How will you change because of what you learned?

I expect you to track your learning in this course in a journal. I want you to record your thoughts about what you learn from this course. (This is sort of a metacognition exercise.) You can do this either electronically (e.g., on a Word document) or by hand (e.g., in a notebook). This journal should be separate from your class notes. If you are searching for what to write about, you can start by answering questions such as:
What did you learn?
What did you find interesting?
What was meaningful to you?
What will you do with the information?
How will you change because of what you learned?
How can the information apply to real-world (including personal) issues?

Examples of what you could write include, but are not limited to:
summarizing exciting concepts from the readings in your own words.
jotting down thoughts/reactions from class activities and discussions.
recording your results from personality inventories and explaining what those results mean.
drawing a diagram or model of a particular theory and adding your notes about it.
critiquing existing theories or creating your theory of personality.

What other ways can you configure the security settings to secure a MySQL server installation?

THE REQUIRED LAB QUESTIONS

As a cybersecurity consultant for APX Data Systems (ADS), you were tasked with leading a project team to implement database systems that conform to the HIPAA security rule for one hospital client. The database system should be capable of hosting highly sensitive information such as personally identifiable information (PII), personal health information (PHI), and electronic personal health information (ePHI) to comply with federal regulations. Part of your responsibility was to review, evaluate, and make recommendations with respect to the maintenance of a secure database system for the client. Based on the knowledge and experience gained from the lab, answer the following questions.

PART 2: STARTING THE LAB—Connecting to MySQL Server and Securing the Initial Root Account, Securing MySQL Account with Automated Secure Installation, Creating a New MySQL Admin Account with Privileges, etc.

You now know that the installation of MySQL creates only a root user account that has all privileges and can execute any database statement. However, if the root account has no password, the security of MySQL installation is obviously compromised in the sense that anyone can connect to the server as root and be granted all privileges. Besides configuring the security settings, what other security control measures can you implement to make MySQL more secure?
What other ways can you configure the security settings to secure a MySQL server installation?
Using the secure MySQL installer script, how can you mitigate against having anonymous users’ unauthorized access to the database system?
How do you start and switch to MySQL on Kali Linux or a Linux OS in general? Where are MySQL database files stored in Linux? Also, what is the default port for MySQL Server?
Once you set up databases, users, and permissions, consider what the daily management of your MySQL databases, user accounts, and privileges look like. Developers, business users, contractors, vendors, and several others need access on a daily or regular basis. How will you manage database credentials as the infrastructure grows based on your experience in the lab so far?
How will you ensure each user has as much granular access and only performs specific tasks with assigned privileges and nothing more?

PART 3: MANAGING AND SECURING MYSQL DATABASE SYSTEMS (DBMS)—Creating and Accessing MySQL Databases, Evaluating MySQL Access Control Systems and Account Management, Testing MySQL Access Control and Assigned Privileges, etc.

Instead of using ‘cst620-admin’@’localhost’ in the create user statement, one can decide to use wildcards as in ‘cst620-admin’@‘%’, where ‘%’ is the wildcard in place of localhost’. With wildcard, a user can connect from any client host, but this is not a best practice due to potential security risks. In your opinion, what potential security risks are likely to occur and what security control measures would you take to address it?
When a user attempts to connect to a MySQL server, the server accepts or rejects the connection based on Whether the user account is locked or unlocked as one condition. During the connection request, what else must happen for the server to verify a user after providing proper credentials? What constitutes a full identification and what role does it play in this regard?
The MySQL server performs identity and credentials verification and accepts the connection only if specified conditions are satisfied. What does the server system use to perform identity and credentials verification? [Hint: the columns in the user table can provide a useful clue].
Considering MySQL server authentication, is it possible for the client hostname and username combination of an incoming connection request to match more than one row in a user table? Why or why not?
In your opinion, and from MySQL security experience gained so far, why do you think creating remote user accounts instead of local-based accounts can create unintended security vulnerabilities and thus potential threats?
Which one of the cst620-user, cst620-user1, and cst620-user2 users cannot deleted another user, database, or table? How can you determine this if at all possible?
From a MySQL database security standpoint, your frontend applications may use scripts to interact with the backend database system. Assuming a malicious user or a hacker is trying to conduct SQL injection or cross-site scripting attack, even if the front-end application (e.g. forms) is compromised, why do you think it would still be a challenge for this attacker to alter backend MySQL statements and be able to manipulate the user-supplied data.
Security misconfiguration related to such endpoints as application servers, web servers, security appliances, and other platforms pose huge security flaws to security professionals and business leaders. If a malicious actor happens to target your internal network, describe how properly configured MySQL database permissions and firewalls can mitigate any potential compromise?
Throughout this lab exercise, you witnessed how MySQL misconfiguration can pose security challenges to database security admins and the profession as a whole. Based on this knowledge do you think enhanced security is a by-product of good security administration? If not, why?
Considering the access, version_id, plugin, authentication_string, and password_last_changed parameters of the structure of JSON inside the “Priv” column for cst620-user, what is/are the impact(s) on the MySQL security?

How it would be analyzed in a real forensic science laboratory (give details)

You will be watching ONE episode of one of the CSI series. The following series/episodes are allowable:

CSI: Las Vegas, Season 1, Episodes 1-3 (2000)

CSI: Miami, Season 1, Episodes 2 or 3

CSI: NY, Season 1, Episodes 1-3

The television review is an exercise describing your reaction to the forensic science presented in the television episode you have just watched. It should include a summary of the plot, characters and events, and a critical assessment of the major forensic issues covered in the episode. This critical assessment will include a critique of two pieces of forensic evidence that were examined, how they were examined, and whether or not this is true to how that type of forensic evidence is examined in the real world.

3 typed pages double spaced in APA format.

Note that the summary of the episode is a small fraction of your overall grade on this assignment and should be kept to 1-1.5 pages of your overall submission.

The focus of your writing needs to be on the two piece of physical evidence (hair, fingerprints, etc.) (approximately 1 page each. For each piece of physical evidence you chose to discuss, aside from naming the item, your discussion should include:

  • How it was analyzed in the episode (give details)
  • How it would be analyzed in a real forensic science laboratory (give details)
  • The similarities and differences between the show and real laboratory; do not just state that they are the same you have to provide the how.

While you can discuss in your conclusions procedural issues in the episode (crime scene investigator/scientists on the scene doing police investigation like interviews, improper collection of evidence, etc.), you must describe two pieces of physical evidence to critique (hair, fingerprints, etc.) to meet the requirements for this assignment.

Two impacts on medication administration. Explain.

chose one cultural factor such as health beliefs, language, perception of time, environment control,

  1. One impact on medication preparation. Explain.
  2. Two impacts on medication administration. Explain.
  3. Two potential adverse reactions. Explain with rationale.
  4. One possible issue in adherence to the medication regimen. Explain how this can be overcome

Three pages in APA format

argue that racism is the singular cause of disparities in health and health care.
  • Side A will argue that racism is the singular cause of disparities in health and health care.

Article: https://www.commonwealthfund.org/publications/2018/sep/focus-reducing-racial-disparities-health-care-confronting-racism

make sure you state which side you are debating. Each student should write a carefully crafted initial post using evidence and direct quotes from the article assigned for this discussion, course material covered thus far leading up to this discussion, and from material found during your independent research. Each post should include at least two (2) direct quotes from the source materials. Be sure to make three (3) distinct points or arguments that support your assigned position in your initial post.

What are three conclusions you take away from the article?

.1. What are three conclusions you take away from the article? Enumerate them (e.g. First, Second and Third). Do not summarize the article – these are your “take aways.” 2. Cite evidence from the article where Blow expresses that Robertson’s position as expressed by his comments below contribute to human suffering and/or social disorganization.“I never, with my eyes, saw the mistreatment of any black person. Not once. Where we lived was all farmers. The blacks worked for the farmers. I hoed cotton with them. I’m with the blacks, because we’re white trash. We’re going across the field. …They’re singing and happy. I never heard one of them, one black person, say, ‘I tell you what: These doggone white people’ — not a word! …Pre-entitlement, pre-welfare, you say: Were they happy? They were godly; they were happy; no one was singing the blues.” 3. Consider how this phenomenon, the denial of racism and the role of systematic racial discrimination in our social institutions (e.g., the justice system, public education, and the economy), contributes to human suffering. What is Robertson view?  What social instiution and what racism do you see in it?  How do both contribute to the suffering of others.  You must identify a social institution in your answer.  4. Consider Blow’s discussion of Robertson’s comments and race relations historically. Which one social perspective best fits Blow’s approach and why?. Hint: There is only one correct answer.  Think about the entire article when choosing the best perspective.  Tell me which perspective first.  Then explain why.

  • Functional Structural which addresses how the phenomenon contributes to social integration or stability,
  • Social Conflict which addresses how the phenomenon generates social conflict as one group endeavors to maintain power over the other,
  • or Symbolic Interaction which addresses how the phenomenon creates individuals’ reality through social interaction.

5. Does Blow believe Robertson’s insensitive comments can be described as a “personal trouble” (i.e., a perspective unique to Robertson and his personal life story) or a “social issue” (i.e., a widely shared perspective, the result of historical and/or social forces? Cite the two places in the article where he clearly states his position on this question.6. Give at least two examples that Blow includes in the article, which contradict Robertson’s comments and/or make his position difficult to believe?7. Consider the data presented in The Southern Divide chart at the end of the article.

  • Why do you think Blow included the chart and what jumps out at you?
  • Now pick a specific question; then, consider and discuss the difference between black and white respondents.

8. What is another question you could add to this survey?  Your question should be directly related to the topic in the article; the denial of racism and discrimination by Phil Robertson.9. Based on your consideration of this article, make two recommendations for future research, new laws, public policies or programs to educate people on this social phenomenon. To get credit, your recommendations must be concrete and specific. For example, “we need to have laws against racism” is far too vague.

  1. Three conclusions
  1. Evidence that Blow believes Robertson’s statements lead to human suffering or social disorganization
  1. How the denial of racism and discrimination lead to human suffering and social disorganization today
  1. Theoretical perspective
  1. Personal Trouble vs. Social Issue
  1. Blow’s evidence to challenge Robertson’s position
  1. Analysis of survey data presented in the chart
  1. Another survey question
  1. Recommendations for research, new laws, policies or programs
In your opinion and legal reasoning, which side has the stronger legal argument/case.

As of this week, you would have studied sixteen chapters of business law, covering such area as:

  • An Introduction to the Fundamentals of Dynamic Business Law
  • The U.S. Legal System and Alternative Dispute Resolution
  • Constitutional Law
  • Criminal Law and Business
  • Tort Law
  • Real, Personal & Intellectual Property
  • The Law of Contracts & Agreements
  • Secured Transactions & Bankruptcy
  • Forms of Business Organizations
  • Employment and Discrimination Law
  • Consumer Law

For this case study assignment, you are being asked to reflect upon the business law areas studied in this business law course.

You will research current legal issues in the world of Business Law by focusing upon current legal issue(s)/cases facing specific industries/companies in the news today.

You will be asked to develop a truncated brief of a case (see “How to Brief Cases and Analyze Case Problems”).

At a minimum, provide answers to the following questions:

  1. Key Players and Interests:  Who are the key players and what are their interests? Interests include needs, wants, desires, concerns, and fears.

 

  1. Facts and Assumptions:  What are the key facts and assumptions necessary for understanding this case study? Facts include key events that impact decision making. Assumptions are the best guess about the current or future situation that is assumed to be true in the absence of facts.

 

  1. Problem Identification:  What are the main issues or problems facing the key players?

 

  1. Company/Industry & Area of Law:  try being Studied/Business Law area being covered in this case study (Could be more than one.

 

  1. In your opinion and legal reasoning, which side has the stronger legal argument/case.
discuss any pending applications, advantages/implications for trade with the US and determine the mean GNP or GNL

Please answer each question throughly. Research must he done where applicable. Your grade is contingent upon the in-depthness of the responses given. The minimum/maximum length of this paper is four pages. Restate question and attach this paper after vour title page

1. One of the Eastern Bloc countries has resulted in a transition from a command economy to a market economy. Explain the process, incentives, decontrols Hungarian’s government has/had to out in place to transition to a market economy. How long you think this process will take? As a manager, at what stage would you try to market your product/service to this country? explain

2. With regards to the various agreements/treaties discussed: EU, WTO, NAFTA, CARICOM. APEC, MERCOSUR, discuss any pending applications, advantages/implications for trade with the US and determine the mean GNP or GNL