Description
Select the following systems model.which explains what it is, what it does and how it is used.
- Context model
Explain in 100 to 150 words
3-citation references
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hey, the project is ready. Please check it and let me know in case you need anything reviewed. All the best.
Insert surname1
Professor’s name
Student’s name
Course title
Date
Context model
As it is applied in information technology, a context model is a tool in software
engi...
Completion Status:
100%
Review
Review
Anonymous
Awesome! Made my life easier.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of Cumberlands Data Science and Engineering Discussion
Discussion
Locate a dissertation on a Topic related to your Concentration Read the literature review section a ...
University of Cumberlands Data Science and Engineering Discussion
Discussion
Locate a dissertation on a Topic related to your Concentration Read the literature review section and provide a one paragraph summary of the literature review - discuss the structure of the literature review and what was achieved with the literature review.
Other usefull link- https://www.ucumberlands.edu/library.
Note: My area of Interest or Concentration is on Data Science and Engineering.
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health ca ...
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health care issues, concerns, or trends.The research article must describe a research study, not an editorial or brief.The research study must be based in the United States from 2010 to the present.It is recommended that you select health topics of interest to you or your job, with no complex statistical analyses. Review the Researching Articles in the University Library Tutorial for help finding articles. Select at least 3 peer-reviewed* articles to use to complete an annotated bibliography. The 3 research articles can be based on the same or different topics. Topic ideas can include (but are not limited to):Adolescent obesity (select different geographic locales: urban vs rural)Infection rates among ICU patientsReadmission rates for congestive heart failure patientsPatient satisfaction or patient experience of carePopulation health management in diabetes careCare coordination or care continuumPatient safety or quality managementCancer screening compliance, such as mammography, colonoscopy, or Pap smearComplete the annotated bibliography based on the 3 articles you selected from the University Library.Review the sample annotated bibliography provided by the University Library. Be sure to do the following for each bibliography:Summarize the research study in your own words (at least 150 words).Include the major areas of the research study, such as the sample, geographic location, and the outcome.Bibliographies should not include any direct quotes or in-text citation.Discuss how you determined the selected articles are peer reviewed.*Note: One research article will be used in the Week 3 Learning Team assignment, Components of a Research Study. Format your assignment according to APA guidelines. Remember to alphabetize your annotated bibliography.Submit your assignment.
Discussion
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separa ...
Discussion
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
You must do the following:
1) Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
UMUC CSIA 350 E Commerce Risk Analysis Essay
Project 2 – e-Commerce Risk AnalysisDescriptionE-Commerce companies have become increasingly important in this era of gl ...
UMUC CSIA 350 E Commerce Risk Analysis Essay
Project 2 – e-Commerce Risk AnalysisDescriptionE-Commerce companies have become increasingly important in this era of global pandemics and resulting restrictions on businesses and individuals. Consumers are ordering products online in larger numbers than ever before due to business closures or restricted operating hours. Companies positioned in the e-Commerce industry are experiencing growth beyond previous predictions. But, at the same time, some E-commerce companies are seeing their business decline drastically due to travel restrictions and the reluctance of businesses and individuals to travel for any but the most critical of reasons. Added into the risk picture are risks from the actions of cybercriminals, hackers, and nation-state actors are taking advantage of these unsettled times resulting in increased risks for companies whose business models depend upon the Internet for financial transactions, orders, and communications both internal and external.For this project, you will begin by researching a publicly traded company that engages in e-Commerce. Please make sure that you are using CURRENT information (2019 or later). You will then review the company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company’s e-Commerce activities (including all supporting business processes).A list of approved companies appears at the end of this file (see Table 1). If you wish to use a company not on the approved list you must first obtain the approval of your instructor.Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”Research Your Chosen Company1.Review the company’s website to learn about the products and services which it sells via e-Commerce.2.Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile. Use this URL to access the database http://ezproxy.umgc.edu/login?url=https://www.mergentonline.com/Hoovers3.Use the search bar at the top of the “Search & Build a List” tab to find your chosen company.4.The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “OneStop Report” button to generate a PDF version of the information. Select “Core” under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.5.After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc. Focus on finding information that addresses how the company is responding in the current economic environment (2019 or later).6.Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What needs to be protected?)Analyze the Company’s Risk Statements1.Using the links from Table 1 (at the end of this file), download a copy of your selected company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)2.Read and analyze the Risk Factors section in the company’s report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.3.Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.Write1.An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.2.A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)3.An overview of the company’s e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.4.A separate section in which you describe this company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company’s e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.5.A separate section which provides a detailed summary of the identified risks and potential impacts upon the company’s operations as a whole. What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.Submit for GradingSubmit your work in MS Word format (.docx or .doc file) using the Project #2 Assignment in your assignment folder. (Attach the file.)Additional Information1.Your 5-8 page e-Commerce Risk Analysis should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx. 2.Your paper should use standard terms and definitions for cybersecurity. 3.You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. 4.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 5.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).6.Consult the grading rubric for specific content and formatting requirements for this assignment.See Table 1 at the end of this file for the list of approved e-Commerce companies which may be used for this project.Table 1. List of Approved Companies for Project #2: e-Commerce Risk AnalysisCompany NameCorporate Website / Investor RelationsForm 10-K from SEC Edgar DatabaseAlphabet, Inc (Google)https://www.google.com/intl/en/about/company/https://abc.xyz/investor https://www.sec.gov/Archives/edgar/data/1652044/000165204421000010/goog-20201231.htmAmazonhttp://www.amazon.comhttps://ir.aboutamazon.com/overview/default.aspxhttps://www.sec.gov/Archives/edgar/data/1018724/000101872420000004/amzn-20191231x10k.htmApplehttps://www.apple.com/newsroom/http://investor.apple.com/https://www.sec.gov/Archives/edgar/data/320193/000032019320000096/aapl-20200926.htm Booking Holdingshttps://www.bookingholdings.com/http://ir.bookingholdings.com/investor-relationshttps://www.sec.gov/Archives/edgar/data/1075531/000107553121000019/bkng-20201231.htm Facebookhttps://www.facebook.com/facebookhttp://investor.fb.com/https://www.sec.gov/Archives/edgar/data/1326801/000132680121000014/fb-20201231.htm Microsofthttp://www.microsoft.comhttp://www.microsoft.com/investor/default.aspxhttps://www.sec.gov/Archives/edgar/data/789019/000156459019027952/msft-10k_20190630.htmPayPal Holdingshttps://www.paypal.com/us/webapps/mpp/abouthttps://investor.paypal-corp.com/https://www.sec.gov/Archives/edgar/data/1633917/000163391721000018/pypl-20201231.htm
New England College Essence of Security Policy Discussion
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory per ...
New England College Essence of Security Policy Discussion
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.
Select one of these compromises and explain how it could be avoided.
Similar Content
Cumberland University Internet Technology Essay
1 AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.2. It is said that the ...
Centralized & Decentralized Databases, Information System
Research
and provide three to four paragraphs covering the following & Be sure to
cite your references.
Q1. Discu...
very important no plagiarism, please make it effectively, small discussion, min 200 words
What is EDA and why is it useful? From the following choose one concept explain to the class.5 Number SummaryBox PlotResid...
Harrisburg University of Science & Technology Installing Docker Tutorial Video
Implement one of the tutorial projects from "The Docker Book: Containerization is the New Virtualization" or a similar doc...
Virginia State University Supply Chain Security Discussion
Supply chain security is a broad concern through out organizations. There is a notion that Supply Chain can make or break ...
week 3 advanced
Error handling in SQL Server has long been somewhat difficult to set up and use and has only become more usable with the i...
Exercise1
You should save/rename this document using the naming convention MUid.docx Objective: The objective of this exercise is to...
Iphone X. New
Apple iPhone models are some of the most desirable interaction gadgets globally. The model is an impressive combination of...
Man.edited
Intruders often referred to as hackers, can utilize a variety of cybersecurity threats to compromise insecure networks, sy...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of Cumberlands Data Science and Engineering Discussion
Discussion
Locate a dissertation on a Topic related to your Concentration Read the literature review section a ...
University of Cumberlands Data Science and Engineering Discussion
Discussion
Locate a dissertation on a Topic related to your Concentration Read the literature review section and provide a one paragraph summary of the literature review - discuss the structure of the literature review and what was achieved with the literature review.
Other usefull link- https://www.ucumberlands.edu/library.
Note: My area of Interest or Concentration is on Data Science and Engineering.
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health ca ...
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health care issues, concerns, or trends.The research article must describe a research study, not an editorial or brief.The research study must be based in the United States from 2010 to the present.It is recommended that you select health topics of interest to you or your job, with no complex statistical analyses. Review the Researching Articles in the University Library Tutorial for help finding articles. Select at least 3 peer-reviewed* articles to use to complete an annotated bibliography. The 3 research articles can be based on the same or different topics. Topic ideas can include (but are not limited to):Adolescent obesity (select different geographic locales: urban vs rural)Infection rates among ICU patientsReadmission rates for congestive heart failure patientsPatient satisfaction or patient experience of carePopulation health management in diabetes careCare coordination or care continuumPatient safety or quality managementCancer screening compliance, such as mammography, colonoscopy, or Pap smearComplete the annotated bibliography based on the 3 articles you selected from the University Library.Review the sample annotated bibliography provided by the University Library. Be sure to do the following for each bibliography:Summarize the research study in your own words (at least 150 words).Include the major areas of the research study, such as the sample, geographic location, and the outcome.Bibliographies should not include any direct quotes or in-text citation.Discuss how you determined the selected articles are peer reviewed.*Note: One research article will be used in the Week 3 Learning Team assignment, Components of a Research Study. Format your assignment according to APA guidelines. Remember to alphabetize your annotated bibliography.Submit your assignment.
Discussion
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separa ...
Discussion
In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
You must do the following:
1) Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
UMUC CSIA 350 E Commerce Risk Analysis Essay
Project 2 – e-Commerce Risk AnalysisDescriptionE-Commerce companies have become increasingly important in this era of gl ...
UMUC CSIA 350 E Commerce Risk Analysis Essay
Project 2 – e-Commerce Risk AnalysisDescriptionE-Commerce companies have become increasingly important in this era of global pandemics and resulting restrictions on businesses and individuals. Consumers are ordering products online in larger numbers than ever before due to business closures or restricted operating hours. Companies positioned in the e-Commerce industry are experiencing growth beyond previous predictions. But, at the same time, some E-commerce companies are seeing their business decline drastically due to travel restrictions and the reluctance of businesses and individuals to travel for any but the most critical of reasons. Added into the risk picture are risks from the actions of cybercriminals, hackers, and nation-state actors are taking advantage of these unsettled times resulting in increased risks for companies whose business models depend upon the Internet for financial transactions, orders, and communications both internal and external.For this project, you will begin by researching a publicly traded company that engages in e-Commerce. Please make sure that you are using CURRENT information (2019 or later). You will then review the company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s e-Commerce operations and its risk statements about those activities, you will construct and document your own cybersecurity risk analysis which focuses upon the company’s e-Commerce activities (including all supporting business processes).A list of approved companies appears at the end of this file (see Table 1). If you wish to use a company not on the approved list you must first obtain the approval of your instructor.Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”Research Your Chosen Company1.Review the company’s website to learn about the products and services which it sells via e-Commerce.2.Retrieve and review the Hoovers profile for the company. These profiles are written by professional analysts; pay close attention to the types of questions the analysts ask and answer in the company profile. Use this URL to access the database http://ezproxy.umgc.edu/login?url=https://www.mergentonline.com/Hoovers3.Use the search bar at the top of the “Search & Build a List” tab to find your chosen company.4.The company profile web pages in the Hoovers database are interactive and have expanding menus / options (see figure below). You may find it helpful to use the “OneStop Report” button to generate a PDF version of the information. Select “Core” under categories (Available Fields: Company Summary, Contacts, Corporate Family, Corporate Overview, SWOT, and News). Click on the field names in the middle column to select them for your report.5.After you have looked at the company website and the Hoovers report, Identify 3 or more additional sources of information about the company and how it operates in cyberspace. These can be news articles, data breach reports, etc. Focus on finding information that addresses how the company is responding in the current economic environment (2019 or later).6.Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What needs to be protected?)Analyze the Company’s Risk Statements1.Using the links from Table 1 (at the end of this file), download a copy of your selected company’s most recent Annual Report to Investors from its Form 10-K filing with the United States Securities and Exchange Commission. (Note: the company is the author of its Form 10-K. Do not list the SEC as the author.)2.Read and analyze the Risk Factors section in the company’s report to investors (Item 1.A). This section is a professionally written risk analysis that has been written for a specific audience. Pay close attention to what the company includes as risk factors and how the writers chose to present this information.3.Analyze the risk factors to determine which ones are related to e-Commerce / Internet operations or are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures. Make a list that shows what information, digital assets, and/or business operations (processes) need to be protected from cyberattacks and/or cybercrime (including insiders and external threats) and the type of risk or threat that could affect those assets and processes.Write1.An introduction section which identifies the company being discussed and provides a brief introduction to the company including when it was founded and significant events in its history.2.A business profile for the company. This information should include: headquarters location, key personnel, primary types of business activities and locations, major products or services sold by the company, major competitors, stock information (including ticker symbol or NASDAQ code), recent financial performance, and additional relevant information from the business profiles. (Use information from Hoovers and other authoritative sources)3.An overview of the company’s e-Commerce operations which summarizes information obtained from its annual report, the Hoovers profile for the company, and other sources which you found in your research.4.A separate section in which you describe this company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? While your focus should be upon the company’s e-Commerce activities, you should also address the back-office or supporting information and business processes required to deliver those e-commerce activities.5.A separate section which provides a detailed summary of the identified risks and potential impacts upon the company’s operations as a whole. What are the likely sources of threats or attacks for each type of information or business operation? (E.g. protect customer information from disclosure or theft during online purchase transactions.). What are the possible impacts should these risks occur? You may present your summary in table format.Submit for GradingSubmit your work in MS Word format (.docx or .doc file) using the Project #2 Assignment in your assignment folder. (Attach the file.)Additional Information1.Your 5-8 page e-Commerce Risk Analysis should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx. 2.Your paper should use standard terms and definitions for cybersecurity. 3.You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count. (An example and template file are available in the LEO classroom. 4.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 5.You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).6.Consult the grading rubric for specific content and formatting requirements for this assignment.See Table 1 at the end of this file for the list of approved e-Commerce companies which may be used for this project.Table 1. List of Approved Companies for Project #2: e-Commerce Risk AnalysisCompany NameCorporate Website / Investor RelationsForm 10-K from SEC Edgar DatabaseAlphabet, Inc (Google)https://www.google.com/intl/en/about/company/https://abc.xyz/investor https://www.sec.gov/Archives/edgar/data/1652044/000165204421000010/goog-20201231.htmAmazonhttp://www.amazon.comhttps://ir.aboutamazon.com/overview/default.aspxhttps://www.sec.gov/Archives/edgar/data/1018724/000101872420000004/amzn-20191231x10k.htmApplehttps://www.apple.com/newsroom/http://investor.apple.com/https://www.sec.gov/Archives/edgar/data/320193/000032019320000096/aapl-20200926.htm Booking Holdingshttps://www.bookingholdings.com/http://ir.bookingholdings.com/investor-relationshttps://www.sec.gov/Archives/edgar/data/1075531/000107553121000019/bkng-20201231.htm Facebookhttps://www.facebook.com/facebookhttp://investor.fb.com/https://www.sec.gov/Archives/edgar/data/1326801/000132680121000014/fb-20201231.htm Microsofthttp://www.microsoft.comhttp://www.microsoft.com/investor/default.aspxhttps://www.sec.gov/Archives/edgar/data/789019/000156459019027952/msft-10k_20190630.htmPayPal Holdingshttps://www.paypal.com/us/webapps/mpp/abouthttps://investor.paypal-corp.com/https://www.sec.gov/Archives/edgar/data/1633917/000163391721000018/pypl-20201231.htm
New England College Essence of Security Policy Discussion
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory per ...
New England College Essence of Security Policy Discussion
Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible on web servers or the use of self-signed certificates and/or default certificates.
Select one of these compromises and explain how it could be avoided.
Earn money selling
your Study Documents