RESPOND 1

  

RESPOND TO THESE DISCUSSION POST BASED ON THE TOPIC “You are the chief information security officer (CISO), and due to a government shutdown and other factors, your desktop team is unable to migrate to Windows 7 as you initially planned. You know that Windows XP support will expire in just two weeks, and your agency will be vulnerable to all types of malware if you continue operating on it after the end of support deadline.
 How would you handle this risk? Would you accept, reject, transfer, or mitigate it? How did you come to that decision?
 When responding to your classmates, discuss your viewpoints of the best risk management option given in their scenario. Support your rationale with specific examples.” (TWO (2) PARAGRAPHS EACH WITH REFERENCES ON EACH OF THEN NOT TOGETHER)

1JnTHn  SwGn M One Discss

As the CISO of the company, my first concern is why we decided to wait until the last second to make the change to XP. There should have been setups and testing done earlier to help ensure that enough time was given for the migration to be effective. Since that is in the past, my effort would be put towards mitigating the risk of the XP machines on the network. The first step would be to evaluate the users and find out who could be migrated to 7 the fastest and with little downtime as possible. This would help to lessen the risk while at the same time keeping user uptime to the highest possible. With the machines that still have to be in use, I would implement network changes that would prevent the XP boxes from accessing the internet, but able to access the internal network. If there is a need for internet access, I would ensure that every XP user has a Windows 7 VM that could be used for internet access. This would help to keep down the risks involved with the XP machines pulling malware from the internet without impacting the users too much. There is less risk involved on the XP machines if they are unable to access the internet to pull down malicious files that could impact the machines. To ensure that the machines to do not slip the system, rules could be set on the firewalls to drop all outgoing traffic that is not company related. This would help to ensure if any command and control software did infect the system, the machines could be cleaned up with ease since the entire malware package was not able to be installed or controlled.

2.Trll Bns ). DSCSS 1:1

The Framework contains an array of activities, outcomes and references to help organizations identify their cybersecurity risks. It also allows groups to work toward a targeted cybersecurity outcome tailored to match the sector or type of organization. The organization can then take steps to close the gaps between its current profile and its target profile (2017).

I would extend the contract for XP support until Windows 7 can be deployed across the organization. I would be sure to send out notifications to update all anti-virus and firewalls be setup to block specific IP addresses deemed risky. During this brief moratorium, we would block all unknown emails and end-users will receive the denied message attempting to access social media sites.

The IT team will disable unused ports. Now, during the changeover, the IT team should mitigate damages from malware by restricting access to unauthorized advertisements, games and gambling sites. Therefore, implement a URL content filters and block social networking activities by implementing Internet content filters. These are some temporary behaviors we will be adopted until the government shutdown is over.

I reached this critical decision because we must continue to operate for business purposes and support our customers. However, we know our network will be at risk during this shutdown if precautions are not in place.

3.Tyr Ktchn). Risk buz

The risk of using an outdated operating system poses many threats to the organization.  If we were to continue using the OS we run the risk of vulnerabilities being exploited with no way of patching these vulnerabilities.  I believe I would handle this risk by education, increased firewall rules, and anti-virus protection monitoring.  We would attempt to mitigate this risk by tweaking our firewall rules to only allow trusted sources in and out of the network as well as specific ports.  Next we would monitor our anti-virus software to make sure it is updating twice per day with intermittent scans of the system.  The most important part of this mitigation would be to educate all users on safe browsing and email practices.  Most websites would be closed off via firewall protection but all other links and attachments from emails should be treated as malicious.  The risk is too great to accidently allow malware into the network.  I came to this decision because accepting the risk would allow vulnerabilities to most certainly be exploited, rejecting the risk was not an option as plans could not be accelerated, and transferring the risk would cost more money than the potential risk  (A Four-Step Risk Approach to Strategy Execution, 2010).

PLEASE READ THIS.IT IS VERY IMPORTANT

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT Infrastructure Security Policies . Discussion Read the following Scenario You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access pol

IT Infrastructure Security Policies 

Discussion

Read the following Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. Your organization requires identification of the types of user access policies provided to its employees.  Sean, your manager, was impressed with the work you did on User Domain policies. This time, Sean is asking you to write descriptions for policies that affect server, mainframe, and RSA user access. 

Discussion requirements

  • Research policies for each affected IT infrastructure domain
  • Make a list of policies explaining the following questions: Who? What? When? Why? 
  • Be sure to add a rationale for your selections. 
  • Reference your research 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Periodic Table of Visualization

 

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option.

Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Multi-Touch Screens vs. Mouse-Driven Screens (RE WRITE PAPER)

 Hello, 

I have attached an existing project that was turned in by my friend. I need for someone to re word the paper because I am not able to turn in the same assignment or safe assign will catch the difference and anything over 30% will result in a F.

assignment 1: Multi-Touch Screens vs. Mouse-Driven Screens
Due Week 3 and worth 180 points

The following resources may be helpful when completing this assignment.

Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, touch-based laptops and touch-based tablets. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally.

Imagine that you are the Information Technology Director of a major chain restaurant, and you have been assigned to design a menu ordering application that can run on all devices. Examine whether using a touch-screen monitor, a tablet, or using a mouse to select menu items to place an order would be most efficient. Speculate how employees would interact with these devices and the type of emotional reaction that customers and employees will experience while placing a beverage, appetizer or entrée order.

Write a four to five (4-5) page paper in which you:

  1. Differentiate between the interaction types and styles that apply to multi-touch screens and applications running on them.
  2. Determine the conceptual model that you would use when designing a product for your restaurant.
  3. Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.
  4. Determine one (1) utility / tool in an application for touch-based and mouse-drive screens that should be designed with memory retention / recall. Provide a rationale for your response.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.
  6. Format your assignment according to the following formatting requirements:
    1. Typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    2. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.
    3. Include a reference page. Citations and references must follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the relationship between the cognitive principles and their application to interfaces and products.
  • Explain the conceptual terms for analyzing human interaction with affordance, conceptual models, and feedback.
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about human-computer interaction topics using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python program

 Instructions for Homework Assignment 3 Modify the program you wrote for Homework Assignment 2 so that it includes a class related to the Leibniz formula. Create a constructor for use with the class. Divide your program into two modules – one which contains your class and another which creates an instance of it. Combine both of your modules into a zip file. Name the zip file NameHomework3, for example SweeneyHomework3.zip 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

not more than 750 words

 

The library board wants to investigate self-service kiosks in more detail. They want to be sure that the kiosks will enforce these two rules: (i) a patron may not have more than 10 items checked out at any time, and (ii) patrons may not check out any materials if they owe $5 or more in fines. 

  1. Write a short (not more than 750 words) narrative that describes the kiosk check-out process. 
  2. Illustrate the check-out process using your choice of workflow diagram, activity diagram, or flow chart. Explain why you selected that type of diagram. 
  3. The library’s IT department could create its own software for the kiosk or purchase an off-the-shelf system. Prepare a detailed list of the benefits and drawbacks for each option. Recommend one option and explain your reasoning. 
  4. Identify an ethical, legal, or cultural issue that may arise in connection with these kiosks. Suggest how it could be addressed. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study on Data Mining

Abstract <>

Questions

1. The following attributes are measured for members of a herd of Asian elephants: weight, height, tusk length, trunk length, and ear area. Based on these measurements, what sort of similarity measure from Section 2.4 (measure of similarity and dissimilarity) would you use to compare or group these elephants? Justify your answer and explain any special circumstances. (Chapter 2)

2. Consider the training examples shown in Table 3.5 (185 page) for a binary classification problem. (Chapter 3)

(a) Compute the Gini index for the overall collection of training examples.

(b) Compute the Gini index for the Customer ID attribute.

(c) Compute the Gini index for the Gender attribute.

(d) Compute the Gini index for the Car Type attribute using multiway split.

3. Consider the data set shown in Table 4.9 (348 page). (Chapter 4)

(a) Estimate the conditional probabilities for P(A|+), P(B|+), P(C|+), P(A|-), P(B|-), and P(C|-).

(b) Use the estimate of conditional probabilities given in the previous question to predict the class label for a test sample (A = 0, B = 1, C = 0) using the naıve Bayes approach.

(c) Estimate the conditional probabilities using the m-estimate approach, with p = 1/2 and m = 4.

Conclusion<>

Grading Rubric for the Assignment #2:

  • Delivery: Delivered the assignments on time, and in correct format: 25 percent
  • Completion: Providing a thoroughly develop the document including descriptions of all questions: 25 percent
  • Understanding: Demonstrating a clear understanding of purpose and writing a central idea with mostly relevant facts, details, and/or explanation: 25 percent
  • Organization: Paper is well organized based on the APA format, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Hands on Microsoft window server 2016 (Case Project 2-2: Server Roles)

This week you will work with Gym Masters, a company that makes equipment for fitness centers and gyms. Gym Masters make treadmills, stair steppers, cross trainers, exercise bikes, free weights, and stationary exercise devises. They supply fitness and recreation centers throughout the US and Canada. Gym Masters has 2 locations, one in Chicago and One in Toronto. Both Locations have computer centers currently filled with Windows Server 2008 servers. The Chicago location consists of an office building and  a manufacturing building, both fully networked. The Toronto location has a single large building that houses offices and a manufacturing center. The Toronto building is also fully networked. All networks use IPv4 for communications.

  The Chicago and Toronto locations have Windows 7 workstations. However, the Toronto location is to receive 24 new computers that will need to have Windows 10 installed.

   In both locations, the servers are centralized in controlled computer center environment. The Gym Masters management wants to upgrade the 22 servers in the Chicago locations and 18 servers in Toronto to Windows Server 2016. A combination of Standard, Enterprise, and Datacenter Edition servers must be upgraded. Also, the company is planning to add 12 new servers in Chicago and 14 new in Toronto. As in common in many organizations, the information tech (IT) staff are overworked and under staffed. Gym Masters has hired you through Aspen Consulting to coordinate and assist with the transition to Windows Server 2016. 

The committee has recently been discussing the functions of each server. They are not familiar with server roles, but they do know how specific servers are used. Some of the server functions they mention include:

– Providing a website

-supporting mobile devices for accessing the server over the network

-Offering shared files on large scale

-Managing Active Directory functions for the domain

-Offering VPN’s

-Coordinating printing

-Providing web-based applications to internal users

Create a short report for the committee that translates each of these functions into server roles offered through Windows Server 2016. Also, suggest some other roles that are likely necessary on the company’s networks ( Hint: Consider managing IP address assignments and translating computer names and IP addresses). Include a short explanation of each server role you mention.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 12: Discussion: The “eight hats” of data visualization design. Where did the extra hat come from?

 

Last week we discussed “seven hats” so why are we discussing “eight hats” this week.  As our concepts and theories evolve, we adapt our assessments to fit the new model. Kirk’s (2012) “eight hats of data visualization design” was influenced by Edward de Bono’s six thinking hats.  However, last week we discussed “seven hats.” What changed from Kirk’s 2012 book to his 2016 book? This week we will discuss the similarities and differences of Kirk’s (2012, 2016) hats. (Week 12: Chapter 2 of the ebook is in the online course room)

 

Reference:

Kirk, A. (2012). Data Visualization: A Successful Design Process. Birmingham: Packt Publishing. pg: 45-51.

Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

r

SUBMISSION REQUIREMENTS: Please submit a single R script file named with your “First_Last Name.R” ONLY.  Your R script code must calculate the effectivness of your classification as described below.

Similar to the classification example.  process and classify the newsgroup document data. Download this data  and save it on your computer in your R packages folder under “tm/text/”. Your code MUST access it from there!

Note that the data is separated into one test and one train folder, each containing 20 sub folders on different subjects. Choose these 2 subjects to analyze (sci.space and rec.autos) and 100 documents from each.  

Consider “rec.autos” as positive and “sci.space” as negative event. Note that kNN  syntax expects (Positive First, Negative second)

Classify the Newsgroups data (by date version data set) from Blackboard:

•        Save data in your “tm/text/” folder so you can specify path using system.file()

•       Note that the data is separated into one test and one train folder, each containing 20 sub folders on different subjects.

Choose these 2 subjects to analyze (sci.space and rec.autos) and 100 documents from each.

•        For each subject select:

–       100 documents for training from the train folder

–       100 documents for testing from the test folder

•        Obtain the merged Corpus (of 400 documents), please keep the order as

–       Doc1.Train from the “sci.space” newsgroup train data

–       Doc1.Test from the “sci.space” newsgroup test data

–       Doc2.Train from the ” rec.autos” newsgroup train data

–       Doc2.Test from the ” rec.autos” newsgroup test data

•        Implement preprocessing (clearly indicate what you have used)

•        Create the Document-Term Matrix using the following arguments (word lengths of at least 2, word frequency of at least 5)

–      use: control=list(wordLengths=c(2,Inf), bounds=list(global=c(5,Inf)))

•        Split the Document-Term Matrix into proper test/train row ranges

–       train range containing rows (1:100) and (201:300)

–       test range  containing rows (101:200) and (301:400)

–       Note that knn expects the positive (“Rec”) event as first, so re-adjust your train/test range if necessary.  

•        Use the abbreviations “Positive” and “Negative” as tag factors in your classification.

–       Check if the tag order is correct using table(Tags)

–       You should get

•        Tags

•        Positive Negative

•        100      100

–       If your order is not right make proper changes.

•        Classify text using the kNN() function

•        Display classification results as a R dataframe and name the columns as:

–       “Doc”

–       “Predict”  – Tag factors of predicted subject (Positive or Negative)

–       “Prob” – The classification probability

–       “Correct’ – TRUE/FALSE

•        What is the percentage of correct (TRUE) classifications?

•        Estimate the effectiveness of your classification:

– Calculate and  clearly mark the values TP, TN, FP, FN

–       Create the confusion matrix and name the rows and columns with what is Positive/Negative event

–       Calculate Precision

–       Calculate Recall

–       Calculate F-score

Note that one way you can select only 100 documents is

> Temp1 <- DirSource(Doc1.TestPath)

> Doc1.Train <- Corpus(URISource(Temp1$filelist[1:100]),readerControl=list(reader=readPlain))

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now