discussion main

 

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

research

Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data. Discuss the data set and the following topics.

How effective is the visualization? Why?

What elements would you modify?

Does the example reveal the tool used ( PowerBI, R, Tableau, Qlikview….?What problem is the visualization addressing? 

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date. Please see the grading rubrics for the assessment and the scores you received.

END SEMESTER

Table 1.1 lists a bank’s policy for issuance of two types of credit cards: platinum or gold. An applicant can choose to apply for a single or joint (maximum of two people) credit card based on the applicants’ single income or combined income. Bank will choose to issue platinum or gold credit card according to the income provided in the application. The table also shows the maximum credit limit in either case. Note that in case of approved joint credit application, both applicants receive separate credit cards linked to one account. 
Table 1.1: A bank’s credit card issuance policy
Card type
Min single income
Min joint income
Max credit limit for single income
Max credit limit for joint income
Platinum Credit Card
$150,000
$200,000
$15,000
$30,000
Gold Credit Card 
$100,000
$150,000
$10,000
$20,000
You are asked to design a program that accepts the appropriate inputs to decide the type of card that the applicants are eligible for.
Create an IPO chart for the program to accept the inputs outlined above and to produce an output that includes the card type and the maximum credit limits available for the applicant(s). [5 marks]
Create an IO table which shows the proposed output for different inputs. [5 marks]

paper 07/25

 

APA format is required – USE THE APA TEMPLATE.

Each question below must be addressed in your paper. Use an in-text heading to identify each question (Do not restate the question as the heading-use a topic heading instead). Each question must also be supported with appropriate APA-formatted citations that match full references at the end of the paper. Each section should be at least 2-3 paragraphs in length.

The readings for this week discuss business processes and technology tools that can be used to help manage them effectively. Review the article below, and address the following questions in your paper:

Williams, C. (2019). The importance of IT process management: White paper. Retrieved from https://pdfs.semanticscholar.org/903d/cca38680b28ac993dc35a94f0185d6ace2c7.pd

  1. Discuss how your organization may evaluate or approach IT operations as a process
  2. Identify and discuss 2-3 challenges your organization may be experiencing due to current IT processes
  3. Research and discuss 2 different Business Process Management systems in the market today which may be of benefit to your organization in addressing the challenges identified in question 2
  4. Conclude with recommendations for your organization based on your research

Choose one (1) Data Visualization and one (1) Compound Visualization by placing your mouse cursor over each option.

For this week’s discussion question, please view the Periodic Table of Visualization at the following link:( Minimum 400 words).

  1. Choose one (1) Data Visualization and one (1) Compound Visualization by placing your mouse cursor over each option.
  2. Provide your classmates with a brief description of your choices and explain why you made your choices. 
  3. Also, describe what advantage do your choices have over the others. 

Reply Post

When replying to a classmate, offer your opinion on what they posted comparing the visualizations to the other visualizations . 

Using at least 3 – 5 sentences, explain the strengths and/or weaknesses of your peer’s evaluation of the different visualizations.

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Metadata

 Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

Need in a word document with no less than 25o words.

Milestone 3

 

Milestone 3

In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as Target, OPM, Equifax, Home Depot, and so many more. 

In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident. 

This week you will work on Milestone 3.  In milestone 3 you are building upon your first two milestones and describe the mitigation strategy, results, etc. on the organization.  For example, if you chose Equifax in milestone 1 you introduced your topic, in milestone 2 you described the controls that surrounded the organization, and now in Milestone, you will evaluate the results of the security incident. All of these milestones tie into each other as you evaluate the circumstances of the incident and the results.  

The minimum is 2 written pages and this does not include the title or reference page.  You must properly APA format your response.

Discussion Help

 Discuss the preparation within your own organization in regards to your Emergency Operations Center.  What are the pros and cons of your current preparations?