skip to main contentMy HomeIN301M1 Secure Database DevelopmentUpdate alerts

 skip to main contentMy HomeIN301M1 Secure Database DevelopmentUpdate alerts – You have new alertsNHNicki HamiltonContentDiscussionsAssignmentsQuizzesGradesMore ToolsHelp

  • Bookmarks
    Bookmarks0 bookmarked topics
  • Course Schedule
    Course Schedule0 upcoming events
  • Table of Contents
    Table of Contents17Incomplete activities
  • Getting Startedmodule: contains 1 sub-modulesAll tasks are completed
  • Syllabusmodule: contains 0 sub-modulesAll tasks are completed
  • Course Resourcesmodule: contains 0 sub-modules5Incomplete activities
  • Digital Bookmodule: contains 0 sub-modules1Incomplete activities
  • Academic Toolsmodule: contains 0 sub-modules4Incomplete activities
  • Learnmodule: contains 1 sub-modules
  • Connectmodule: contains 2 sub-modules5Incomplete activities
  • Practicemodule: contains 2 sub-modules
  • Competency Assessmentmodule: contains 1 sub-modulesselected2Incomplete activities
    • Assessmentmodule: contains 0 sub-modules2Incomplete activities

Competency Assessment

Print

Competency Assessment

To receive credit, you must complete the Competency Assessment. You may contact your professor if you have any questions.

This Competency Assessment (CA) assesses your level of performance on the specific outcome(s) that are the focus of this course. The CA requires you to demonstrate your knowledge, understanding, and proficiency of the outcome(s). Be sure to use the other activities in this course prior to attempting the CA. You can attempt the CA an unlimited number of times within the term. However, the CA must be completed successfully by the end of the term to earn credit. You can attempt the CA an unlimited number of times within the term. However, the CA must be completed successfully by the end of the term to earn credit. 

Be sure to review the Competency Assessment Checklist Rubric in order to understand the criteria on which you will be evaluated.

Instructors will provide feedback on the CA. If you expect to receive feedback, revise, and resubmit this CA near the end of the term, you will need to make your submission no later than 5 days before the end of the term.

Please refer to your syllabus for additional Competency Assessment requirements.

Expand All  Collapse All0 %0 of 2 topics completeShow data table for This chart displays the number of completed topics versus the total number of topics within module Competency Assessment..

List of Topics and Sub-Modules Purpose
Part 1 will provide a review of SQL. You will also apply threat modelling concepts and use the DREAD model to find risks for two threats.
Part 2 will provide an overview of various big data security concerns, such as authentication, permissions, and data accessibility. You will also explore possible solutions to some security concerns specific to big data ecosystem. Finally, you will secure shell and transfer a file to/from the Hadoop virtual machine.
Instructions
Part 1: SQL Review and Threat Analysis
You must have SQL Server Express, SQL Server Management Studio, and the Adventure Works® OLTP database installed to perform this Assessment. You will also want to download, or bookmark, the design document for that database.
If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: SQL Server Setup.
Complete the following:
For each of the following actions, use the Adventure Works database to formulate an SQL solution.
Please copy the numbered action into your Microsoft Word® document.
For items 1–5 below, provide screenshot of the execution of the SQL showing the code and the result set. Make sure to also respond to items 6 and 7.
Start a next action on a new page.

  1. Show a person’s name, credit card number, and type.
  2. Show a store name and year-to-date sales. Group by name and year-to-date values.
  3. Create three tables with the following parameters:IN301: primary key field, vulnerability_id, solution_id and organization. All fields require a value except the organization. Identify foreign key columns properly.
    Vulnerability: primary key field, vulnerability_name. All fields require values.
    Solution, primary key field, solution_name. All fields require values.
  4. Insert 5 rows into each table. Ensure two IN301 organization fields have null values.
  5. Show an organization, vulnerability and solution. Be sure to only show the organization with values.
  6. Using the Adventure Works design document, identify important data assets. Explain your table selections.
  7. Keeping those important data assets in mind, develop a DREAD threat rating for the below. Include a brief description of which had the higher risk rating and explain why.
    1. Excessive privilege abuse.
    2. Malware.
  8. In order to obtain mastery level for this Competency Assessment, complete the following:
    Apply the Microsoft Threat Modeling Tool™ to model a case of a mobile client sending a request to a database. Show the database returning a response to the mobile client. Create a full report of the results.
    Part 2: Big Data Ecosystem
    You must have VirtualBox® and Hortonworks Hadoop HDP installed and running.
    If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: Hadoop Setup.
    Complete the following:
    For each of the actions, as applicable, use the Hortonworks Hadoop HDP virtual machine environment.
    Please copy the numbered action into your Microsoft Word document.
    Respond to items 1–3. For items 4–5 below, provide a screenshot of the execution showing the command and the result set.
    Start a next action on a new page.
  9. Other than authentication, explore a big data security concern in depth. Explain what it is, why it is a security concern and possible solutions.
  10. Other than Kerberos, research what Hadoop uses to ensure secure authentication, permissions, and/or data accessibility.
  11. Explain how Kerberos works in the Hadoop ecosystem.
  12. Secure shell to the Hadoop virtual machine.
  13. Transfer a file to and from your host and Hadoop virtual machine.
  14. Minimum Submission Requirements
  • This Assessment should be a Microsoft Word document, containing all screenshots and requirements as indicated in the individual instructions for each part, in addition to the title and reference pages.
  • Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your submission should be highly organized, logical, and focused.
  • Your submission must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.
  • Your submission should provide a clearly established and sustained viewpoint and purpose.
  • Your writing should be well ordered, logical and unified, as well as original and insightful.
  • A separate page at the end of your submission should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research.
  • Be sure to cite both in-text and reference list citations where appropriate and reference all sources. Your sources and content should follow proper APA citation style. For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.
  • Your submission should:
    • include a cover sheet;
    • be double-spaced;
    • be typed in Times New Roman, 12 -point font;
    • include correct citations
    • be written in Standard English with no spelling or punctuation errors; and
    • include correct references at the bottom of the last page.
  • If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Your reflection should be a minimum of 2-3 pages (MLA

Your reflection should be a minimum of 2-3 pages (MLA format). In a document saved in Word or PDF, answer or elaborate on the following (you may  use one paragraph for each numbered set of questions: for example, one paragraph for number one, etc.): 1. Overview: In your own words,

Share an example from your nursing practice setting of how

  Share an example from your nursing practice setting of how a decision was made to change a procedure or practice. What steps were used in the decision-making process? What evidence was considered for decision-making? Was the change effective? Provide rationale Submission Instructions: Your initial post should be at least

Has strategic-level international intelligence cooperation and/or

 A basic concept for my dissertation: 1. Has strategic-level international intelligence cooperation and/or intelligence liaison improved intelligence operations improved since 1944? Five eyes was intelligence sharing after World War 2 between US, UK, Australia, Canada and New Zealand. Now it is much larger. What are the difficulties in intelligence cooperation

Write an analysis in which you select two publicly-traded companies

Write an analysis in which you select two publicly-traded companies within the same industry and present the DuPont analysis for each of these companies.  Write a research report that outlines the topics – Explain how the debt has served to influence the ROE DuPont performance results for each company you

Read the article from The Atlantic about protest music. Create

 Read the article from The Atlantic about protest music. Create an annotated playlist of six examples of protest music that matters to you. Include the title of the song, information about the artist, and a YouTube link, as well as a paragraph about the song’s effectiveness as protest music.    The Atlantic website

If you go into a Content Marketing role, you will

If you go into a Content Marketing role, you will likely conduct (or play a role in conducting) a Content Audit.  Many companies have a Content Audit Template that they use but you may be asked to create your own. The Content Audit Template below can be your blank slate

You should drive, walk, or take public transportation to move

  You should drive, walk, or take public transportation to move about in your selected community (or zip code area) to make systematic observations that will help you understand more about the characteristics and health status of the community. During the tour, you should look for and consider the following:

Paper #1: Analysis of a 10-K Relating to Segment and

Paper #1: Analysis of a 10-K Relating to Segment and NCI Reporting & Disclosures  1. Locate Procter & Gamble SEC 10-K from the SEC website (www.sec.gov).  2. Explore the concepts of segment and NCI disclosure and reporting using course resources. You must also find and review / read outside literature

Imagine that you are part of a research team that

Imagine that you are part of a research team that specializes in diagnosing disorders associated with malfunctioning cellular structures. Medical doctors consult your group to help diagnose particularly difficult cases. You have been presented with the following data: Patient History:o Seven year-old boyo Fatigueo Muscle weaknesso Low enduranceo Loss of

How has the Navajo Nation incorporated (or tried to incorporate)

How has the Navajo Nation incorporated (or tried to incorporate) traditional values into its legal system? (hózhó, k’é, k’éi)  Paper details NO OUTSIDE SOURCES! ONLY THE BOOK. Each paragraph should written to illustrate ONE point with at least one example to demonstrate the point you are trying to make. Thesis

SMUM The Impact of Stress on Academic Achievement Questions Nursing Assignment Help

   Expert Solution Preview Introduction: As a medical professor responsible for creating college assignments and evaluating students’ performance, my primary goal is to ensure that medical college students receive comprehensive and challenging coursework. By designing lectures, examinations, and assignments, I aim to assess their understanding of medical concepts, encourage critical

Preparation your wedding is an amazing time, however it is

 Preparation your wedding is an amazing time, however it is likewise an extremely important choice. You wish to ensure you choose the best photographer to record your special day. If you are looking for a wedding photographer in Chandigarh, then you are in the right place. Read on for more

Financial Management: Report of futures trading

Pick an industry and job of their choice that utilizes commodity futures trading. The report will provide details of the industry, job requirements and corporate goals. The student will develop strategies for that particular company to maximize profits while limiting risk associated to the industry. The goal of the report

Massage Therapy effects on a single patient with Fibromyalgia

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Service Marketing: The reasons for the use of the extending marketing mix

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Investigate and propose a psychiatric diagnosis based on the case

Investigate and propose a psychiatric diagnosis based on the case study attached. Include an in-depth overview of the disorder within the diagnosis, treatment options for the diagnosis, and a sound rationale that explains why this diagnosis was made. Must present a thorough overview of each disorder within the diagnosis. Assume

One of your reading assignments in Unit 1 was Chapter

  One of your reading assignments in Unit 1 was Chapter 1 of the course textbook. That included a “five-step ethical decision-making process” which is listed below. You might consider re-reading that section to refamiliarize yourself with the process. Develop a problem statement Identify alternatives Choose alternative Implement decision Evaluate