoring

...BUSN 350 Week 7 BUSINESS ANALYSIS PLANNING AND MONITORING Click Link Below To Buy: http://hwaid.com/shop/busn-350-week-7-business-analysis-planning-and-monitoring/ Write an essay that is 5-8 pages in length, on one of the BABOK Knowledge Areas listed below: Business Analysis Planning and Monitoring (Chapter 2) is the knowledge area that covers how business analysts determine which activities are necessary in order to complete a business analysis effort. It covers identification of stakeholders, selection of business analysis techniques, the process that will be used to manage requirements, and how to assess the progress of the work. The tasks in this knowledge area govern the performance of all other business analysis tasks. Elicitation (Chapter 3) describes how business analysts work with stakeholders to identify and understand their needs and concerns, and understand the environment in which they work. The purpose of elicitation is to ensure that a stakeholder’s actual underlying needs are understood, rather than their stated or superficial desires. Requirements Management and Communication (Chapter 4) describes how business analysts manage conflicts, issues and changes in order to ensure that stakeholders and the project team remain in agreement on the solution scope, how requirements are communicated to stakeholders, and how knowledge gained by the business analyst is maintained for future use. Enterprise Analysis (Chapter 5) describes how......

Words: 919 - Pages: 4