discussion data mining

After reading Chapters 4 and 5 -answer the following prompts and create a new thread with your content.

Chapter 5 presents a methodology known as association analysis, which is useful for discovering interesting relationships hidden in large data sets. The uncovered relationships can be represented in the form of sets of items present in many transactions, which are known as frequent itemsets.

  1. Please describe the methodology known as association analysis and discuss how association analysis is different from predictive analytics.
  2. Research and provide an example of an organization that has been successful with the use of the data mining.  For example, A Police Department will primarily use predictive analytics to evaluate potential repeat offenders to fight crime.

In order to receive full credit for the initial discussion post, you must include at least two citations (APA) from academic resources

research paper – Info-tech import in strategy Planning

 

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

please answer this in word document.

no plagiarism .  please follow above instructions

short answer

 

“Product Evaluation and Participants Consent”  Please respond to the following:

  • Product evaluation is an important step to ensure that a product will meet the quality, features, and overall design that is acceptable to the consumer. Imagine that you are an evaluator for a new product. Describe common challenges that you will find in a controlled and in a natural environment setting among users. Suggest actions that you can take in order to address or prevent these challenges.
  • An Institutional Review Board (IRB) is concerned with how human participants in an evaluation are treated and how the collected data is analyzed and stored. Not every country has IRBs. Provide your opinion on how studies conducted in countries with no IRBs should be perceived. Suggest whether or not data collected during those studies would be reliable. Justify your response.

CSIA 485 Discussion

Division chiefs, program managers, and other senior staff members working in CISO organizations frequently find themselves needing to stay current on technologies while, at the same time, leading and managing segments of the IT security program and assigned staff. Attending conferences is one way that these senior level personnel can learn about new technologies, tactics, techniques, and practices which can be adopted by an enterprise. Over the course of two or three days, a busy manager or executive can attend a large number of briefings while also developing business relationships by networking with others in the field.

Find an IT Security or Cybersecurity conference that will be offered in the next six months and research the types of presentations and workshops which will be offered. Research the costs associated with attendance (conference fees, meals, lodging, travel). The conference venue must be within the continental United States. The conference itself should be one that you are interested in and would attend if the funding were made available.

Write up a travel request which includes a summary of the conference, a justification which explains the benefits of attendance (many conferences will provide a template), and an estimate for the costs that includes the following categories: conference or workshop fees, meals, lodging, travel. Format your travel request as a 1 – 1/2 page business memorandum (no more than 7 paragraphs) addressed to the Padgett-Beale CISO.

Your travel request should include links (URLs) for the conference and venue (including the hotel where you would stay). If meals are included in the conference fee then you should state that and not include those meals in your estimate. Use this GSA website to obtain estimates for meals that are not included in the conference fees: https://www.gsa.gov/travel/plan-book/per-diem-rates

Disaster Recovery

 The assignment is to create a Disaster Recovery Plan for an organization- Please be specific on the what type of an organization you are focusing on. I understand that typical DR plans can be very lengthy. However, based on the scope of the assignment, you can focus on one particular area/department of a large organization or you can focus on a smaller organization such as a small business, doctor’s office or a similar setup. Please ensure to be clear and specific on your area of focus and cover all the areas mentioned in the assignment. 

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately Seven to Eight pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

How does software defined networking affect the management of a VPN in comparison to traditional VPN management? Does it improve or does it not improve the management of a VPN?

As threats and attacks are a continuing issue, what new technologies/methods do you think should be implemented to protect a VPN?

Wk 2 Discussion 1

 Respond to the following in a minimum of 175 words: 

As a CISO, you are responsible for developing an information security program based on using a supporting framework. Discuss what you see as some major components of an information security program.

Practical connection Assignment for Business Intelligence

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA 7 formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. BUSINESS INTELLIGENCE & Artificial Intelligence 

Demonstrate a connection to your current job Devops Cloud engineer in a telecommunication company with this course.

NO PLAGIARISM

700 word discussion: What is a project, and what are its main attributes?

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.