Performing a Qualitative Risk Assessment for an IT Infrastructure

1.

What is an IT risk assessment’s goal or objective? 

2.

Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?

3.

What was your rationale in assigning a “1” risk impact/risk factor value of “Critical” to an

identified risk, threat, or vulnerability?

4.

After you had assigned the “1,” “2,” and “3” risk impact/risk factor values to the identified risks,

threats, and vulnerabilities, how did you prioritize the “1,” “2,” and “3” risk elements? What

would you say to executive management about your final recommended prioritization?

5.

Identify a risk-mitigation solution for each of the following risk factors:

a. User downloads and clicks on an unknown e-mail attachment 

b. Workstation OS has a known software vulnerability

c. Need to prevent eavesdropping on WLAN due to customer privacy data access

d. Weak ingress/egress traffic-filtering degrades performance

e. DoS/DDoS attack from the WAN/Internet

f. Remote access from home office

g. Production server corrupts database

Portfolio

discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

IT210 week 9

  

IT210 week 9   
Write pseudo code for the Currency Conversion application based on all the previous assignments – Application Level Requirements (week 2), Design (week 4) and Test Procedure (week 6)

Exp19_Excel_Ch02_HOEAssessment_Gateway_Vacations

 Exp19_Excel_Ch02_HOEAssessment_Gateway_Vacations

     

Download and open the file named Exp19_Ch02_Assessment_TimeShare.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Click cell B2, click the   Formulas tab, click Date & Time in the Functions Library group. Select NOW, and then click OK to enter   today’s date in the cell.

 

Click cell D9. On the Formulas   tab, click Logical in the Function Library group, and select IF. Type C9<$B$6 in the Logical_test box, type B9*$B$4 in the Value_if_true box, and   type B9*$B$5 in the Value_if_false box.   Click OK, and use the fill handle to copy the contents of cell D9 down the   column. Click Auto Fill Options, and click Fill Without Formatting.

 

Click cell E9, type =(B9-D9)/B9, and use the fill handle to   copy the contents of cell E9 down the column. Click Auto Fill Options, and   click Fill Without Formatting.

 

Click cell F9, type =B9-D9, and and press CTRL+ENTER. Use   the fill handle to copy the contents of cell F9 down the column. Click Auto   Fill Options, and click Fill Without Formatting.

 

Click cell G9, click Lookup   & Reference in the Function Library group and select VLOOKUP. Type C9 in the Lookup_value box, type $D$4:$E$6 in the Table_array box, and   type 2 in the Col_index_num box. Click   OK.

 

With cell G9 selected, use the   fill handle to copy the contents of cell G9 down the column, stopping at row   28. Click Auto Fill Options, and click Fill Without Formatting. With the   range G9:G28 selected, on the Home tab, in the Number group, click Increase   Decimal twice.

 

Click cell H9, type =G9/12, and press CTRL+ENTER Use the   fill handle to copy the contents of cell H9 down the column, stopping at row   28. Click Auto Fill Options, and click Fill Without Formatting. With the   range H9:H28 selected, on the Home tab, in the Number group, click Increase   Decimal twice.

 

Click cell J9, type =I9*12, and press CTRL+ENTER. Use the   fill handle to copy the contents of cell J9 down the column. Click Auto Fill   Options, and click Fill Without Formatting.

 

Click cell K9. Click the   Formulas tab, click Financial, and then click PMT. Type H9 in the rate box, J9 in the NPER box, and type -F9 in the Pv box. Click OK. 

 

Use the fill handle to copy the   contents of cell K9 down the column. Click Auto Fill Options, and click Fill   Without Formatting.

 

Click cell K29, press ALT+=, and   press ENTER.

 

Click cell B32, type  =COUNT(A9:A28), and press CTRL+ENTER to   calculate the total # of loans.

 

Click cell B33, type =MIN(K9:K28), and press CTRL+ENTER to calculate   the lowest monthly payment.

 

Click cell B34, type =MAX(K9:K28), and press CTRL+ENTER to   calculate the highest monthly payment.

 

Click cell B35, type =AVERAGE(K9:K28), and press CTRL+ENTER to   calculate the average monthly payment.

 

Click cell B36, type =MEDIAN(K9:K28), and press CTRL+ENTER to   calculate the median monthly payment.

 

Create a footer with your name   on the left side, the sheet name code in the center, and the file name on the   right side.

 

Save and close Exp19_Excel_CH02_Assessment_Timeshare.xlsx.   Exit Excel and submit as directed.

Final Project (R programming)

Use any techniques (correlation, regression, machine learning, deep learning, etc.) to answer the following two questions:

·  What factors significantly impact the amount of wines (AmountWines)?

o  Due date: Monday 12/13/2021 11:59pm CT

o  Data: Canvas-assignment-Final Project

o  Submit your codes via Canvas-assignment-Final Project

o  Submission format: r.script and Single Excel summary output

You must follow below steps. Otherwise, your code won’t work on my machine

§  Manually set your working directory (from toolbar – Session), DO NOT hardcode the file path.

§  Only use the following code to read data from your local drive

data_independent  <- read.csv(file = 'data - for student - independent variables.csv')

data_dependent <- read.csv(file = 'data - for student - dependent variable.csv')

y <- data_dependent$AmountWines

§  Enter your name, such as:

first_name<-'Yan'

last_name<-'Lang'

§  Assign “new_data”, lower-case, to represent all independent variables you decided to use

§  Assign “model”, to represent your model’s name

§  Assign “preds”, lower-case, to represent your y-predictions based on the results of your model. If your data has 1500 rows, then you should see 1500 rows of predictions.

§  write below code after calculating your predictions

rmse<- sqrt(mean((y - preds)^2))

§  Combine, “first_name”, “last_name”, and “rmse” as one single csv output file, name the csv file as: finaloutput

§  At the end of your scripts, write the following code (this is for TA, when testing your code, don’t run those lines.)

source(“predictdata.R”)

·  What are your business suggestions/recommendations to the CEO?

o  Due date: Monday 12/13/2021 11:59pm CT

o  Submit your file via Canvas-assignment-Final Project

o  Submission format: Single Word file

§  Data visualization

§  Executive summary reports

§  etc.

Policy

 Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

1000 words 

APA format with references needed