CYB 670 Proj 3

 

Your nation’s technical staff expects you to report on all summit events once you return to your nation’s capital. The CISO has requested that each analyst work independently to create an Intelligence Debriefing for technical staff. This debriefing is a comprehensive report and is comprised of your BCP, SITREP 1, SITREP 2, and SITREP 3.

Each team member should develop his or her own briefing and submit independently. You may, however, use your team’s discussion area to share your findings with your peers.

Discussion 300 words

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Introduction to Data Mining

  

You are a data mining consultant hired by your organization to implement a data mining process. What challenges does your organization face in ensuring that the data mining models are receiving clean data?

Your assignment must adhere to APA guidelines. There should be at least one scholarly source listed on the reference page. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. Your paper should be 2-3 pages in length.

Usability Journal Work

3 Journal Entries:

Three Journal entries with 300-350 words for EACH entry.

Each entry should focus on an object that contains a bad usability design

Explain why the object being described does not maintain good usability practices.

APA citation with examples from scholars explaining best practices that should be followed

An example image of the bad design practice followed

An example of good potential practices to follow

The deliverable should include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.

For Example:

A remote control. What about the remote control makes the device both a good and bad example for the usability perspective?

Discussion

Organizations are struggling to reduce and right-size their information foot-print, using data governance techniques like data cleansing and de-duplication. Why is this effort necessary?  Briefly explain and support from your readings, using APA style citations. Remember to appropriately respond to two other learners for full credit.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

 Describe in your own words what a rootkit is. 

 post must be between 250-300 words  

SE492 week 8 A

Please review late submission grading posted under policy section Course Modules.

Please submit a word document of your assignment. Other file types are not acceptable.

                                                  Assignment Description

Explain why the process of project planning is iterative and why a plan must be continually reviewed during a software project.

Note: Please list your reference/s.

Discussion 250 words

 What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?