Future of BI

 

Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

A few discussions ago you discussed the future of data mining. For this assignment, you will expand your opinion on what business intelligence (BI) is moving toward in the future. Discuss the following:

  • What potential opportunities, pitfalls, and threats are facing BI? Provide 3 examples of each.
  • Although you are expressing your opinion, you must provide supportive examples and sources to support your opinions.

Cyber Tactics Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

In 2014, Upsher-Smith Laboratories was targeted by cyber-criminals who employed a business email compromise phishing scam. The cyber-criminals successfully sent emails to the company’s accounts payable department requesting several wire transfers in the amount of $39 million dollars. The emails appeared to originate from the business’s CEO. When the scam was eventually discovered, Upsher-Smith Laboratories took steps to stop all of the wire transfers but were only able to recall one of nine transfers. Had the last transfer been submitted, the cyber criminals would have netted $50 million dollars from Upsher-Smith Laboratories.  The attack was extremely successful, and the perpetrators of the attack were never identified. Upsher-Smith Laboratories appears to still be in ligation with its own bank whom they are suing for facilitating the transfer. This type of phishing attack is commonly known as Whaling or CEO Fraud. This type of attack targets CEOs and the information obtained from such an attack can be used to authorize fraudulent wire transfers to a financial institution of their choice or  conduct “W-2 phishing in which they request W-2 information for all employees so that they can file fake tax returns on their behalf or post that data on the dark web.” Effective countermeasures to mitigate the impact of such an attack include setting up a multifactor authentication system so that there is not a single point of failure with respect to wire transfers. Perhaps the most effective countermeasure is targeted employee and CEO training.

Phishing Case Studies: Learning From the Mistakes Of Others. “Phising Protection”. Accessed 26 May 2021 https://www.phishprotection.com/blog/phishing-case-studies-learning-from-the-mistakes-of-others/

Bisson, David. 6 Common Phishing Attacks and How to Protect Against Them “The State of Security”. Accessed on 26 May 2021 https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them/

-LAUREN

RESPONSE 2:

Phishing attacks have become very common with advancements in technology and cyber attacks. One phishing attack that was very successful is called the Pickachu virus. Pikachu virus was designed target younger generation of children by sending malicious links to anime Pikachu. The phishing attack was designed to damage the configuration files within computer and directory files once executed ( Kate Johanns June 30th 2017 ). The phishing email spread throughout all outlook and eventually infected millions of computers once executed like Worm. The pikachu virus was designed to be friendly for children but was infected with malicious intent to damage victim computer. 

The pikachu virus was very successful because it targeted less aware community by infecting their computers. The virus that spread though emails was classified as being low risk because after reboot it asked for permissions to effect the computer. The virus was considered to be worm that was attached to phishing email and was highly effective. Millions of users were infected and fell victim to this phishing email. The Pikachu virus would not take affect on victims computer until reboot and all configuration file would be deleted by Pikachu virus. The person that actually wrote the virus was never caught and still to this day is unknown. The best counter measures to Blocking this attack would have been update anti virus and essential user training to younger generation to avoid this type attack. It’s important for younger generation to understand the dangers of the internet and how it works. 

Kate Johanns ( 2017 June 30th ) “Tech Time Wrap: The Pikachu virus is not your friend” Smarter MSP 

-MICHAEL

Help

PROBLEM: RANSOMWARE

QUESTION

In a Microsoft Word document of a minimum of 500 words, include the following:

  1. Research questions: List a minimum of two research questions that will help you to analyze the problem.

  1. Current hypothesis:      Include a hypothesis about how you think the system currently operates.

  1. Collect data and create two visual models of the data that show the current state of the system.      Put the data into MS Excel and generate graphs that show the current state.  

  1. Create a comprehensive visual model of the system/process that you are researching.

  1. Draw clear conclusions:      Document your findings and deliver a professional statement about the analysis according to Christian virtues and values.

  1. Attach an Excel sheet that includes the raw data that was collected to show the current state of the system.

PLEASE FOLLOW THE ATTACHMENT INSTRUCTION TO FINISH THE WORK AND USE EACH QUESTION AS A HEADING

HOW TO GO ABOUT THE ASSIGNMENT 

This is another of your research paper. You will roll this and the other parts up to make a complete paper incorporating feedback from my grading and your peer reviews. Using headings for each item in the same order as the rubric.

  1. Research questions – These are the questions that will guide your study. Its as simple as saying, “The discussion questions for this study are:….”

  1. Number the questions Q1 & Q2.

  1. Example:
    1. The research questions for this study are (assuming a problem to be addressed of poverty):

      Q1: What are the major causes of poverty?
      Q2: How can poverty be lessened?

  1. Current Hypothesis – you job here is to articulate a hypothesis about how your stated problem works. Consider the following as you formulate your hypothesis: https://www.enago.com/academy/how-to-develop-a-good-research-hypothesis/

  1. Excel Spreadsheet – This is really a table made in Excel that contains your data based on your research from your plan (incidents over time and $’s of damage overtime as an example for spear phishing) 

 

  1. Two forms of visual data – For this task you create visual analysis tools/items based on your table such as graphs, timelines, charts etc.

  1. Visual model of the system/process – here you create a visual model of how the problem/phenomenon you are studying works.

  1. Conclusion – Here you draw a conclusion about the problem based on the data, analysis, and model.

Need to design an algorithm

  

25

Need to design an algorithm to produce a list of customer from the glad rags clothing company’s customer master file. Each record on the customer master file contains the customer’s number, name, address (street, city, state and postcode) and account balance. The program is to read customer master file and print a report of all customer’s number, name, address, and account balance. Print heading and column heading at the top of each page, allowing for 35 detail lines per page, and at the end of the report, the total customers on file, the total customer with balance owing and the total balance owing.
 

CIS 222 DB 3

 1 page apa format

Unit 3 DB: Risk Management Framework

As the CISO, you are heading a newly assembled project team to focus on securing the PCS Corporate network. You have selected the NIST Risk Management Framework (RMF) as the basis of your program due to the large number of government contracts you support. Your first tasking is to analyze the system and determine what security requirements are appropriate.Consider the six phases of the Risk Management Framework and how each phase adds value to securing the corporate network. Make a case for the phase that PCS should spend the most time and resources in accomplishing. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss the other ideas presented by the RMF team. 

Web Application Security

Review the attached slides to summaries  week 1 of 2 and week 2 of 2

 The quantity and quality of new insights from your own independent research/experience

 Adherence to page limits, font, font-size, line spacing, and margins

 Use of at least 2 new references

 Reputation of the reference sources

 Use of in-text citations with matching references and vice-versa

 Appropriateness of the use of the APA format for both in-text citations and references.

Please see the attachment.

Please create these two programs.

  

Please create these two programs.
Write a program as follows. Follow instructions carefully to avoid point deductions. All statements should be in the main function:
create an empty list named nums.
use a loop to add 20 random integers, all in the range from 1-100, to nums.
print the total of all list elements.
print the highest number in the list.
print the lowest number in the list.
sort the list and then reverse it.
use another loop to display the sorted numbers in descending order, all on the same line, separated by a single space.
determine if 75 is in the list. If it is, report the index of its first occurrence. If it is absent from the list, indicate that, too.
make a new list named middle_10 by slicing out the middle 10 elements of the descending list. Use a loop to display the elements in middle_10 all on one line.
make an empty list named evens and another empty list named odds.
use a loop to process nums, adding even elements and odd elements to their respective lists.
print both evens and odds. Crude dumps inside [ ] as shown next are okay.
Sample Output 1
List total: 712
Highest number: 85
Lowest number: 2
All list elements in descending order
85 83 67 67 58 53 50 49 30 28 23 21 20 20 16 15 14 8 3 2
75 not in the list
Middle 10 after descending sort: 53 50 49 30 28 23 21 20 20 16
Even #s [58, 50, 30, 28, 20, 20, 16, 14, 8, 2] Odd #s [85, 83, 67, 67, 53, 49, 23, 21, 15, 3] Sample Output 2
List total: 1000
Highest number: 99
Lowest number: 2
All list elements in descending order
99 98 87 85 78 75 72 71 54 48 47 35 31 29 25 20 18 16 10 2
First found 75 at index 5
Middle 10 after descending sort: 75 72 71 54 48 47 35 31 29 25
Even #s [98, 78, 72, 54, 48, 20, 18, 16, 10, 2] Odd #s [99, 87, 85, 75, 71, 47, 35, 31, 29, 25]

Discussion: Smart Card versus Authenticator App

 The Personal Identity Verification (PIV) card is used in non-military government agencies for authentication and identification to gain access to systems, networks, and online resources. These cards, in combination with a personal identification number, meet two-factor requirements. PIV credentials also are designed to help reduce counterfeiting and are tamper-resistant.An authenticator app, such as Google Authenticator, is another method to achieve two-factor authentication. It is a free app available for installation on mobile devices.The U.S. federal government authorizes the use of PIVs as well as authenticator apps, depending on the circumstances.Answer the following question(s):

  1. In what type of situation would an authenticator app provide adequate two-factor authentication for federal government use? Provide rationale or a citation for your answer.
  2. In what type of situation would a PIV be required for federal government use? Provide rationale or a citation for your answer.

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; Post should be at least 700 words in length.

Computer Science Homework

1 – Explain why it is useful to describe group work in terms

of the time/place framework.

2 – Describe the kinds of support that groupware can provide

to decision makers.

3 – Explain why most groupware is deployed today over the

Web.

4 – Explain in what ways physical meetings can be inefficient.

5- Compare Simon’s four-phase decision-making model to

the steps in using GDSS.