mad discussion

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

Discussion

Many data science, analyst, and technology professionals have encountered regular expressions at some point. This esoteric, miniature language is used for matching complex text patterns, and looks mysterious and intimidating at first. However, regular expressions (also called “regex”) are a powerful tool that only require a small time investment to learn. They are almost ubiquitously supported wherever there is data.

What are regular expressions? Why are regular expressions useful? How would you use regular expressions in data visualizations?

Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least two peer-reviewed, scholarly journal references.

strengths finder Paper

This paper will allow you to examine your strengths and develop a plan for moving forward.

  1. What Do You Do Best?
    • Of all the things you do well, which two do you do best and why?
    • Which activities do you seem to pick up quickly and why?
    • Which activities bring you the greatest satisfaction and why?
  2. STRENGTHSFINDER Results
    • What are your top five Signature Themes as identified by the Clifton STRENGTHSFINDER? Which theme resonates with you the most and why?
    • Based on your Signature Themes, what should a manager/supervisor know about working with you and why?
    • Based on your Signature Themes, what should a co-worker know about working with you and why?
    • How can a manager/supervisor help you with your strengths more within your current role and why?
  3. Celebrating Successes
    • What was your most significant accomplishment in the past 12 months?
    • When do you feel the most pride about your work?
    • How do you like to be supported in your work?
  4. Applying Talents to the Role
    • What things distract you from being positive, productive, or accurate? 
    • Which talents do you have that could benefit the team if you had better opportunities to use them? 
    • What steps could be taken to ensure you have an opportunity to apply your natural talents to your role?  
  • Submit a 5-page paper double spaced
  • Include a cover page and a reference page (not to be included in the 5 pages of paper content)
  • Use the questions and bullets above as the framework and outline of your paper.
  • Please provide at least four (4) scholarly references to support your paper in addition to the STRENGTHSFINDER text.
  • All references should be used as in-text citations. 
  • All work must be completed in APA format. 
  • You MUST submit your paper to the Smarthinking tool for review prior to submission.

WEBAssignment

 

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ WEB BROWSER FORENSICS ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Managing Risk in information system

 

Your lesson discussed several compliance laws, standards, and best practices (see the Lesson 2 activities, under the Rationale tab).  The Department of Health and Human Services (the agency responsible for managing HIPAA compliance among healthcare providers) lists recent breaches at https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf  – think of it as their “Wall of Shame.” Find an article online that discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA. You can also look at Federal Agencies and discuss those that have not had sufficient controls in place (think of the breach that the Office of Personnel Management had). Summarize the article in your own words and address the controls that the organization should have had in place, but didn’t, that facilitated the breach. What were the ramifications to the organization and the individuals involved?

Do NOT post the article or include word document of your write-up – post only your summary discussion directly and a link to the article. Please follow proper APA style with a minimum of two references

4 computer questions

DUE IN 24 HOURS – ANSWER IN 1 TO 3 SENTENCES 

Why is it beneficial for all I.T. users to know something about programming? 

 

How are algorithms and programs similar and different?
 

What would be your approach to writing a program as a solution to a business? 
 

Why do you think the ability to create and manage programs are sought after skills across industries?

Security Design and Architecture Assignment

 

  • How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache?

 This assignment should be in APA format and have to include at least two references.