skip to main contentMy HomeIN301M1 Secure Database DevelopmentUpdate alerts

 skip to main contentMy HomeIN301M1 Secure Database DevelopmentUpdate alerts – You have new alertsNHNicki HamiltonContentDiscussionsAssignmentsQuizzesGradesMore ToolsHelp

  • Bookmarks
    Bookmarks0 bookmarked topics
  • Course Schedule
    Course Schedule0 upcoming events
  • Table of Contents
    Table of Contents17Incomplete activities
  • Getting Startedmodule: contains 1 sub-modulesAll tasks are completed
  • Syllabusmodule: contains 0 sub-modulesAll tasks are completed
  • Course Resourcesmodule: contains 0 sub-modules5Incomplete activities
  • Digital Bookmodule: contains 0 sub-modules1Incomplete activities
  • Academic Toolsmodule: contains 0 sub-modules4Incomplete activities
  • Learnmodule: contains 1 sub-modules
  • Connectmodule: contains 2 sub-modules5Incomplete activities
  • Practicemodule: contains 2 sub-modules
  • Competency Assessmentmodule: contains 1 sub-modulesselected2Incomplete activities
    • Assessmentmodule: contains 0 sub-modules2Incomplete activities

Competency Assessment

Print

Competency Assessment

To receive credit, you must complete the Competency Assessment. You may contact your professor if you have any questions.

This Competency Assessment (CA) assesses your level of performance on the specific outcome(s) that are the focus of this course. The CA requires you to demonstrate your knowledge, understanding, and proficiency of the outcome(s). Be sure to use the other activities in this course prior to attempting the CA. You can attempt the CA an unlimited number of times within the term. However, the CA must be completed successfully by the end of the term to earn credit. You can attempt the CA an unlimited number of times within the term. However, the CA must be completed successfully by the end of the term to earn credit. 

Be sure to review the Competency Assessment Checklist Rubric in order to understand the criteria on which you will be evaluated.

Instructors will provide feedback on the CA. If you expect to receive feedback, revise, and resubmit this CA near the end of the term, you will need to make your submission no later than 5 days before the end of the term.

Please refer to your syllabus for additional Competency Assessment requirements.

Expand All  Collapse All0 %0 of 2 topics completeShow data table for This chart displays the number of completed topics versus the total number of topics within module Competency Assessment..

List of Topics and Sub-Modules Purpose
Part 1 will provide a review of SQL. You will also apply threat modelling concepts and use the DREAD model to find risks for two threats.
Part 2 will provide an overview of various big data security concerns, such as authentication, permissions, and data accessibility. You will also explore possible solutions to some security concerns specific to big data ecosystem. Finally, you will secure shell and transfer a file to/from the Hadoop virtual machine.
Instructions
Part 1: SQL Review and Threat Analysis
You must have SQL Server Express, SQL Server Management Studio, and the Adventure Works® OLTP database installed to perform this Assessment. You will also want to download, or bookmark, the design document for that database.
If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: SQL Server Setup.
Complete the following:
For each of the following actions, use the Adventure Works database to formulate an SQL solution.
Please copy the numbered action into your Microsoft Word® document.
For items 1–5 below, provide screenshot of the execution of the SQL showing the code and the result set. Make sure to also respond to items 6 and 7.
Start a next action on a new page.

  1. Show a person’s name, credit card number, and type.
  2. Show a store name and year-to-date sales. Group by name and year-to-date values.
  3. Create three tables with the following parameters:IN301: primary key field, vulnerability_id, solution_id and organization. All fields require a value except the organization. Identify foreign key columns properly.
    Vulnerability: primary key field, vulnerability_name. All fields require values.
    Solution, primary key field, solution_name. All fields require values.
  4. Insert 5 rows into each table. Ensure two IN301 organization fields have null values.
  5. Show an organization, vulnerability and solution. Be sure to only show the organization with values.
  6. Using the Adventure Works design document, identify important data assets. Explain your table selections.
  7. Keeping those important data assets in mind, develop a DREAD threat rating for the below. Include a brief description of which had the higher risk rating and explain why.
    1. Excessive privilege abuse.
    2. Malware.
  8. In order to obtain mastery level for this Competency Assessment, complete the following:
    Apply the Microsoft Threat Modeling Tool™ to model a case of a mobile client sending a request to a database. Show the database returning a response to the mobile client. Create a full report of the results.
    Part 2: Big Data Ecosystem
    You must have VirtualBox® and Hortonworks Hadoop HDP installed and running.
    If you do not have the above software installed, please perform the required installations. The following document will assist you with installation of the software: Hadoop Setup.
    Complete the following:
    For each of the actions, as applicable, use the Hortonworks Hadoop HDP virtual machine environment.
    Please copy the numbered action into your Microsoft Word document.
    Respond to items 1–3. For items 4–5 below, provide a screenshot of the execution showing the command and the result set.
    Start a next action on a new page.
  9. Other than authentication, explore a big data security concern in depth. Explain what it is, why it is a security concern and possible solutions.
  10. Other than Kerberos, research what Hadoop uses to ensure secure authentication, permissions, and/or data accessibility.
  11. Explain how Kerberos works in the Hadoop ecosystem.
  12. Secure shell to the Hadoop virtual machine.
  13. Transfer a file to and from your host and Hadoop virtual machine.
  14. Minimum Submission Requirements
  • This Assessment should be a Microsoft Word document, containing all screenshots and requirements as indicated in the individual instructions for each part, in addition to the title and reference pages.
  • Respond to the questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. Your submission should be highly organized, logical, and focused.
  • Your submission must be written in Standard English and demonstrate exceptional content, organization, style, and grammar and mechanics.
  • Your submission should provide a clearly established and sustained viewpoint and purpose.
  • Your writing should be well ordered, logical and unified, as well as original and insightful.
  • A separate page at the end of your submission should contain a list of references, in APA format. Use your textbook, the Library, and the internet for research.
  • Be sure to cite both in-text and reference list citations where appropriate and reference all sources. Your sources and content should follow proper APA citation style. For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.
  • Your submission should:
    • include a cover sheet;
    • be double-spaced;
    • be typed in Times New Roman, 12 -point font;
    • include correct citations
    • be written in Standard English with no spelling or punctuation errors; and
    • include correct references at the bottom of the last page.
  • If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Perform a buy-build-ally analysis for your company (Toyota) and recommend actions the company can take to realize the identified opportunity within five

Perform a buy-build-ally analysis for your company (Toyota) and recommend actions the company can take to realize the identified opportunity within five years. Use resources such as the company website, which will have pertinent information including its most recent sustainability report, and other relevant sources to help complete this presentation.  Create a

Chapter#9 from the textbook The protections from the security software

 Chapter#9 from the textbook The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only

Problem: A large auto company has just completed the research

    Problem: A large auto company has just completed the research and development (R&D) on a new product, the Electrobicycle. The Electrobicycle is an electronic, climate-controlled bicycle with zero emissions. The R&D efforts focused on developing the capability to utilize electricity to power bicycles. Ultimately, the auto company expects

Assessment Instructions – Foundations Essay Assessment

Instructions • Respond with a minimum of 300, maximum 450-word answer per question  • Use the internet and/or attached sources • Consider integrating these tools: – Convergent/Divergent/Convergent (C-D-C) Thinking Cycle – Thinking Framework (Environment, Problem, Approach) – Critical, creative, and ethical thinking types Essay Questions and Points for Consideration 1.

Overview You are a part of the strategic planning team.

  Overview You are a part of the strategic planning team. Your team will communicate the analysis and recommendations in a compelling report for the board of directors. The report will also outline a change management strategy. To measure the success of your change initiative, you must set goals for

FRAUD CASEBOOK ZZZZ Best Read the following articles or other

 FRAUD CASEBOOK ZZZZ Best Read the following articles or other related articles regarding the ZZZZ Best case and then answer the questions below:   Sources:  Elmer-DeWitt, Philip, “ZZZZ Best May Be ZZZZ,” TIME in partnership with CNN, July 20, 1987.   Light, Larry, Oluwabunmi Shabi, and Kevin Kelly, “From Con

Your task is to offer a detailed critique of a

Your task is to offer a detailed critique of a peer-reviewed article you locate in the CSU Online Library. The article must be related to explaining how the needs of certain groups of individuals or institutions (e.g., veterans, the elderly, the poor, hospitals, or clinics) can determine how government on

Personal Reflection Question – Total Marks – 25 (max word

  Personal Reflection Question – Total Marks – 25 (max word limit – 700) 1. Choose any two market leaders in the sector that you are currently working or choose Zara and H&M from the fashion retail industry. List out some of the major challenges faced by these companies regarding

Required Resources Read/review the following resources for this activity: Lesson

Required ResourcesRead/review the following resources for this activity: IntroductionInstagram, Snapchat, and Facebook are undoubtedly dominating the world of online social networking, and the willingness of many users to self-disclose personal information ranging from moods to religious affiliation, relationship status, and personal contact information has led to an increase in privacy

Explain the effects of racism, stereotyping, and discrimination in teaching and learning of ELLs from diverse backgrounds and at varying English proficiency levels, and considering linguistic differences reflected in the ELL population

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

How have user’s needs impacted the development of accounting principles

How have user’s needs impacted the development of accounting principles for the reporting of state and local government units? Should governmental units be held to a higher ethical standard based on their user’s needs as opposed to the user needs of private businesses? Please write and one page and half 

150 words Discuss what factors make up an organization’s culture

150 words   Discuss what factors make up an organization’s culture and how do you ensure that culture is sustainable and ethical? Have you ever received a performance appraisal? Describe your reaction to the appraisal system. If you haven’t, please explain what appraisal process you would prefer. As a manager, discuss what

Design Your First Infographic For this week’s assignment, you will

  Design Your First Infographic For this week’s assignment, you will be designing an infographic. Is this your first time giving it a try? Check out this LinkedIn Learning module that will provide you with some tips and tricks to designing your first infographic! Module Overview: Infographics distill information into

Wearable fitness devices have been a hot topic in health

Wearable fitness devices have been a hot topic in health and wellness for a few years now. Wearable fitness devices can be used to track physical activity, sleep, and heart rate and are often paired with a smartphone or website to track and store data. Several technology companies are revealing