disaster recovery plan in cybersecurity

Business continuity and business impact analysis are essential models for all businesses but can be costly.  Pick an organization and create a disaster recovery plan for that business. 

Discuss the “must have” items and the “nice to have” items you placed in your disaster recovery plan (remember companies have competing costs).

Explore why it is essential to test your disaster recovery plan as it relates to cybersecurity and Privacy.

offer advice and suggestions on thing we should do or should not do in disaster recovery plan 

3 pages 

Data Analytics

 

1. Explain what analytics are? What are business analytics? Do they differ from other analytics and how? Explain why or why you cannot do analytics without data?  Explain why or why you cannot do analytics without big data?

2. Where do you get the data for analytics? Is all of it internal to the company? Identify at least 5 sources of external data and explain when you might be able to use them.

 

1. What is data mining? Why is data mining so popular? 

2. What are the privacy issues associated with data mining? Do you think they are substantiated? Why or why not? — ignore this question — already responded to in the discussion. 

3. Distinguish data mining from other analytical tools and techniques.

4. Discuss at least 3 data mining methods. What are the fundamental differences among them

The above assignments should be submitted in one-word document. Include an APA cover page and a reference page.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations)

empowering leadership and effective collaboration

 

This week’s journal articles focus on empowering leadership and effective collaboration in geographically dispersed teams, please answer the following questions:

  1. How do geographically dispersed teams collaborate effectively?
  2. Please find at least three tools on the market that teams can use to collaborate on a geographically dispersed team.  Please note the pros and cons of each tool. 
  3. Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Discussion (Chapter 4):

What are the privacy issues with data mining? Do you think they are substantiated?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.

Caesar Cypher

Analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource.  Minimum 350words. 

Also need 4- 5 lines two different opinions on Caesar Cypher . 

Page 92-94 in attached reference

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.

700 word : information and communication innovation drives change in educational settings

Information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).

Address the following key concepts:

1. Define TAM and the components.

2. Note how TAM is impacting educational settings.

3. Give an overview of the case study presented and the findings.

Please mention a minimum of five peer-reviewed journal articles.

Practical connection.1

 Course Description

DSRT 734 − Inferential Statistics in Decision-making (3 hours) This course focuses on the descriptive and inferential statistics commonly used in organizational administration. Course activities include the application of statistical methods to research design, as well as an investigation of how these methods can contribute to school improvement. Specific concepts include measures of central tendency and variability, probability theory, estimation and significance, and correlation and regression.

Course Objectives

Upon completion of this course:

Students will describe the essential characteristics of quantitative research.Students will apply inferential statistical tests on problems requiring parametric and non-parametric analyses.Students will identify potential research designs for various problems.Students will analyze statistical information in the professional literature on a topic related to their own research project.