cyber security

 1.”Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

2. Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?” (Ciampa 649). 

Research paper – Organizational leader and decision making

 Note: Please make sure read the question properly and No plagiarism and No grammar mistakes and APA 7 format. 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing. 

References to write:

 Required Reading:

Optional Resources: Chapter 3 & 4 Journal articles

DISCUSSIONS- Business Intelligence

  

1. Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

NOTES: 1000 WORDS, ZERO Plagiarism & REFERENCE

CS-340 2-1 Assignment:CRUD in MongoDB

 

Overview

To understand and make use of any database system, you must learn various techniques associated with the fundamental operations of create, read, update, and delete (CRUD). For this assignment, you will begin by creating databases of document collections and performing basic reading or querying operations to retrieve specific documents from the database system. You will also gain practice updating documents and subdocuments, and removing documents from a database. You will use the mongo shell and mongoimport commands to complete this assignment.

Note: Since this is the only assignment for Module Two, it is longer than a typical assignment. Be sure to begin working on this early in the week.

Prompt

After completing the textbook reading and reviewing the mongoimport tool documentation in the module resources, complete the following tasks using the mongo shell in Apporto.

  1. The data set for this assignment, city_inspections.json, has already been loaded into the Apporto environment for you. Using the mongoimport tool, load the database “city” with documents found in the city_inspections.json file into the “inspections” collection. Complete this by typing the following commands in the Linux terminal to perform the import in the right directory:
    cd /usr/local/datasets/ #change into the Apporto directory with the data sets mongoimport --db city --collection inspections ./city_inspections.json #mongo import utility
    TIP: In any Linux systems, commands must be exact and use proper syntax and case sensitivity.
  2. Verify your load by switching to the “city” database and issuing the following queries in the mongo shell:
    1. db.inspections.find({"id" : "10021-2015-ENFO"})
    2. db.inspections.find({"result":"Out of Business"},{"business_name":1}).limit(10)
    3. Provide screenshots of the results as evidence.
  3. Using the appropriate commands in the mongo shell, insert a document to the database named “city” within the collection named “inspections.” Use the following key-value pairs as data for your document.
    KeyValueid“20032-2020-ACME”certificate_number9998888business_name“ACME Explosives”dateToday’s dateresult“Business Padlocked”sector“Explosive Retail Dealer-999”addressnumber -> 1721
    street -> Boom Road
    city -> BRONX
    zip -> 10463
    Be sure the address is inserted as a sub-document, and use the JavaScript function Date() for “Today’s date.” Verify your database creation and insertion using the findOne() function in the mongo shell. Provide a screenshot as evidence.
  4. Answer the following questions using MongoDB queries.
    1. What is the distinct list of inspection “sector” in the current inspections collection? How many are in the list? Do not count by hand.
    2. What is the difference in the date data type for the business named “AUSTIN 2012” versus your business document insertion of “Acme Explosives”?
    3. How many businesses have a “Violation Issued”? (See Value column above.)
    4. Verify by providing screenshots of the queries and results as evidence.
  5. Using the appropriate command in the mongo shell, update the document with the ID “20032-2020-ACME” in the collection “inspections” in the database “city” with the information below.
    KeyValuebusiness_name”New ACME Flowers”result”Business Re-opened”comments”Flowers after the explosion”
    Verify your database update using the appropriate find() function in the mongo shell. Provide a screenshot as evidence.
  6. Using the database “city” with documents found in the “inspections” collection, perform the tasks listed below. Verify by providing screenshots of the results as evidence.
    1. Update all the documents that contain the key-value pair “city”:”ROSEDALE” in the address subdocument by changing the zip code in the address subdocument to “76114”.
    2. Remove the first document with the key-value pair “result”:”Violation Issued.”
    3. Guidelines for Submission
      Submit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

Project Management

   

 You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to find jobs. The system must be tailored to your student or work population and be very easy to use.

  • Write a two page paper describing how you would collect requirements for this system, and include at least five requirements in a requirements traceability matrix

 

  • A minimum of 500 words excluding the title page and references is required.
  • Use APA format – Refer to APA Style 

Discussion

 

1) Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.