Answering QuestionsQuestion 1 a) Data Hiding is the best practice for safe guarding sensitive database data also referred to as security through obscurity. b) It is important to safeguard sensitive computer records related to individuals to prevent loss of personally identifiable information, thus preventing substantial harm, embarrassment, inconvenience or unfairness to an individual (Wu amp. Liu, 2003).Question 2 a) First check the obvious. If the file is not in the Recycle Bin, click Start, Search and use Windows’ click View, Explorer Bar, Search and select All files and folders in the left pane. For Vista, choose Start, Search, click the down arrow on the right side of Advanced Search, then select Date modified in the Date dropdown menu which is on the left. Here, you then look for any recently created, altered or renamed files. If you find what you are looking for, to be safe, save it in at least two different storage devices. b) -Identity proofing, registration and credential delivery which bind an identity to a token. Depending on the level of assurance necessary for the system, this process is done either remotely or in person. It includes: Remote authentication mechanisms: This is the combination of authentication protocols credentials and tokens which are used in establishing the subscription of the claimant’s authenticity as a subscriber.Assertion mechanisms: This is used to communicate remote authentication results to other parties. They are issued by verifiers pertaining to claimants as a result of a successful authentication, and they are either signed in a digital way by their issuers or by direct way of obtaining, by presenting parties from a trustworthy party through a protocol with secure authentication. They would not be the same for a bank versus a school since in a bank, the authentication protocols present a way a claimant can establish the token control to a verifier without compromise but with a school, such high level of security is not required since they don’t run high risk business. They do not hold highly sensitive documents as it is with a bank (Williams amp. Simoff, 2006).Question 3 a) Age, gender/sex and socio-economic status: In analyzing the audience, I will first determine the primary age group and gender of your audience, audience’s race and/or cultural background, my audience location in terms of their country/state/city, their education level, socio-economic status and religion. b) What I believe I can do as a speaker to respond to the audience’s listening goals is focusing on what they are interested in since it is a common thing to see. Otherwise one may encounter problems since intelligent people talk about what they’re interested in rather than what the audience is interested in. c) I would tell them why they should listen to stress the relevance of the topic at hand, and then I would not make it neither too easy nor too hard, so that they don’t assume it or be scared of it (Okongo, 2007).Question 4 The type of outline and/or speaking notes I would prefer to use for my speech is detailed preparation outline. This helps in my preparation of my speech. Here, I will state my specific purpose and focal idea. give a label to the introduction, the body, and finally the conclusion. while designating internal previews, transitions and also internal summaries. I will identify the main points and sub points by a coherent pattern which will be of symbolism and indentation (Okongo, 2007).ReferencesOkongo, A. G. (2007). Audience Analysis in Skilled Communication. Milton Keynes: AuthorHouse.Williams, G. J., amp. Simoff, S. J. (2006). Data Mining: Theory, Methodology, Techniques, and Applications. London: Springer.Wu, M., amp. Liu, B. (2003). Multimedia Data Hiding. London: Springer.
Safe Guarding Sensitive Database