46 data mining

Data mining is a process of discovering interesting patterns and knowledge from massive amount of data. It involves a number of steps from data collection to visualization to extract valuable information from large data sets.

            -Discuss the major benefits of Data mining.

  1. Post your answer to the Question (100 – 200 words):

HIPAA and IT Audits

 

Overview

Imagine you are the information security officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant. They are concerned about the impact of the HIPAA Security and Privacy Rules on the organization. You begin looking at the information provided by the U.S. Department of Health and Human Services, HIPAA Enforcement, and are asked to provide an analysis of two of the cases found here with emphasis on what was done to resolve the compliance issues.

Instructions

Section 1: Written Paper

Noncompliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations, you have been asked to write a 3–5 page paper in which you:

  1. Create an overview of the HIPAA security and privacy rules.
  2. Analyze the major types of incidents and breaches that occur based on the cases reported.
  3. Analyze the technical controls and the nontechnical controls that are needed to mitigate the identified risks and vulnerabilities.
  4. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to comply with HIPAA regulations.
  5. Analyze how a hospital is similar to and different from other organizations in regard to HIPAA compliance.
  6. List the IT audit steps that must be included in the organization’s overall IT audit plan to ensure compliance with HIPAA rules and regulations.
  7. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Section 2: Network Architecture
  1. Create a network architecture diagram (using Visio or an open-source equivalent to Visio for creating diagrams), based on the description of the network architecture that you defined above for the organization to comply with HIPAA regulations.
  2. Include in the diagram the switches, routers, firewalls, IDS/IPS, and any other devices needed for a compliant network architecture.

The specific course learning outcome associated with this assignment is:

  • Create a network architecture diagram that is compliant with HIPAA regulations.

Case Study

 Read Google’s Handling of the “Echo Chamber Manifesto” and complete the questions at the end of the case study. (https://www.scu.edu/ethics/focus-areas/business-ethics/resources/googles-handling-of-the-echo-chamber-manifesto/)

– The answers should be a minimum of two pages with two references attached for each. There should be no plagiarism- attach a plagiarism report with 0% similarity index.   

Drawing conclusion

pls watch the YouTube video and pls make sure include it on the work

Start by completing your weekly assigned readings for this module (See “Reading for M11 discussion” file).

For your initial reaction post, focus on how the papers use statistics.

  • What are they trying to demonstrate and how?
  • Are they using proportions, averages, how many conditions?
  • Why do they use the statistics they use?

Do include some of the learning from the mandatory reading part and connect with one or more of the articles listed.  Make sure you include references/sources in your posts.

In addition, please reply to at least two different classmates outside of your own initial post thread

http://tecfa.unige.ch/tecfa/maltt/ergo/1415/UtopiaPeriode4/articles/Dicks_2002.

 

K. Hornbaek (2011) Some Whys and Hows of Experiments in Human–Computer Interaction [Ch. 1-3 PDF]

Das S & Kramer A.(2013) Self-Censorship on Facebook. On ICWSM2013.[PDF]

Usability Journal assignment,

For the Usability Journal assignment, you are to write three (3) journal entries.

  • Each entry shall be approximately 300-400 words each.
  • Each entry shall focus on an object that contains a bad usability design.
  • Explain why the object being described does not maintain good usability practices.
  • The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.

Example:

  • A remote control.
    • What about the remote control makes the device both a good and bad example for the usability perspective?
    • Each deliverable will contain:
    • Three entries with 300-400 words for EACH entry
    • APA citation with examples from scholars explaining best practices that should be followed
    • An example image of the bad design practice followed

network security

 

A. Short Report

Using industry reports, whitepapers, academic articles and other reliable sources, research the issue of network security threats faced by businesses in 2021-2022. Write a short report identifying and explaining the top ten network security threats. Also, justify why you chose those specific threats in your list of top ten. Include appropriate charts and diagrams.

Note:
1. Write minimum 750 words for this short report. Although there is no rigid maximum word limit, around 1000 words maximum will be appropriate.
2. Use appropriate headings and sub-headings in your report.
3. You should provide credible references according to the Faculty guidelines. Get referencing style guides and help with referencing from Charles Sturt’s Referencing webpage.

B. Hands-on Project
 

inSSIDer is a popular wireless network scanner. Download the free version of this application from https://www.metageek.com/downloads/inssider-win/ . Follow the instructions to use it as explained in MetaGeek’s website. Run the application to scan Wi-Fi network.

Now, write a report including the following information.

1. List every piece of information that the inSSIDer scanner normally produces [For example, the MAC (physical) address of the network, its SSID etc.]. Briefly explain what each one of them mean.

2. Now, state and explain the information that you obtained from your ‘run’ of the application. For every piece of information, include a screenshot from your ‘run’. What are your most important observations? Why do you consider them to be important?

 3. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.

4. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail.

5. Finally, search the internet for five (5) other wireless network analysers. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business.

Note:
 There is not rigid word limit for this report. However, around 1000 words will be appropriate.
 

Questions

 

  • 12.1 List three design goals for a firewall.
  • 12.2 List four techniques used by firewalls to control access and enforce a security policy.
  • 12.3 What information is used by a typical packet filtering firewall?
  • 12.4 What are some weaknesses of a packet filtering firewall?
  • 12.5 What is the difference between a packet filtering firewall and a stateful inspection firewall?
  • 12.6 What is an application-level gateway?
  • 12.7 What is a circuit-level gateway?
  • 12.9 What are the common characteristics of a bastion host?
  • 12.10 Why is it useful to have host-based firewalls?
  • 12.11 What is a DMZ network and what types of systems would you expect to find on such networks?
  • 12.12 What is the difference between an internal and an external firewall?

Complete your answers on a WORD Document 

Practical connection assignement for Organ Leader & Decision making

it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

 Don’t forget that the grade also includes the quality of writing.

project3

 

Instructions

Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.

You may want to review these presentation resources to help you with your narrated presentation. You will provide voice annotation for all slides in the following format: 

  • five to 10 slides maximum; limit bullets to no more than six per slide
  • voice annotation for every slide (excluding the reference slide)
  • a reference slide with one to two quality sources

How Will My Work Be Evaluated?

As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
  • 2.1.3: Explain the significance of the issue or problem.
  • 12.3.2: Describe the implementation of controls.
  • 12.8.1: Recognize the process to obtain approval from the business process owner.
  • 13.2.1: Evaluate vendor recommendations in the context of organization requirements.