quiz

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Research Paper on Vulnerabilities (cyber Security 225)

 

For this assignment learners will use the Ivy Tech library resources and the Internet to do research on vulnerabilities associated with  a specific OS (e,g. Windows, Linux, etc), network device (Switches, Routers, IDS, etc), or other non-computer technology device (Raspberry PI, RFID, USB).

You must choose one specific subject area to write your paper.  For example, ‘USB’ is not specific. ‘RFID’ is not specific. 3com USB vulnerabilities IS specific. RFID vulnerabilities in Credit Cards IS specific.

Once you have made your selection, using a minimum of 3 current sources (the textbooks cannot be a source) write a double spaced 3-5 page research APA format paper (a paper, not just a bullet list of response answers).  Note, your cover page, and your reference page, are not included in the 3-5 page requirement. You should have 3-5 pages of written text in addition to your cover page and reference pages. Use in-text citations when paraphrasing and quoting sources to avoid plagiarism. 

Goal

In your paper:

1. At minimum, discuss three different vulnerabilities you found in your specific subject area research.2. Discuss how those vulnerabilities can be exploited3. Discuss available countermeasures for each vulnerability you mentioned.Your paper should start with an introduction or problem statement that clearly defines your specific subject and end with a conclusion regarding what your research found.
 

All sources used must be cited on the last page in a bibliography.  Proper grammar and sentence structure must be used for this formal paper. The cover page for your paper must contain your name, date, course, and instructor. The paper must be double-spaced, left-aligned.  Font should be a 10 or 12 point common font.  Do not misuse white space as a filler; points will be deducted for not meeting the minimum requirements. Remember – APA format is required! 

Once you have your paper written and saved in either .doc, .docx, or .rtf format, submit via the link above. 

Credit Card Management System

 

ITEC 630
Information Systems Analysis, Modeling, and Design
Individual Project Assignment
Purpose
The purpose of the individual system analysis and design project is to demonstrate student’s ability to
apply the knowledge learned in this course to a real-world project.
Topics Suggestions
1. The system analysis and design project must be realistic and it will be done using techniques covered
in this course. The list of topics suggested for this project is as follows:
a) Ticket purchase system (airline, train, cruise, concert, or others)
b) Internet shopping sites (clothing, shoes, books, music, or others)
c) Local real estate agency system
d) Rental system (car, video, or others)
e) Warehouse management system
f) Student record system
g) Banking system
h) Insurance purchase system (life, medical, homeowner, or others)
i) Credit card management system
j) Library circulation system
2. The above list is meant to be suggestive and if you have an idea about a specific topic, please consult
with your instructor early to determine if it is suitable for the course.
3. You have to select and submit the project topic for instructor’s approval by the end of Week 2.

Project Deliverables
The project requires students to perform three phases: (a) requirements analysis, (b) system and database
design, and (c) a project plan. Note that in the phase 3, students are required to use the MS Project
software for their project schedule.
The deadline for the Individual Project can be found in the schedule section of the class syllabus.
The following layout format covering a title page and all three phases is recommended for the project.
Title page (project name, author, and date)
Phase 1: Requirement analysis
A. Problem definition
B. Issues
C. Objectives
D. Requirements
E. Constraints
F. Description of the proposed system
G. Logical model design
1. Data flow diagrams
 Context diagram
 Diagram 0
o Diagram 1 (Diagram 1 is optional)
 Descriptions of processes in each diagram
2. Descriptions of outputs/inputs/performance/security or controls
H. Specific requirements, if any (interface, operational, resource, performance, etc.)
Phase 2: System and database design
A. User interface
Design an overall user interface consisting of screens, commands, controls, and features to
enable users to use the system.
1. How data will be input to the system?
 The physical layout for each input
 The input design and procedures
2. How data will be output from the system?
 The physical layout for each output
 The output design and procedures

B. Data design
Develop a plan for data organization, storage, updating, and retrieval.
1. Database design
 Database tables with their attributes should be presented
 Primary key(s) should be identified in each table, if any
 Three steps of normalization should be included.
2. Entity-relationship diagrams
3. Data file storage and access
C. System architecture
Determine the architecture of the system as Web-based interface, client/server architecture,
Internet/Intranet interface, network configuration, etc.
Phase 3: Project plan
A list of tasks or activities needed for implementing the proposed system
Estimating completion time and costs
A project schedule for performing those activities (Gantt charts or PERT charts)
Note that there is no other required software package except the MS Project software in this ITEC-630
course. As a result, you are only required to use the MS Project software to handle the scheduling part of
the project and for other parts, you can use any word editing software or any drawing tools software.

RSTudio Project

 

The final project for the course is a technical blog post related to a data analysis project you will work on piecemeal over the course of the semester. 

The project is very open ended. The objective is to demonstrate your skill in asking meaningful questions of your data and answering them with results of the data analysis using R / Rmarkdown, and that your proficiency in interpreting and presenting the results.  The goal is not to conduct an exhaustive data analysis. The data analysis part should meet the following criteria:

1. Perform exploratory data analysis summarizing your data using descriptive statistics / summary statistics and visualizations relevant to your questions or ones that highlight some interesting insight.

2. Demonstrate at least two of the following techniques we have learned in class and that helps answer your question: PCA, hypothesis testing / confidence interval, regression analysis (linear /logistic) 

Proposal

The first task is to identify the dataset, understand the data and write questions you are planning to answer using that dataset. You may pick a data set from one of the resources mentioned on this webpage (Links to an external site.).  The proposal should meet the following criteria:

1. Perform checks to determine quality of the data (missing values, outliers, etc.)

2. Proposal on what questions you are interested in answering from the data

3. Initial visualizations and if required transform to get the data ready 

A good reference for ideas on questions and EDA in general: https://r4ds.had.co.nz/exploratory-data-analysis.html#questions

More information on the format:

It should be about 2+ pages in length, not exceeding 10 with appendix. It should include roughly the following sections:

1. Background or the context of data selected – sources, description of how it was collected, time period it represents, context in it was collected if available, perhaps why you selected it

2. Description of the data – how big is it (number of observations, variables), how many numeric variables, how many categorical variables, description of the variables

3. Goal – What questions you plan to understand from the data. 

3. Analysis – Descriptive statistics and visualization of key variables 

4. Summary of findings from the analysis and further questions for future analysis

5. References – link to data or analysis sources you have referenced for the report

6. Appendix – all the visualization that does not support your questions directly can go here

Final Write-up

The project should include

1. Introduction: What is your research question? Why do you care? Why should others care? If you know of any other related work done by others, please include a brief description.

2. Data: Include context about the data covering:

a. Data source: Include the citation for your data, and provide link to the source.

b. Data collection: Context on how the data was collected?

c. Cases: What are the cases (units of observation or experiment)? What do the rows represent in your dataset?

d. Variables: What are the variables you will be studying?

e. Type of study: was it an observational study or an experiment?

f. Data clean-up: (Optional) If you had to do any data clean up (missing values, outliers, transformation), include a very brief description of your steps.

3. Exploratory Data Analysis: summarize your data using descriptive statistics / summary statistics and visualizations relevant to your questions or ones that highlight some interesting insight. Additional plots not relevant to your research question can be included in the appendix.

4. Data Analysis: Pick and perform two of the following techniques we have learned in class and that helps answer your question about the dataset: PCA, hypothesis testing / confidence interval, regression analysis (linear /logistic) 

5. Conclusion: Summarize your findings and include a discussion of what you have learned about your data through this project. You may also want to include limitations of your approach and include ideas for possible future work. 

6. References: Include links that you have referenced for this project.

Data

Apply: Policy and Procedure Analysis

 

Assignment Content

  1. For this assignment, you will continue using the Gail Industries Case Study.

    As the IT manager, it is your responsibility to ensure IT policies and procedures are reviewed, implemented, and followed.

    Read the “Proposed Call Center Operations Department” section at the end of the Gail Industries Case Study.

    Write a 3- to 4-page analysis for the proposed call center operations department within Gail Industries.

    • Assess the risks for the call center and analyze the risks and their impact on the organization.
    • Devise controls to mitigate the identified risks.
    • Indicate the industry standards the company must follow for processing credit card payments.
    • Identify the types of IT audits that would be performed to minimize risk to the organization and its stakeholders.
    • Discuss the relationship between IT governance and IT audits for the success of Gail Industries.
    • Format your citations according to APA guidelines.

      Submit your assignment.