BE D7

 

Discussion:

Stanford University medical researchers conducted a study on the correlation between the use of fertility drugs and ovarian cancer.  Their study, published in the American Journal of Epidemiology, concludes that the use of the fertility drugs, Pergonal and Serophene, may increase the risk of ovarian cancer by three times.  The lead author of the studies, Professor Alice Whittemore, stated, “Our finding in regard to fertility drugs is by no means certain.  It is based on very small numbers and is really very tenuous.”

​FDA Commissioner David Kessler would like the infertility drug manufacturers to disclose the study findings and offer a warning on the drug packages.  He notes, “Even though the epidemiology study is still preliminary, women have a right to know what is known.  We’re not looking to make more of this than there is.”

​If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information?

Should be 250-300 words with references.

Should be in APA format

Please read question in comment section.

 

Using the concepts in Chapter 12 of our textbook, describe the corporate  culture within your organization, or one that you know well. What  effects do the nature and condition of your organizational culture have  on your organization’s strategy? What would you like to see happen that  would improve its contribution to the organization’s competitive  advantage, and what mechanisms or measures would you recommend to your  organization’s leadership for promoting such changes?  Again, relate  your analysis and recommendation to our coursework (Thompson text and  other material) from this week. 

300 words required APA format

Need plagiarism report

scenario 4

Due Week 4 and worth 100 points

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach. 
  2. Identify the common purpose of attacks on point-of-sale (POS) systems. 
  3. Assess why and how these POS systems have become a prime target for hacking groups. 
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. 

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references 600 words .

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

short answer

 

JavaScript can add another dimension to our sites with simple math calculations, such as working with conditionals for an order form to add the proper taxes or currency conversions. Let’s return to QVR Tours for this thread and write some JavaScript that will assist in the following calculations:

  • Add a concierge fee of $150 to tours that cost more than $2,500 and a fee of $300 if a tour costs more than $3,500
  • Concatenate a traveler’s first and last name

Discounts a tour if there are more than 8 people attending (you decide on the discount)

  • Flesh out your thoughts and interact with your classmates.  Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions.  The more you interact, the more you learn from your peers, and the more you share with them about what you know.  You’ll also be showing your instructor what you’ve picked up.

Discussion-7 MM

  Discuss the role of demographics in relationship to integrated marketing communications. 

1. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. 

2. REFERENCES: All references must be listed at the bottom of the submission–in APA format. (continued) Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required. Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

midterm

Please choose any two topics from the list below and create approx. 1 to 1 ½ page essay answering the 2 questions (out of 4).  Be sure to use at least one reference and ensure the paper is in APA format (with in-text citations).  Note: Avoid DIRECT wording from any source, rather rephrase the author’s work and use in-text citations where necessary.

  1. Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  2. List and briefly describe the nine-step process in conducting a neural network project.
  3. What is the main difference between classification and clustering? Explain using concrete examples.
  4. What are the privacy issues with data mining? Do you think they are substantiated?

** Please note you have minimal space and time to complete the assignment, do NOT write an introduction, rather just answer any 2 questions from above.  Paste it in the Editor’s window and save it when you are done.

Secure Windows Applications Policy

Scenario

One of the security improvements for the Always Fresh IT environment is to ensure all workstations and

servers run secure applications. The company needs policies that set security requirements for the

software. These policies will guide administrators in developing procedures to ensure all client and server

software is as secure as possible.

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your

policy statements will describe the goals that define a secure application.

Consider the following questions for web server software and web browsers:

1. What functions should this software application provide?

2. What functions should this software application prohibit?

3. What controls are necessary to ensure this applications software operates as intended?

4. What steps are necessary to validate that the software operates as intended?

Tasks

Create two policies—one for web server software and one for web browser clients. Remember, you are

writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:

▪ Type of application software

▪ Description of functions this software should allow

▪ Description of functions this software should prohibit

▪ Known vulnerabilities associated with software

▪ Controls necessary to ensure compliance with desired functionality

▪ Method to assess security control effectiveness

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 1 to 2 pages

Self-Assessment Checklist

▪ I created two policies that addressed all issues.

▪ I followed the submission guidelines.

Weekly Assignment

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

For the discussion, answer the following questions:

1) What types of network investigations are typical of those that fall under the topic of network forsensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.