Unit 6 Disc.

 

There are many examples of the use of risk analytics in the world today. Your task for this week’s discussion board is to identify a real, recent example of risk analytics, thoroughly examine it, and then analyze it for the class. Your example and response must comply with the following requirements:

  1. Your chosen topic must involve an organization using risk analytics within the past 12 months.
  2. You must summarize how and why the organization used risk analytics, citing the source of your information.
  3. You must identify and describe for the class how the organization’s use of risk analytics impacted them. Identify outcomes, positive or negative, that were realized by the organization through their analytics activities.
  4. You must examine ethical components of their use of risk analytics. Be thorough in your examination. For example, it is ethical for a credit card company to control who can hold their cards, and how much those card holders can charge; but it is also ethical for that credit card company to grow its revenues and profits. If your chosen topic were a credit card company using risk analytics to get more of their cards into the hands of more and more consumers, what would the ethical considerations and ramifications be for that card company?

Your original post must be no less than 300 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science ISSC452 week 1 assignment

 

Instructions

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.
On your first day on the job as an IT intern, you attend a meeting with several department heads regarding proposed budget reductions. One of the department heads suggests that money for information security be cut by at least 40 percent because the company has not been infected with a virus in the last three months, proving that the current defenses are adequate. What would you say in response?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PROJECT

As you begin the project, it is important to select an industry that is of interest to you. You may select virtually any industry, including retail, education, telecommunications, health care, finance, etc. Create a fictional business within this industry to be the basis for your project. Imagine yourself in the role of the Chief Intelligence Officer. 

In this assignment, complete the first stage of our “Business Continuity Plan (BCP)” by developing the primary outline for the BCP, identifying key aspects of the organization.

It is important to remember that, a BCP is “documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following disruption.”

Reference the “FEMA Small Business Continuity Plan Template” and “Risk Assessment Matrix Template,” located in the topic Resources, to complete the assignment. The FEMA template can be used, but copying and pasting any section of the document for the assignment constitutes plagiarism and will be treated as such. Use your own words when filling out each section of the BCP.

Develop the Phase 1 content for your company’s BCP. Phase 1 should include the following:

  • Executive Overview: Be precise and detailed, and provide a thorough understanding of the program.
  • Document Change Control: The table should be completed.
  • Introduction: Include the overview, plan scope, and applicability that evaluates the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs, plan objectives, and plan assumptions. Analyze various cyber threat models used to identify and protect against cybercrime threat vectors, motivations, and ideologies.
  • Risk Assessment Matrix Template: Complete the “Risk Assessment Matrix Template” provided as this element is not shown in the sample BCP template. Evaluate system risks, threats, vulnerabilities, and practices and processes to ensure the safety and security of business information systems.
  • Critical Business Functions Overview: Detail components that are critical to business operations and provide a clear understanding of what the program is designed to address.
  • Company Organizational Chart: Create your own as this is not shown in the sample template. Include the following key positions: CEO, CFO, CIO, CISO, and COO.

Submit the BCP, including the completed “Risk Assessment Matrix Template” and Company Organizational Chart.

Support the BCP with a minimum of three scholarly resources.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC481 Term paper outline

 Instructions

Term Paper Outline

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper.

You can pick from one of the following overarching themes:

  1. “The Importance of Identifying and Protecting Critical Security Assets in Organizations”
  2. “Understanding the Role of Security Policies in Safeguarding Information”
  3. “Challenges and Best Practices in Implementing Security Policies”
  4. “A Comprehensive Guide to the Process of Developing Effective Security Policies”
  5. “Roles and Responsibilities of Management vs. Information Security Department in Policy Development and Enforcement”
  6. “Key Considerations in Analyzing the Components of a Physical Security Policy”
  7. “Comparing Authentication Security Policies and Network Security Policies: Similarities and Differences”
  8. “A Comparative Analysis of Policy Components in Internet and Email Security”
  9. “Crafting an Effective Security Policy for Comprehensive Protection from Malware”
  10. “The Role of Encryption in Modern Security Policies: Best Practices and Considerations”
  11. “Policies for Code Integrity and Ensuring Software Development Security”
  12. “Key Components of Defining and Developing Acceptable Use Policy”
  13. “Challenges and Strategies in Compliance and Enforcement of Security Policies”
  14. “Why the Policy Review Process Matters and How to Conduct It Effectively”
  15. “A Case Study of Successful Implementation of Security Policies in a Real-World Organization”

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ISSC452 outline

 Instructions

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics that you will cover in your paper. 

When choosing topic, make sure you are able to find relevant information and current examples to support your topic.  Submitting 3 or more references outside the textbook as part of the outline will make this easier for you going forward!

ALL TOPICS MUST HAVE BEEN APPROVED IN WEEK 1.

(My proposed topic) Proposed Topic: The topic I plan on writing my term paper about will be cybersecurity defense techniques.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BI and Analytics – Discussion

Some say that analytics in general dehumanize managerial activities, and others say they do not.

> Choose a position and write an argument for your point of view.

> Support your arguments with examples from recent examples from the news.

> Provide a concluding statement explaining how you would address challenges from the opposition.

Need 3-4 pages with peer-reviewed citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

OSI model

  1. Create a table in a Word® document showing all the layers of the OSI model in one column and the layers of the TCP/IP model in another.
  2. In another column, write the mnemonic you are going to use to remember the various layers of the OSI model.
  3. Add another column to your table that shows the protocols that work at layers 7, 4, 3, and 2 of the OSI model.
  4. Add to your table, identifying what term data goes by in layers 4, 3, 2, and 1 of the OSI model.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

diss 5

Start a conversation by writing an opinion blog considering the cost difference between paying per-use (variable fee) or paying with subscription/membership (one-time flat fee). The opinion blog needs to be at least 3 paragraphs including:

Introduction – Paragraph One:

  • Share the name and a brief description of the service/membership. Include the URL when possible.
  • Share your rationale for buying this service/membership, including the benefits you plan to use.
  • Estimate how often you have/will use the service or membership for one year. This will be your frequency value for x.

Body – Paragraph Two:

  • Compare and contrast the total costs between a per-use and subscription/membership pay structure:
    1. Calculate the total cost (y) for this service or membership when using a per-use pay structure (per-use cost = c). Assume the value of x from above and the linear model, y = c*x (see Linear Models in Unit 5 LiveBinder). Share the total cost when paying per-use for one year.
      • How does this compare to the total cost of subscription/membership or this service for one year? Justify your thoughts with your numerical evidence.
    2. Calculate the per-use rate (c) for this service or membership when using a subscription pay structure (cost of subscription = k). Assume the value of x from above and the linear model c = k/x (see Linear Models in Unit 5 LiveBinder). Share the per-use rate with a subscription for one year.
      • How does this compare to the per-use rate without subscription for one year? Justify your thoughts with your numerical evidence.

Conclusion – Paragraph Three:

  • Share your opinion on which plan (pay-per-use or subscription/membership) would be of greatest benefit to you.
  • How often will you need to use this service or membership to make it worth it?
  • What advice can you offer others to help them make a qualified decision in this situation or a similar one?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT policy and strategy

 

Using the IS alignment work and the financial analysis from Week 6, submit a complete IS strategic plan. Your paper should include at least 5 references from peer-reviewed journals associated with how other companies are using the technologies you are recommending. The strategy should include the technologies you plan to implement, your plan for sourcing the IS work, and the governance model you plan to use to sustain the IS operation over the long term. You should include specific projects with a timeline for implementation in your strategy. Make sure you also include the financial analysis. Your IT strategy should also specify some key performance indicators (KPIs) to measure the effectiveness of IT. The website below can help you identify the KPIs for your strategy.  

  • The website ITIL Key Performance IndicatorsLinks to an external site. explains some of the key performance indicators used for IT service management in the ITIL governance framework.
  • Review the IT Strategy Template.

Your total paper should be 5-7 pages of text in APA format, not counting the title and reference pages, and not counting any tables or figures. Make sure you include in-text citations. Please use the template attached above. In developing your IT strategy, please refer to the resources from previous weeks. You can reference these resources in your paper, but you must also reference at least 5 peer-reviewed articles.  Make sure on your references page you include a reference with the URL to the case study you chose, in addition to at least 5 references from peer-reviewed journals.

I have uploaded the week 6 work 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software

  

 Below is a bubble sort program that sorts the elements in an array. 

static void bubbleSort(int[] arr) {

int n = arr.length;

int temp = 0;

for (int i = 0; i < n; i++) {

for (int j = 1; j < (n – i); j++) {

if (arr[j – 1] > arr[j]) {

temp = arr[j – 1];

arr[j – 1] = arr[j];

arr[j] = temp;

}

}

}

}

1. Based on the program above, please draw a control flow graph for it. (7 pts.) Hint: Annotating some statements or conditions on nodes/edges will be very helpful.

2. In your control flow graph, what are the test requirements for edge coverage? (4 pts.)

3. List test path(s) that achieves the edge coverage. (5 pts.)

4. Provide test cases for each test path you list in the previous question. If it is not possible to find the test input for certain test path, describe the reason. (5 pts.)

Hint: Not providing expected outputs will get 2 points deduction. Not matching test paths with their corresponding input/output will get 3 points deduction.

5. In your control flow graph, what are the test requirements for edge-pair coverage? (6 pts.)

6. List test paths that achieve the edge-pair coverage. (6 pts.)

7. Provide test cases for each test path you list in the previous question. If it is not possible to find the test input for certain test path, describe the reason. (6 pts 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now