Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Discussion Question Responses

27/09/2020 Client: jwilson1228 Deadline: 3 days

Please formulate a response for each of the three discussion questions. The response must be at least 2 paragraphs and contain references. 


Melissa Power- User Authentication


Typically, identification is done face-to-face. If identification needs to be verified, photo identification is typically utilized. Usually a Driver’s License or Passport is used for identification purposes. However, when using computer technology, there is a different way that identifications take place. This identification process is called User Authorization. This process of one or more steps allows the computer system to verify that the person who wants access to information is authorized to do so (UMGC, 2020a).


The first and most common form of authentication that a user would perform would be to enter their username or user identification and password. However, because 53% of people have the same password for multiple logins, this is something that can be easily stolen or become compromised in some way (Security, 2020). There are several other methods that can be used such as answering specific questions that only the User would know, sending a code to the phone number or email address registered with the system that the User has access to and can enter, or even a biometric scan by using an eye or fingerprint. A multi-step process for verifying the user is called multi-factor authentication (UMGC, 2020b). This process allows for increased security.


When an applicant utilizes the MTC Hiring System, multi-factor authentication must be considered because of the ever-increasing data breaches that are occurring. Should a data breach occur, it will compromise the personal information of the applicant and can increase the potential for their identity to be stolen (Carnegie Mellon University, 2019). Keeping that in mind, this could not only compromise the relationship that we are trying to establish with current applicants but any future applicants. Utilizing an increased user authentication experience would add another layer of security that would be potentially hard to replicate. Utilizing something that the applicant knows (username and password) and something that the applicant has (a code sent to their smartphone) would be easy enough to allow for mobile access while also providing a two-factor authentication to all the applicant access to their portal.


References:


Carnegie Mellon University. (2019, September 19). Multi-factor authentication: What it is and why you need it. Information Security Office: Computing Services. https://www.cmu.edu/iso/news/mfa-article.html


Security. (2020, May 7). 53% of people admit they reuse the same password for multiple accounts. Security solutions for enabling and assuring business. https://www.securitymagazine.com/articles/92331-of-people-admit-they-reuse-the-same-password-for-multiple-accounts


UMGC. (2020a). Requirements.


UMGC. (2020b). Information systems security.




Djenabou- Protection of data as it is transmitted and when it is stored


Data protection entails the appropriate measures taken to ensure collected data is safe from compromise, tamper or loss. There is need to store data, since the quantity of information that needs to be kept increases daily. Data protection when it is transmitted means safeguarding the data when it is not yet at rest, while the stored data implies information that is already kept in a database or any storage platform. Wiseman (2017) opines that keeping data safe from compromise or loss protects the dignity of the data; hence it can be effectively used for future purposes without conflicts.


Explanation:


Protection of data as it is transmitted and when it is stored


Data protection entails the appropriate measures taken to ensure collected data is safe from compromise, tamper or loss. There is need to store data, since the quantity of information that needs to be kept increases daily. Data protection when it is transmitted means safeguarding the data when it is not yet at rest, while the stored data implies information that is already kept in a database or any storage platform. Wiseman (2017) opines that keeping data safe from compromise or loss protects the dignity of the data; hence it can be effectively used for future purposes without conflicts.


In addition, protecting crucial information during its transmission or when it is stored prevents the infringement of privacy rights of the people or organizations whose data is stored (Allen, 2013 and Dos Santos, 2018). For example, the data being transmitted or stored may contain the demographic, personal and financial information of a person, which they may not be intending to expose to the public. As Taylor (2015) posits, every person has a right to privacy and infringement of their confidentiality rights by exposing their data amounts to lawsuit.


Protection of data during transmission or when it is stored can influence MTC hiring in many ways. For instance, safeguarding the data about prospective employees can ensure access control policies that enhance effective sentiment analysis. Therefore, stakeholders can easily classify and cluster potential staff. The stored data will offer a comprehensive overview of all applications listed to fill positions.


References


Allen, P. (2013). The importance of data protection inside your enterprise. Network Security, 2013(11), 12-14. doi: 10.1016/s1353-4858(13)70121-1


Dos Santos, J. G., Cappellozza, A., & Albertin, A. L. (2018). Antecedents of Perceived Benefits of Compliance Towards Organizational Data Protection Policies. IEEE Latin America Transactions, 16(3), 891-896.


Taylor, M. (2015). "Safeguarding the Right to Data Protection in the EU", 30th and 31st October 2014, Paris, France. Utrecht Journal Of International And European Law, 31(80), 145-152. doi: 10.5334/ujiel.cw


Wisman, T. (2017). Introduction: Data Protection in All Directions. European Data Protection Law Review, 3(3), 399-401. doi: 10.21552/edpl/2017/3/17




Robert Calderwood- Aloha,


     During the hiring process, there may be a need to identify/evaluate the tacit knowledge needed/required for a position. This question can be for anyone... what is meant by tacit knowledge and how/what types of questions could be asked to have an applicant demonstrate tacit knowledge? More than one student can respond and feel free to respond to other students that contribute.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Academic Master
Top Academic Guru
Homework Tutor
Instant Assignments
Financial Hub
High Quality Assignments
Writer Writer Name Offer Chat
Academic Master

ONLINE

Academic Master

I have been working as a article writer for the past 5 years. With genuine expertise gathered over the course of these years, I will provide you with optimum quality Led articles writing work. You can skim through my portfolio to have an overview of my experience and the projects I have completed. I will be looking forward to avail this opportunity of working with you. Thanks

$110 Chat With Writer
Top Academic Guru

ONLINE

Top Academic Guru

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$105 Chat With Writer
Homework Tutor

ONLINE

Homework Tutor

Hello client, I have gone through the project specifications you have provided and I can easily manage the task. I am an experienced writer with diverse Knowledge in Article writing and Rewriting, Dissertations & Thesis writing, reports, case studies, and Literature Review.

$105 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

Good day dear client, I am a full-time freelance writer with years of experience. My strongest strengths are strong dedication to duty, reliability, quality and excellence. I am going to do an outstanding job for you, kindly PM me and let us commence. Thank you so much in anticipation of your positive response. Thank you very much.

$125 Chat With Writer
Financial Hub

ONLINE

Financial Hub

Hey, I have gone through your job posting and become very much interested in working with you.I can deliver professional content as per your requirements. I am a multi-skilled person with sound proficiency in the English language for being a native writer who worked on several similar projects of content writing and can deliver quality content to tight deadlines. I am available for both online and offline writing jobs with the promise of offering an incredibly responsive and supreme level of customer service. Thanks!

$125 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

With an extensive experience of over 10 years of writing and editing, I promise to meet or exceed your expectations. The days of automated, copied, plagiarized, and unethically optimized content are long gone. Today, you need engaging, well-researched, and optimized content that serves your SEO purpose and boosts your website ranking in the search engines. Not only this, you need EXCELLENT content that leaves a lasting impression on prospective customers and gives you an edge over the competition. This is exactly what I do.

$125 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Please read carefully - Andrew jackson was a great president - Brisbane city council rubbish dump - Define fair minded - Direct financing vs sales type lease - Kris jamsa cloud computing pdf - Module 2 Personal Reflection Journal - Discussion - Swedbank account number format - Mcdonalds station observation checklist download - PC BUILD AND MANUAL PART 2 - Practical sharepoint 2013 governance pdf - Physics heinemann 12 worked solutions - Harriet's hats accounting problem solution - Optimal data visualization method - Leininger's sunrise model of transcultural nursing - What other symbols represent human sexuality reproduction and fertility - Amazon in emerging markets pdf - Sample student success plan - Payroll policies and procedures australia - Principles of incident response and disaster recovery, 2nd edition pdf download - Saving the bees persuasive speech - Fook kee spencer village - Ao care cancellation form - Density of citric acid in g ml - Persuasive speech outline on donating to charity - Themes in billy elliot - Ethical Theory and Business - Sam excel project - Db2 tricky interview questions - Mpa to kn m2 - Park house surgery bagshot - Http pages stern nyu edu adamodar new_home_page datafile ratings htm - Consider a cylindrical specimen of some hypothetical metal alloy - Velmead junior school fleet - Perceptual map presentation mkt 421 powerpoint - V for vendetta analysis - Alien species often pose a threat to native species because - How aura scanner works - What is 7 12 equivalent to - Converging and diverging tectonic plates - Yo / pedirles / que / (ustedes) / darme / otra oportunidad - Research proposal - Fast food nation sparknotes chapter 2 - Journal Article 4 - Motivating factors of international business - Professional accountability in clinical expertise - Www greenwichcollege edu au goals - Company that pioneered metal drivers in golf crossword - Delta airlines case analysis - Vroom and yetton decision making model - American international group scandal - Family office presentation ppt - The thirteen british colonies map assignment - Case study week 3 - White solver paints colour chart - Blessed margaret mary alacoque eveline - Girl by jamaica kincaid prezi analysis - Mapquest distance api - 7012 Week 3 - Assignment: Use Research Strategies to Support Evidence-Based Practice in Healthcare - Galvanic cell reaction equation - Thermal energy harvesting power supply w ltc3108 and supercapacitor storage - 745 Wk 8 DQ 1# - Data Collection & Analysis - Videio questions - The journey of my life poem by rabindranath tagore - Bond j has a coupon rate of percent - Ellon to aberdeen bus times 68 - Process paper - 10 lessons in clarity and grace - Quentin p taylor author - Maslow's hierarchy of needs nursing diagnosis - New manufacturing facility in china case study - RS - Telstra accessory repayment option - Which statement decribes megalithic architecture - Diamond mesh lath installation - The raid 2 classical music - The jilting of granny weatherall selection test answers - How to create a cost benefit analysis in excel - Balanced chemical equation for combustion - Analytical research - When was rhapsody on a windy night written - Caen car park braunton - ________ is goodness put into action. - The baggage system at denver prospects and lessons - Causes of world war one crossword - Cdhp basic full hap epa - Stewie listens to anne murray - What is current audit file - M2 medicare levy surcharge instructions - Jack daniels family of brands 5pk - Monthly manufacturing overhead flexible budget - A case study of domino's pizza crisis communication strategies - ADVANCED ENGINEERING MATHEMATICS BY ERWIN KREYSZIG 10TH EDITION SOLUTION - Philippine lambanog distilled coconut wine - Examples of bad science in gattaca - 5 Business Related Historical Events - Y yo vot 1 2gt 2 solve for t - Http earthquake usgs gov regional nca virtualtour