User Domain Policies Discussion Read the following Scenario You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided t

User Domain Policies

Discussion

Read the following Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees. Sean, your manager, just came into your office at 6:00 p.m. on Friday and asks you to write a report detailing these user access policies. He needs you to research a generic template and use that as a starting point from which to move forward. He wants you to complete this task over the weekend as he has just been given a boatload of tasks in the management meeting which ended a few minutes ago. He is counting on you to take some of the load off his shoulders. The report is due to senior management next week.

Discussion requirements

  • Look for existing policy templates and examples from organizations of similar type. 
  • List user access policies based on your research, and place them into a table with an introduction explaining the following: who, what, when, why. 
  • Be sure to add a rationale for your selection. 
  • Reference your research

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

1st) Configuring IPV4 and IPV6 Addressing- 2nd) Deploying and Configuring the dynamic Host Configuration ProtocolService. 3rd) Installing Domain Controllers.

 

Prepare an initial researched and cited discussion response early in the week about the topic you choose and follow with at least two researched and cited replies to other class members or your instructor. Please provide complete, well designed and substantive (150 words or more) responses in discussion. Research and APA references are necessary for every post.  Wikipedia is not an acceptable resource, nor is your textbook.  The purpose of the discussion is to go BEYOND the material covered in the text.

Post a minimum of three (3) meaningful, researched and cited contributions  each week. When there are high quality posts submitted in discussion, then, there is a better chance for a high quality grade. Any minimum work deserves a minimum reward.

The 5×4 grading rubric …

[5 Performance Levels: Incompetent (60%), Novice (70%), Pertinent (80%), Efficient (90%), Proficient (100%)] …

[4 Criteria Areas: Content, Required Format, Grammar/Spelling, References with each area having 25% effective value]

Avoid Creating new threads, Why?

When we create new threads, we introduce the possibility that someone could miss what we have to say because they have to leave one discussion to move to another just to see what is going on in that thread. Because most prefer to respond to another’s comment, keeping all comments in one discussion thread works best for sharing our knowledge.

Keep in mind — One should not expect a maximum grade for minimum work effort.

Also please note:  I do not like repetition of information.  Once a classmate has posted information on a topic, do not repeat that information.  You must choose a different topic or supply NEW information on that particular topic.  

Wk3 TOPIC:

In order to make the discussions as informative and exciting as possible, you may choose any topic from any of the chapters covered this week (Chapters 10-15) for which to discuss.   REMINDER: I do not like repetition of information.  Once a classmate has posted information on a topic, do not repeat that information.  You must choose a different topic or supply NEW information on that particular topic.

To begin discussing in this forum, click the forum title. Then, click Reply to the initial TOPIC thread. To reply to a fellow classmate’s or instructor’s post, simply click Reply on his or her response entry.

You are required to post on multiple days by replying to the threaded topic.

Re-read the minimum requirement

minimum three (3) well-researched and cited qualifying postings (150 words or more) are required each week. Keep in mind — One should not expect a maximum grade for minimum work effort.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

FOR MISS Professor–MS office application questions (with PDF book) one paragraph answer need

1 – Check question 3 in the course textbook: “What are two ways to create a text box in MS Word? Why would you want to use a text box in MS Word?  Provide at least three examples.”  (Kinser, et. al., 2013, p. 313)

2- Check question 9 in the course textbook: “How do you insert all the text from one MS Word document into another MS Word document without using the copy and paste feature?  Why would you use this feature?”  (Kinser, et. al., 2013, p. 313) 

3-  Check question 3 in the course textbook: “Why is documentation important?  Why do many people not properly document their workbooks? What are the possible costs associated with inadequate documentation?” (Kinser, et. al., 2013, p. 458) 

4- Check question 1 in the course textbook: “Why should you format data in Excel?  If someone is color blind, how else might you format the data to make it stand out?”  (Kinser, et. al., 2013, p. 458) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security awareness

The company you chose in Week One will hold a national convention of all of the U.S.-based executive staff members across 15 locations. The CIO has chosen “Cyber Security Awareness” as the theme for the convention. Based on the quality of your previous training presentations, you have been chosen to write and deliver a presentation at one of the Executive Round Table Meetings during the convention. The CIO has stressed creating a presentation that will capture the attention of executive management.

Create a 15- to 20-slide PowerPoint® presentation, including speaker’s notes. Use graphics, animation, or charts as appropriate.

Create a 1-page executive summary that the executives can use to communicate the highlights of the presentation within their organizations.

Include the following topics in the presentation. Avoid using research quotes or acronyms. Combine and/or order the topics in the way you believe to be most effective:

  • What is network protection? What needs protecting?
  • What is a Cyber Attack? How can cyber security help?
  • Security and ROI
  • Legislation and government influence
  • Ethical and legal issues
  • The Six Principles of Information Security Management.
  • What challenges are there with cloud computing?
  • Why is the Internet often considered the cause of cyber security issues?
  • The role of the workforce in security
  • Training, awareness, motivation, and continuous improvement
  • Disaster recovery and business continuity
  • Why are contingency planning and vulnerability management important?
  • Security Audits – What are they? Who uses and performs them?
  • Risk Management in reducing the probability of a negative event
  • Social Engineering – What is it? How might we be vulnerable to it?
  • Backups (full, copy, incremental, differential)
  • Deterring network attacks
  • Roles of our employees in cyber security

Compile all files into a ZIP folder.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Question_2 with APA format atleat 400 words

 

Team Performance, Productivity and Rewording Teamwork

Module 2 focuses on performance, productivity, and rewarding teamwork. Based on your understanding, discuss the following.

Discuss how to access team productivity:

What conditions need to be in place for teams to excel and why?

Suggestion ways to design teamwork so that threats to performance is minimized

As a manager, how would you reward teamwork?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

own answer

This qnswer you have to do it on your own no copy from online source

Included with this assignment is an Excel spreadsheet that contains data with two dimension values.

The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.

Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.

Use Excel to perform the following data analysis.

  1. Plot the data on a scatter plot.
  2. Determine the ideal number of clusters.
  3. Choose random center points (centroids) for each cluster. (Note:  Each student will select a different random set of centroids.)
  4. Using a standard distance formula measure the distance from each data point to each center point.
  5. Assign each data point to an initial cluster region based on closeness.
  6. For each cluster calculate new center points.
  7. Repeat steps 4 through 6 as a second pass.
  8. Repeat steps 4 through 6 as a third pass.

Provide final answers on your Excel spreadsheet indicating your initial center points, second pass center points, and third pass center points.  You must submit your spreadsheet and these answers to receive full credit. 

You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.)  You need to show your work doing this analysis the long way.  If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?  The rubric for this assignment can be viewed when clicking on the assignment link.

Here is a link to an example spreadsheet using a smaller data set.  It contains two tabs.  The first tab is the raw data.  The second tab contains the analysis that was performed.  Make sure that you use a different starting center points from the example.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

own ans

This has to be own answer not from online source.

Included with this assignment is an Excel spreadsheet containing customer receipts.

The purpose of this assignment is to demonstrate steps performed in an Apriori analysis (i.e. Market Basket analysis).

Review the “APRIORI ALGORITHM” section of Chapter 4 of the Sharda et. al. textbook for additional background.

Use Excel to perform this analysis.

  • List the SKU which was purchased the most.
  • List the two SKUs that were purchased most frequently together.
  • List the three SKUs that were purchased most frequently together.
  • List the four SKUs that were purchased most frequently together.

Make note of any pattern that you noticed while performing the analysis.  As a retail business owner, how would you use the results from this analysis? The rubric for this assignment can be viewed when clicking on the assignment link.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion topic write 400 words with no plagarisam around 400 words in APA format

Each of us perceives “ethics” from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistleblowers. Select one of the behaviors listed below for your discussion posting. Base your posting on your relationship with the “unethical person” and any risk involved in “whistle blowing”.

1. Stealing from an employer

2. Falsifying a time sheet

3. Padding an expense account

4. Falsifying any document or record

5. Lying about the conduct of a co-worker

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethical issues (Artificial Intelligence in Cyber Security)

list some of the  ethical issues and concerns surrounding Artificial Intelligence in Cyber Security

Should be at least one page, explain each issue. provide an example for each one if needed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC660 # Week 4 Project Outline for the Week 8 Project Paper # 300 word #

Assignment Instructions

Compose an outline with complete headers and brief 1-sentence paragraphs towards the Week 8 Project Paper assignment found under Assignments.Submit for my review and approval. The outline should be complete with all headers and sub-headers planned to be used for the final project.

Week 8 Project Paper

The deliverables for your Project Paper Assignment include a Word document that answers the questions described below. Your final paper should be between 10 to 15 pages long (longer is perfectly acceptable without penalty). Be sure the report is in MS Word, Times New Roman 12-pt font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are also required in proper APA format.  In text citations must match the reference list provided

Heavy Metal Engineering (HME), a manufacturing organization that creates metal shell casings for very high-end washer and dryer products has suppliers and customers world-wide, as well as world-wide offices. HME the US Corporate office in NY hires you as a professional Information Assurance consultant. 

HME is looking to receive some significant third party funding for an international joint venture but was told they would be denied because they do not have any kind of Information Assurance plan to keep all data assets secure.  You are required to create a comprehensive IA strategy that includes the following:

A detailed overview of what Information Assurance entails covering all the basics for an IA strategy (what will be protected and from what)

A plan or strategy for IA implementation including a framework

A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.

Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward

An incident response and disaster recovery plan in the event of intrusion and disaster 

All sections should be clearly labeled and a separate section in each area specifically for justifications of your selection/proposal.

Your thoughts must be solidified with viable sources consistent with graduate level work.  No more than 2 sources may be used with ND or no author.  Scholarly and Peer reviewed sources are expected to be used throughout the bulk of this paper. 

         ********************  Find the attachment for last week    ************

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now