Spr1.2

 Assignment 1

In Chapter 2, the author talks about four key stages with regards to data visualization workflow. Select one key stage and expand on the author’s comments about the stage.

Textbook is attached, “Andy Kirk – Data Visualisation_ A Handbook For Data Driven Design-Sage Publications (2019)”.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

· BitLocker

· BitLocker To Go

· File encryption via Encrypting File System (EFS)

· Folder encryption via EFS

Answer the following question(s):

Ø Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 2.

Refer to the “Project Part 2-Access Controls Procedure Guide” word document for tasks and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references do not count.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $10 max. Please bid if you agree.

Physical securrity Discussion 6(500 words and references)

 10 threats choose 5:

  

a. Internal theft or diversion

b. Armed attack

c. Hostage incident

d. Burglary

e. Civil disturbance

f. Auto theft

g. Sabotage

h. Employee pilferage

i. Kidnapping

j. Robbery

he course textbook outlined the top ten security threats to an organization. For this assignment, write at least 500 words discussing the following:

  • Out of the ten threats list the five you think are most important
  • Describe and define each of these five threat areas as to their significance
  • Provide strategies you would have implemented to improve these areas to reduce risk and vulnerability

Assignment Requirements

Please provide and discuss the above

  • Each paragraph must have at least four complete sentences
  • You also need to respond to at least two (2) classmates’ posts (150-word each)
  • There should be no personal pronouns in your initial discussion post.
  • Your initial post is due by Wednesday before 1159pm
  • You should have a minimum of three credible in-text citations (Not at the end of your paragraphs)
  • All requirements must be met, and proper grammar, spelling, and punctuation must be correct.
  • Please also ensure you use the Discussion Board Header; you can find this template in the Getting Started folder.
  • No contractions should be used, or any conjunctions at the beginning of a sentence.
  • Failure to follow each instruction will negatively affect your grades.

professional righting

Select 10 Articles that support your Topic.

Write a review of all the articles and submit.

APA 7TH Edition   12 Font Times New Roman 

The basis precepts for formatting the pages and paragraphs are:
Margins: 1-inch margins
Spacing: double spaced
Font-Size: Times New Roman – 12-point font
Running head (text and page #) noted on header

References (include in text citations) 7the Edition

The specific use of the APA style is to write with clarity, precision, and inclusions. The APA style provides a uniformed platform for research papers to be better structured and organized. In this class, “The term “plagiarism” includes, but is not limited to, the use, by paraphrase or direct quotation, of the published or unpublished work of another person without full and clear acknowledgment.” The specific need is the APA standard writing style helps you to reduce bias languages and show you how to cite references correctly so that you can avoid charges of plagiarism.

Mechanics: Includes complete sentences, proper formatting of margins, spacing, indentation, etc.; typeface and use of emphasis are appropriate to task. Includes thorough documentation or citation as necessary; supports all claims within either text or appendix; properly identifies outside material. Possible Point Deductions 1- 10 pts.

Case Study

Complete the attached case study.

Follow all directions and answer all of the questions located at the end of the case study.

Download the attached risk analysis template to use as your complete your case study. 

4 Questions for IT managers to be answered and analysed

You should answer 4 questions about IT technologies and its application in management and business, the important point is there must be no similarity and plagiarism  Questions must be answered two pages for each question. Questions and instruction have been attached.

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

 Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Week 4 Project

 Creating a BudgetIn this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.Week 4 Project TipsPlease Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.ScenarioTom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.Part I – The SpreadsheetFirst, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget. Part II – The ChartOnce you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project. 

Operation Security

 

A tenet of telecommunications says the more people who access a network, the more valuable the network becomes.  This is called Metcalfe’s Law.  When organizations implement security policies, there are pressures and trade-offs ~~ Chapter nine examines different types of users on networks as it reviews an individual’s need for access & how those needs can lead to risks.

  • How can the use of security policies reduce risk? Explain
  • How can a SAP reduce risk?  Explain
  • Why are end-users considered the “weakest” link in regards to implementing security policies and controls? Explain