I have a MatLab project I provided the entire project I only need Exercise 6 done (not the entire project). I highlighted the section that needs to be done as well. Please look over the entire project to see how exercise 6 fit in with the entire project. This project is due project on Sep 27.
PhD Dissertation
Choose A topic
Identify a topic. What is the problem you want to address (must come from the literature and be cited). Who are saying there are problems? What has been done so far about the problem? Locate peer-reviewed articles related to your topic. What was the research questions in the studies? What findings were reported? Identify a gap in literature to justify your research. What is the purpose of your proposed study (be specific and clear)? What is the population you would like to address? What methodology are you planning on using? i.e. quantitative or qualitative?
Compare common methods to find which is most successsful in reducing the prevalence of social engineering. Why: “The development and implementation of robust counter…….. Kaabouch, 2019). What: What is the question you are looking to answer? Which is most successful?
Which measures are you wanting to compare?
How: Address how you will answer this? By doing what? Gathering what data
Create a report documenting various aspects of how risk management impacts the business m
Assignment: Risk Management in a Business Model
Learning Objectives and Outcomes
- Create a report documenting various aspects of how risk management impacts the business model.
Scenario
You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.
The task is due over the weekend.
You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements.
Assignment Requirements
Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.
Case Study 8
Read Deceitful Spammer or Marketing Genius? and complete the questions at the end of the case study.
https://www.scu.edu/ethics/focus-areas/business-ethics/resources/deceitful-spammer-or-marketing-genius/
At least 600 words with APA format. Need to answer all questions. Reference and citations.
Disaster Recovery – From Chapter 1, page 37, Real World Exercise 1.1 -350 words
Exercise 1-1
Using a Web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter. Are there sections missing? If so, which ones?
Linux Users, Groups, and Permissions Lab
Linux Users, Groups, and Permissions Lab
Objective:
Understand how to create user accounts
Understand how to create group accounts
Creating good password policies
Understanding permissions and file sharing
Setup:
You will need a Ubuntu Server VM
Walk Through:
You are a system administrator who has been tasked to create user accounts for new users on your system. You can pick whatever theme you like as long as there are protagonist and antagonist users: i.e. Super Hero’s and Villains, Harry Potter Characters, or other interests of yours.
Create 2 groups:
One for the Protagonists
One for the Antagonists
Create 5 users:
2 Protagonists
2 Antagonists
1 Neutral – Can access both group’s files
User Configuration:
Each user will have their own home directory that only they can access.
Users must change their password when they first log in.
Users are required to change their password after 6 months.
Required Directories in /home:
1. Share – Anyone can access this directory to add or remove
2. Protagonists – Only the protagonists group can add or remove
3. Antagonists – Only the antagonists group can add or remove
***Directory names can be named based on your current theme***
Ensure that you test that each account is working by either switching users, or logging in as different users.
What to Submit:
Submit a lab report documenting your process.
Make sure to include:
- A screenshot of the listing of the /home directory of the system showing the users home directories and the additional group directories.
- A screenshot showing the listing of the file /etc/groups.
- Screenshots that shows the permissions of the protagonists and antagonists directories.
- Output from the chage -l
for each of the five users.
Upon Completion You Should:
- Be able to use user management commands to create and modify users
- Be able to use group management commands to create and modify groups
- Be able to modify permission to allow individuals access based on group or permissions level
Nursing burnout during a pandemic
Pls use 7th edition APA format.
project
Project – Part 5 – Modules
Modify the pseudocode design that you created in ITP 100 Project – Part 4 to include at least the following modules.
• studentID – to Enter the Student ID
• calcBill – to Calculate the Bill
• prtBill – to Print the Bill
After the student has finished entering the course titles, the system will calculate and print the bill.
Create a hierarchy chart for the modules. Save the hierarchy chart as ITP100Project-Part4-Hierarchy-LastName.doc
Save the pseudocode design using the filename ITP100Project-Part4-LastName.doc
Submit for a Grade:
• Upload the files ITP100Project-Part4-Hierarchy-LastName.doc and ITP100Project-Part4-LastName.doc file to the ITP100_Project_Part4 file upload area.
Discussion 6 – Info Tech Import Plan Response to peers
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
paper2
What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.