Read classmates post and respond with 100 words:
need help in homework
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 6 page paper discussing the following concepts:
- Introduction
- Why should an organization Implement an ERM application?
- What are some key challenges and solutions to Implementing an ERM?
- What is Important for an effective ERM?
- Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
- Conclusion, final thoughts for future research
- Recommendation
Computer Architecture Reflective Journal Report
Hy, there I want you to go through the slides I have provided you from week 1 to week 11 first. Then I want you to include all the information and what I would have learned from these weekly slides that I have provided you.
At least, 5 references and I want Turnitin to check too.
Cybersecurity
Exercise 1: If an organization has three information assets to evaluate for risk management purposes, as shown in the list below, which vulnerability should be evaluated for additional controls first? Which vulnerability should be evaluated last?
- A CRM-Server that is connected to the Internet. It has two vulnerabilities:
- susceptibility to hardware failure, with a likelihood of 8, and
- susceptibility to ransomware attack with a likelihood of 4.
The CRM-Server has been assigned an impact value of 10. Assume that there are no current controls in place to protect it, and there is a 75 percent certainty of the assumptions and data.
- An E-commerce server hosts the company Web site and supports customer transactions. It runs a server software that is vulnerable to a buffer overflow attack, with the likelihood of such an attack estimated at 6. The server has been assigned an impact value of 8. Assume that there are no current controls in place to protect the server, and there is a 70 percent certainty of the assumptions and data.
- A Control-Console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show that the likelihood of misuse is 2. There are no controls in place on this asset, which has an impact value of 5. There is a 90 percent certainty of the assumptions and data.
Exercise 2: Using the list of threats to InfoSec presented in Chapter 6 identify and describe three instances of each that were not mentioned in the chapter.
Cybersecurity program
Assessment Description
Using all of the previous assignment information, students will present a comprehensive Cybersecurity Program that reports on the final state of their enterprise.
Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion. .
APA style is not required, but solid academic writing is expected.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Benchmark Information
This benchmark assignment assesses the following programmatic competencies:
MS Cybersecurity
4.1: Develop cybersecurity program aligned with business needs, regulations, and compliance standards to enhance an organization’s security posture (CAE KU 2, 10, 11, 12, 13, 17).
4.2: Determine appropriate business strategies to ensure business sustainability, availability, and reliability and articulate these needs to relevant stakeholders (CAE KU 13, 14, 16).
4.4: Interpret risk assessments, gap analysis, and current cybersecurity trends to formulate a cybersecurity governance strategy that establishes mitigation plans for future challenges to achieve security objectives (CAE KU 6, 10, 11, 12, 15).
Attachments
Write a program to display
(C program)
Write a program to display the duplicate values in an array.
Description of what the program does
Summary of the problem’s specifications and assumptions
Parameters
Algorithm(s) used (including any special notes)
Output (any print statements, files created, etc.)
Return values (does it return any parameters?)
Data mining
Question:
Why is data mining so popular today and how will it be done in the future? Will AI be a factor in potential job loss for analysts who hold data mining jobs in organizations today? If so, discuss how that will look and what we should do about displacement of workers from this outcome
Length :200 words
Citations:Required
E-Commerce
Question: In approximately one and a half to two pages total, write your analysis of the three approaches from a consumer’s point of view. Finally, select what you believe to be the best approach and explain why you chose this approach.
SEE LINK: https://baymard.com/blog/live-chat-usability-issues
Your word document should have the following;
- Title page, with your name, class, date, and assignment identifier
- Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1-inch margins on all sides
- References should be identified/listed on a separate page (last page of submission). All references must follow APA format.
- Save in Word format
—————————————————————————————————————–
Data Mining and Analytical Processing
In two to three paragraphs briefly describe what online businesses can learn from data mining (or analytical processing) activities.
SEE LINK: https://www.youtube.com/watch?v=R-sGvh6tI04
Employees at a certain company
Employees at a certain company get a bonus at the end of the year based on years of service. The bonus is a percentage of their annual salary determined as follows.
Less than 5 years 2%
5 to 9 years 4%
10 to 19 years 7%
20 years or more 12%
Write a pseudocode algorithm that will input the years employed and the salary, and will calculate and print the bonus rate and bonus amount. Use structured pseudocode as demonstrated in the lectures for code, ensure that all variables are declared, prompt the user for the appropriate input, and display a meaningful output message. Make sure that the years and salary are both greater than 0.
Average-Case Analysis – Due in 2 hours
Use the copy-and-paste method to give an average-case analysis for the sort
function in sort.cpp
.
- Assume that, for an input array of nn elements, on average n−−√n elements will be out of order.
- Assume that the out-of-order elements have values that are uniformly randomly selected between the smallest and largest values of the properly-ordered members of the array. In other words, an out-of-order element is equally likely to belong to any position in the array.
- Show all work!
- Remember that you are doing average case analysis.
If, at some point, you don’t ask how the average case behavior differs from the worst case behavior, you’re doing it wrong!
Please fill out chart in excel attached and add comments next to the lines in the cpp file