Determine how long data should be retained

Assignment Help Software Engineering
Reference no: EM131478000

Pick topic from lecture notes related article.

Lecture notes: Data classification is simply the process of labeling data. These labels allow the data to be properly handled. The process for classifying data is valuable but costly. Every care should be taken to not over classified data as this will burden the information security program with unneeded expenses.

Data classification is commonly thought of as a way to protect data from unauthorized access. However, there are two other purposes for data classification beyond protection. Data classification labels determine how long data should be retained and the labels also determine how quickly the data should be recovered when lost.

The data protection labels are often referred to as the security classification of the data. To ensure that only authorized personnel are granted permission to see the protected data, the information security system must authenticate the identity of the person attempting to access the data.

All organizations have some data that requires protection, often to comply with legal requirements for personal privacy or to ensure corporate confidentiality.

ARTICLE REVIEW INSTRUCTIONS
After reading through your assignments this week, you are to pick a topic of interest that was mentioned in the reading assignment. Using the Jerry Falwell Library and other scholarly resources, you are to locate a peer reviewed journal related to the topic of your interest. Read the journal article thoroughly so you can discuss it. If you wish to use something other than a peer reviewed journal, please consult with your instructor before starting the assignment.

You willthen prepare an article review related to the topic that you researched in the research/reading assignments from the assigned module/week. The article review that you create must be at least 750words and be formatted according to APA style.

Use the following section order to guide you in building your article review but do not use the numbers in your section headers, only the names. Also, this is example is not in APA style, make sure your review follows APA styles, this is a guide NOT a template.
1. Bibliographical Reference:
a. Create a single bibliographical entry in APA style in the first section of your paper. This should include:
i. Detail the author(s) of the article
ii. Name of the Journal (including volume, issue, year, page numbers, etc.)
iii. Name of the article you are reviewing.
b. Note - You may also choose to identify the article you are reviewing (i.e. - I chose to review "Article Name" published in "Journal Name" in "Year/Month") and then simply cite it in a bibliographical entry at the end (see section 7).

2. Objectives:
a. After reviewing the article, use a bulleted list to identity the 3 to 5 primary points you feel the article addresses.
b. Simply put the bulleted list of those points in your Objectives section with something to the effect of "After reviewing "Article Name" the three main points addressed by the author(s) were:
- Bullet one
- Bullet two
- Bullet three

3. Summary:
a. Summarize the article you reviewed in approximately 2 or 3 full paragraphs.
b. Do not use direct quotes at all. If you need to quote it, paraphrase what you read.
c. Use the bullets above (section 2b) to structure what you wish to discuss in this summary (i.e. - In the first paragraph, summarize the article section which addresses the first bullet in 2b and so on).


4. Results:
a. Now that you have read this article and summarized it, what do you feel that a reader can learn about the topic from the article?
b. Using bullet points, highlight the things you feel like you learned more about after reading this article. It's best to keep this list to a maximum of 5 bullets.
c. Note - these bullets should not be identical to the bullets in the Objective Section (2b).

5. Critique:
a. Use this section to provide an academic critique of the article.
i. How well (or poorly) was this article written?
ii. Did it accomplish the objectives it set out to do (think back to the Objectives section)?
iii. Why or why not?
b. Explain your opinion and offer some additional sources (no more than one or two) to support that opinion.
c. When possible, address the subject matter from a biblical perspective (e.g. - the Bible teaches us to... and this article addresses that by...)

6. Questions:
a. List a minimum of 3 (no more than 5) questions that arose from the reading of this article in a numbered list.
b. Consider any thing you feel like you should have learned from the article but did not.
c. Note - These questions may spark your desire to review other matter on the topic and may even be used as a starting point for one of your two research papers (though this is not required).

7. Bibliography:
a. You need to use one other sources to support or deny your opinion and if you chose to only identify the article in section 1, you will want to make a bibliography.
b. Follow APA guidelines for Bibliographies as outlined in the APA 6th Edition Guide.

Verified Expert

It is an article review work done according to the given specification. The work covers a summary of the article, some questions on the lack of information in the article and so on.

Reference no: EM131478000

Questions Cloud

Computer information sharing act : For the following issues, take either the pro or the con position. Computer Information Sharing Act (CISA). Ethical hacking of commercially provided source code
Equal masses of the first and third are mixed : Find the equilibrium temperature when equal masses of the first and third are mixed.
How corporate structure impacts effectiveness of governance : Corporate structure and how it impacts the effectiveness of governance. Concerns to consider when developing and strengthening a team culture.
Find the density of the oil : The scale now reads 275 N. Find the density of the oil.
Determine how long data should be retained : Data classification labels determine how long data should be retained and the labels also determine how quickly the data should be recovered when lost.
What is a database : Which of the following is a parameter in the Normal Distribution Dialog of the Risk Solver Platform?
Outline the differences between solids : Outline the differences between solids, liquids and gases in terms of
Explain what are some project pitfall you will want to watch : Read the project case for this assignment. What are some project pitfalls you will want to watch out for as you execute this project?
Calculate maximum length that circuit-board trace carrying : Phase shift due to finite length of circuit conductors. On a particular type of circuit board, Calculate the maximum length that circuit-board trace carrying

Reviews

inf1478000

5/17/2017 5:38:43 AM

I welcome your secrecy and taking such a great amount of consideration in conveying literary theft free papers. When I get to be well known and take transcendence in my work, I trust you are not affronted on the off chance that I don't specify your business :). I do secretly prescribe your services to my trusted companions. Much obliged to YOU.

len1478000

4/28/2017 8:58:42 AM

Criteria Points Possible The article review was submitted by the due date. 5 The article review addressed a topic relevant to the course content. 5 The article review was formatted according to current APA standards. 5 The Bibliographic Reference section detailed the title, author(s), journal name, volume, issue, year, and page numbers. 5 The Objectives section included the goal or purpose of the article. 15 The Summary section included a synopsis of the article and was free of direct quotes. 15 The Results section explained key observations, conclusions, or findings in the article. 15 The Critique section included an opinion, explanation, and biblical integration. 15 The Questions section included at least 3 questions that arose as a result of the article review. 15 Grammar usage was satisfactory. 5 Total 100

len1478000

4/28/2017 8:58:31 AM

I have to pick topic from lecture notes related article. Lecture notes: Data classification is simply the process of labeling data. These labels allow the data to be properly handled. The process for classifying data is valuable but costly. Every care should be taken to not over classified data as this will burden the information security program with unneeded expenses. Data classification is commonly thought of as a way to protect data from unauthorized access. However, there are two other purposes for data classification beyond protection. Data classification labels determine how long data should be retained and the labels also determine how quickly the data should be recovered when lost. The data protection labels are often referred to as the security classification of the data. To ensure that only authorized personnel are granted permission to see the protected data, the information security system must authenticate the identity of the person attempting to access the data. All organizations have some data that requires protection, often to comply with legal requirements for personal privacy or to ensure corporate confidentiality.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd