Apply quantitative and qualitative methods to assess, prioritize and report risks.

 

Perhaps one of the business areas that faces the greatest risk each day is the lending industry. Banks, mortgage companies, and other types of lenders face one specific risk many times every day: Are they going to be paid back when they make a loan? Organizations that make their money by lending money must be able to anticipate risk and predict the likelihood that they will be paid back, with interest, or else their business model will fail and they will have to close their doors. In this Assignment, you will use R with two data sets to predict the risk of loan default for a lender, and then report and explain your results. 

Assignment Instructions 

Complete the following steps: 

  1. Using the university’s online Library and Internet resources, research the lending industry. In a Word document, prepare a risk management plan outline for loan default risk faced by lenders. Include all five parts of risk management planning: Identification, Understanding, Data Preparation, Modeling and Application. Cite all sources used to prepare your risk management plan. 
  2. Download the Loans.csv and Applicants.csv files. Import both of these as data frames into RStudio. Give each a descriptive name. Show this in your Word document.
  3. Using the Loans.csv file, build a logistic regression model to predict the “Good Risk” dependent variable (use family=binomial() in the glm function in R). In this column, ‘1’ indicates that making the loan is a good risk for the lender; ‘0’ indicates that making the loan is a bad risk. Make sure that you do not use the Applicant ID as an independent variable! You will need to load the MASS package in R by issuing library(MASS), before using the glm function to build your model. Show the creation of the model in your Word document. 
  4. In your Word document, document your logistic model’s output, and specifically explain which independent variables have the most predictive power and which have the least. Make sure you identify how you know, and explain why it matters. 
  5. Apply your logistic regression model to the data in Applicants.csv to generate predictions of “Good Risk” for each loan applicant. If your glm model is stored in an R object called ‘LoanModel’, for example, and your Applicants.csv data is in a frame called ‘Appl’, then you would issue a command that looks like this: LoanPredictions <- predict(LoanModel, Appl, type=“response”). Document the application of your model to the Applications data in your Word document. 
  6. In your Word document, interpret your predictions for the Applicants.csv data. Specifically address the following: 
    1. How many loans do you predict to be a good risk for the lender?
    2. How many are predicted to be a bad risk?
    3. What are your highest and lowest post-probability percentages for predictions?
    4. How many loans have at least a 75% post-probability percentage and what does that mean for the lender?
    5. How many loans have less than a 25% post-probability percentage and what does that mean for the lender?
    6. Suppose that the lender is willing to accept a little higher risk and has decided they will make loans to applicants who have post-probability percentages between 40% and 65%. List two things the lender could do to mitigate risk when lending to this group, and explain how these will help. 
  7. Make sure that you cite at least five supporting sources beyond the textbook in support of your writing and explanations. Cite correctly in APA format.

Assignment Requirements 

Prepare your Assignment submission in Microsoft Word following standard APA formatting guidelines: Double spaced, Times New Roman 12-point font, one inch margins on all sides. Include a title page, table of contents and references page. You do not need to write an abstract. Label all tables and figures. Cite sources appropriately both in the text of your writing (parenthetical citations) and on your references page (full APA citation format). 

For more information on APA style formatting, refer to the resources in the Academic Tools section of this course. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 7 Distressed Projects

 

 Discuss your experiences with distressed projects. What lessons did you learn from these experiences? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 7 Research Methodology – Peer Review

 PLEASE MAKE SURE THAT YOU USE ALL HEADINGS IN THE BOLD COLORED FONT, LEAVE THE HEADINGS AS THEY ARE DO NOT REWORD!!! 

this outline is how the discussion question should look 

Unit 7 Discussion 1: Research Design and Methodology Details

For this discussion your will discuss one of the methodological approaches you are considering for a proposed qualitative research study. In addition, choose and describe the sampling strategy that will be used for this methodological approach and provide a rationale for the sampling strategy. Plus, you will identify and justify the sample size for the sampling strategy, discuss the data collection procedures that will be used, and develop 10 open-ended questions to be used in a qualitative interview for the proposed study. You will incorporate the feedback you receive for this discussion into your Week 8 assignment. Leave all headings in the outline.

Qualitative Topic of Study

For this discussion include 2 sentences stating the topic of interest.

Proposed Qualitative Research Study

Include in 1 sentence the Research Question (as a question and not a statement).

Discuss one of the methodological approaches you are considering for a proposed qualitative research study.  

Sampling Strategy

Choose and describe the sampling strategy that will be used for this methodological approach.

Rationale to Methodological Approach

Provide a rationale for the sampling strategy for this methodological approach.

Make sure you include sources other than those provided by the university/course.

Sample Size

Identify and justify the sample size for the sampling strategy.

Data Collection

Discuss the data collection procedures that will be used for this methodological approach (if applied in the proposed study-if not, include the term non-applicable).

Interview Questions

Develop 10 open-ended questions to be used in a qualitative interview for the proposed study. Place at the end of your initial posting. Number the questions.

References

Include all references in alphabetical order. Refer to the APA manual. Make sure you include sources other than those provided by the university/course. Make sure you are using at least some references that have been published in the last three (3) years.

THESE ARE THE METHOLODGICAL APPROACHES TO CHOOSE FROM!!!

  • Case study.
  • Grounded theory.
  • Phenomenology.
  • Generic qualitative inquiry.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 4 IP Security Policies, Procedures, and Regulatory Compliance

Length 3-4 pgs

Use APA 7 style, and cite references published within the last 5 years.  

Only working on Section 4 for this assignment. Please add it to the file attached (the first part, including Sections 1,2 & 3, have been completed). 

Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The assignments that you complete each week are based on the problems and potential solutions that similar companies may face. The end goal for these assignments is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.

Scenario Week 4:  

The case study company is also concerned about the confidentiality and integrity of the data. What policies and controls are needed to meet the regulatory requirements imposed by the recent initial public offering (IPO)? In an effort to ensure the confidentiality of data both internally and externally, discuss how you can effectively protect the data in motion and at rest. Create the following section for Week 4:

  • Week 4: Security Policies, Procedures, and Regulatory Compliance
    • List and describe the regulatory requirement that was introduced by the IPO.
    • List and describe at least 5 policies that the company needs.
    • From the list of policies, list and describe at least 3 controls that the company needs to implement.
    • Describe the data at rest and data in motion and analyze how they can be protected
  • Section 4 should be 2–3 pages long.
  • Name the document “CS651_FirstnameLastname_IP4.doc.”

The template document should follow this format:

  • Security Management Document shell
    • Use Word
    • Title page
      • Course number and name
      • Project name
      • Your name
      • Date
    • Table of Contents (TOC)
      • Use an autogenerated TOC.
      • This should be on a separate page.
      • This should be a maximum of 3 levels deep.
      • Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.
    • Section headings (create each heading on a new page with “TBD” as content, except for Week 1)
      • Week 1: Introduction to Information Security
        • This section will describe the organization and establish the security model that it will use.
      • Week 2: Security Assessment
        • This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.
      • Week 3: Access Controls and Security Mechanisms
        • This section examines how to control access and implement sound security controls to ensure restricted access to data.
      • Week 4: Security Policies, Procedures, and Regulatory Compliance
        • This section will focus on the protection of data and regulatory requirements that the company needs to implement.
      • Week 5: Network Security
        • This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 4 DB Security Policies, Procedures, and Regulatory Compliance

Please review the file attached to complete the assignment. 

Respond to Another Student: Review at least 1 other student’s Key Assignment Outline, and provide meaningful feedback. Refrain from general feedback, such as simply stating “good job.” Your feedback to other students is most helpful if you not only point out weak areas but also offer suggestions for improvement. The best feedback takes a three-stage approach to identify what was done well, weaknesses, and areas for improvement. 

400-600 word review response to the file attached. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Security Breach

Using either the Wall Street Journal or U.S. Newsstream, search for the term “physical security breach.” Select two news articles on the search topic that were posted within the last six months.

For each of the articles answer the following questions

Summarize, concisely, the key details of the physical security breach described in the articles
Describe, clearly and accurately, the steps that were taken in the articles, or are being taken, to alleviate the effects of the breaches after the fact or to resolve each issue
Explain whether the physical security breaches were preventable, why or why not, and if preventable, what preventive steps could have been taken
Describe physical access security best practices that could have been used to prevent the breaches, citing specific, credible sources of best practices

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT590 Unit 3

 

IT590-2: Discuss recent legislation related to ethical computing.

Purpose

This assignment allows you to place yourself in an ethical dilemma related to data security and privacy. You will analyze the scenario from a number of ethical perspectives, identify laws that are relevant for this scenario, and decide how you would respond to the situation.

Assignment Instructions

Select from one of the following scenarios:

  1. You are the IT administrator for your company. One of the employees discovers a loophole in the security whereby the employees may access the personnel records of other employees in the company. Personnel records include names, addresses, Social Security numbers, disciplinary actions, annual reviews, and salary information. You are working on a time-sensitive project and do not fix the problem for 2 weeks. As you are fixing the problem, you note that several employees have accessed personnel records using the loophole.
  2. You are the CIO of a large national auto retailer. As a part of your service, you offer auto loans through your dealerships. This requires your company to collect and store personally identifiable information on your customers. Additionally, you store customer bank account and credit card information so that customers can use automatic payment options for their loans. Recently, your company has been hacked, and a significant number of client accounts have been breached. The CEO is demanding that the IT group handle this privately rather than reporting the breach for fear that publicizing the information will have a negative effect on quarterly earnings.

Complete the following for your chosen scenario:

  • Analyze your chosen scenario from the aspect of computing ethics and privacy ethics.
  • Discuss the ethical dilemma from the perspective of societal ethics, organizational ethics, and individual ethics.
  • Research on the Internet to determine what data security and privacy laws are relevant in this scenario.
  • Describe each law and consequences for violation of the law.
  • Discuss the reputational and financial impact this scenario might have on the organization.
  • From the perspective of the IT administrator in Scenario 1, or the perspective of the CIO in Scenario 2, how would you respond to the situation? Justify your response from an ethical and legal perspective.

Assignment Requirements

  1. Your paper should be 2–3 double spaced pages in length.
  2. Use Times New Roman 12 pt font.
  3. Use APA formatting for paper, citations, and references.
  4. Be sure to cite your sources and provide the appropriate references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT591 Unit 3

 

IT591-3: Apply auditing processes within a technical scenario.

Purpose 

This assignment helps you learn how to prepare for a specific audit, in this case, the PCI-DSS audit. You will use the PCI-DSS Self-Assessment Questionnaire D for Merchants (Version 4.0 (Available in your readings) and become familiar with the various sections that the audit will cover, and what preparation must occur to ensure compliance within each section.

Assignment Instructions 

Use the link to the PCI-DSS self-assessment questionnaire (SQA-D) for Vendors (V. 4.0) provided in this week’s readings and use this information to complete the assignment.

Consider the PCI-DSS self-assessment questionnaire D for Merchants (V. 4.0) which a typical retail merchant would have to show compliance in order to continue doing business with credit cards.

  1. Review the questions associated with four different requirements of the twelve covered by the assessment questions (specifically sections 3, 8, 9, and one other section of your choice)
  2. For each section explain:
  • The purpose of that section, why it is important, and what these questions seek to achieve.
  • Pick any three questions in that section and explain:
    • What the question means
    • What evidence would be needed to show compliance
    • Whether it would be easy or difficult to achieve compliance and why
  • Do not pick three that are all easy
  • Summarize your impressions of the questions for this section and discuss how a merchant would establish or maintain compliance.
  1. For any question that you examined in item 2 above, (which was deemed hard to comply with) assume that you cannot fully meet the requirement and draft up a half-page compensating control (Refer to Appendix B) that would substitute for a fully compliant response.
  2. Write a 1-paragraph summary about what you learned from this exercise.

Assignment Requirements

  • 5–6 pages of content (exclusive of the cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s).
  • At least 1 credible source cited and referenced
  • No more than 1 table or figure
  • No spelling errors
  • No grammar errors
  • No APA errors

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT590 Unit 4

 

Purpose

This assignment allows you to define cybercrime and the categories included under cybercrime. You will then examine laws related to cybercrime from three different countries and compare and contrast those laws. You will discuss the ethical dilemmas that can arise from these differences.

Assignment Instructions

  • Define cybercrime and the categories of cybercrime.
  • Research how cybercrime (either in general or with respect to certain crimes — e.g., hacking, identity theft, cyberstalking) is handled in at least three different countries (one can be the United States).
  • Compare and contrast each country’s laws. What ethical issues arise as a result of differences in cybercriminal prosecution across cultures?
  • How will your understanding of the differences among cultures affect your ability to make decisions within your company?

Assignment Requirements

  1. Your paper should be a minimum of 3 double-spaced pages.
  2. Use Times New Roman 12 pt font.
  3. Use APA formatting for paper, citations, and references.
  4. Be sure to cite your sources and provide the appropriate references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT591 Unit 4

 

Purpose

In this assignment, you will be provided a scenario in which you need to prepare for a HIPAA audit using materials found on the healthIT.gov website and using a government-provided online or downloadable tool to perform a risk assessment.

Assignment Instructions

You are the IT and Security Manager for a small five-physician medical practice that uses electronic medical records (EMR) but has never performed a HIPAA security risk assessment. You need to prepare for the upcoming HIPAA Audit, and the healthIT.gov site recommends performing a security risk assessment using their Security Risk Assessment (SRA) tool (downloadable or paper).

Based on the scenario above, review the questions in the Administrative Safeguards portion of the tool. This private practice has many written policies, but the policies are often not updated, and training new personnel on HIPAA requirements is a bit haphazard and poorly coordinated. The practice does not have a formally appointed security contact, although the office general manager is the one that most people go to. The one-person IT professional tries to protect the patient’s information and access to that information as best that is possible, but people that leave the organization are often not immediately removed from having that access. Physical access to the building does require a key card access, but the building entrance is not monitored by cameras or the need to sign in. The company has not formally documented and mapped relevant business associates and has not secured business associate agreements related to patient information security. Although the receptionist area has a high counter, and patients typically cannot see the receptionist’s computer screen, patients can hear the phone conversations in the receptionist area. Access to the medical records is password protected but not encrypted, and not all computer screens have automatic locks when the screens are idle.

  1. Identify at least 10 Administrative Safeguard questions from the tool that are particularly relevant to this organization. Identify each by number and the specific wording of the question.
  2. Discuss at least five identified threats or vulnerabilities and discuss the likelihood and overall impact of each of these vulnerabilities in a table like the one below for each threat/vulnerability (you should have five tables).

Likelihood

Impact

Low

Medium

High

Low

Low Risk

Low Risk

Low Risk

Medium

Low Risk

Medium Risk

Medium Risk

High

Low Risk

Medium Risk

High Risk

  1. For each threat/vulnerability, describe one or more safeguards that could be implemented against the threat/vulnerability. Suggested safeguards can be found in the SRA tool.
  2. Write a summary that discusses what you learned by participating in this exercise. Discuss how difficult and costly completing this assessment might be for the small medical practice described in this case. Recommend possible solutions to make this assessment process possible for this small practice.

Assignment Requirements

  • 5–6 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
  • At least 1 credible source cited and referenced
  • No spelling errors
  • No grammar errors
  • No APA errors

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now