What challenges have you faced in achieving this goal? Which of those challenges have you overcome and how?

Essay

In 500 words or fewer, tell us the story of why you decided to become a software or data engineer. Many people from non-traditional backgrounds find it challenging to pursue this path. Since making the decision, what challenges have you faced in achieving this goal? Which of those challenges have you overcome and how?

Discuss the types of data that users will collect for the proposed database and describe at least three reports that will be generated for analysis. Explain their use and who will use the reports?

Database Project Proposal

Identify database users (personnel/credentials): Who are they? What are their competencies and background?

Discuss the types of data that users will collect for the proposed database and describe at least three reports that will be generated for analysis. Explain their use and who will use the reports?

Describe the project goals and clear measurable objectives for the database. Identify the steps you will take to meet the goals and objectives.

Forecast any potential problems or barriers to meeting the project goals and objectives. Are there any specific assumptions that need to be made?

Discuss data communications protocols that could be used in your database project. Refer to the “Blockchain Personal Health Records: Systematic Review” article, provided in the topic Resources. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8080150/

Describe policies and procedures used for continuous security monitoring.Describe logical (technical) security threats and vulnerabilities.

Describe assessment techniques used to determine threats and vulnerabilities.

Describe physical security threats and vulnerabilities.

Describe logical (technical) security threats and vulnerabilities.

Summarize required policies to protect information systems:
Acceptable Use Policy (AUP)
Mobiles device Management (MDM)
Personally identifiable information (PII)
Payment Card Industry Data Security Standard (PCI DSS)
Information system secure backup strategies

Describe policies and procedures used for continuous security monitoring.

Describe training and continuing education policies implementation.

Describe a continuity of operations plan to keep the key system operational during a disaster.

 How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future?

Information Security
Prepare for the meeting by deliberating on the following questions:

How would you assess the risks, threats, and/or vulnerabilities that may have allowed this incident to occur, or could allow a similar incident to occur in the future?

What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar incidents that have occurred in other organizations?

What potential outcomes should the company anticipate as a result of the malware attack and possible exposure of intellectual property?

Which countermeasures would you recommend the company implement to detect current vulnerabilities, respond to the effects of this and other successful attacks, and prevent future incidents?

How did you gain these skills? How might you recommend to others to improve these skills?

Developing Soft Skills
Respond to the following in a substantive post (2–3 paragraphs):

In one paragraph, describe some soft skills you possess. How did you gain these skills? How might you recommend to others to improve these skills?
In another paragraph, describe a soft skill you need to work on developing. What are some tips you’ve picked up that you plan to put into practice? How will this skill help you in your career?
One assumed soft skill is downloading software. This is something you’ll be expected to do regularly in an IT role. What sort of things might you need to know in order to download software on the job?

How are the five communication factors related to Performance?Discuss two of the five communication factors (below) in effective team performance

Five communication factors in effective team performance

Write a 1 page essay discussing the following 3 points with at least 1 citation per discussion point in APA for a total of 3 references.

1. What the steps of building a project team- Discuss
2. Discuss two of the five communication factors (below) in effective team performance
3. How are the five communication factors related to Performance?

 Discuss what challenges your selected organization might encounter in transitioning to the new environment; challenges such as organizational culture, skills, technologies including tools, as examples.

Business Intelligence/Business Analytics Environment

Discuss what benefits could the company realize from using a BI/BA environment.

Discuss what challenges your selected organization might encounter in transitioning to the new environment; challenges such as organizational culture, skills, technologies including tools, as examples.

Develop a system diagram displaying at a conceptual level, what the BI/BA environment would look like.

What is the difference between External Complexity and Internal complexity risk profiles in a project – discuss with examples

Risk Management
Write a well researched essay (at least 1 reference per discussion point)

Discuss Risk Identification and Evaluation Processes

After project risk has been identified and evaluated, the project manager/team develops mitigation plan to reduce the impact of an unexpected even – Discuss three ways to mitigate Risks in a Project

What is the difference between External Complexity and Internal complexity risk profiles in a project – discuss with examples