Find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.
1. Two APA 7 References needed
2. 400 to 500 words
Find two different recent articles involving data mining. Describe the role of “data mining” in the story using your own words.
1. Two APA 7 References needed
2. 400 to 500 words
The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
RESEARCH SCENARIO
ABC Services Ltd (‘ABC’) is a global financial services provider. To comply with local regulatory frameworks, they operate offices around the world, most of which have a legal requirement to store their Know Your Customer (‘KYC’) information in on-site servers.
One of these servers, located in Lebanon, was recently infected with a variation of malware called ransomware, which has prevented ABC from accessing their local KYC data by encrypting it with a secret key. The threat actor behind the attack left behind a file on the server that demands a ransom for the return/decryption of this data.
Once they became aware of this incident, they instructed their local IT team to bring the server offline to mitigate the risk of the malware spreading across their network. They also activated their business continuity plans to minimize disruption to their core business, which involved recreating the servers from backups taken over a month ago.
ABC approached YOU to help them answer several questions, specifically:
What type of ransomware was used?
How is the ransomware typically delivered?
What is the likely profile of the original developers of the ransomware?
What is the likely profile of a threat actor using this ransomware?
Are there any known methods of decrypting the data encrypted by the ransomware?
What is the likelihood that the ransomware has exfiltrated data?
What additional information would you require to investigate whether the threat actor has exfiltrated KYC data?
They have provided you with a sample of the ransomware and asked you to carry out a preliminary investigation. The sample they provided contains the following key information:
Info.exe (the ‘executable’) – this is the file name of the ransomware that was used to encrypt ABC’s data.
[email protected] and [email protected] – these email addresses are provided in the ransom note left as a text file on the client’s systems, as a means of contacting the threat actor.
.no_more_ransom – this file name suffix is present on files encrypted by the ransomware that affected your systems and data.
Your Task
Please research and prepare a written summary of findings to answer ABC’s questions in an MS Word report. While you will certainly have to make assumptions about the situation, we will expect you to be able to explain and answer above questions at a high level about some of the key technical concepts involved in your findings.
Examples of topics you may consider including in the report are:
RDP, asymmetric encryption, brute forcing, and phishing. Please be sure to capture the key findings from your research into the malware as well as the potential implications of this incident for ABC.
700 word discussion: Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
This week’s discussion centers around the concept of Blockchain. There is still much confusion regarding what Blockchain is and what it is not. Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.
A substantive post will do at least TWO of the following:
500 Words Initial post with at least 2 scholarly references and In-text citation.
Comment 1: 150 words with at least 1 scholarly reference and In-text citation.
Comment 2: 150 words with at least 1 scholarly reference and In-text citation.
*** Please attach the grammarly score screenshot in the end of the document.
What are the privacy issues with data mining? Do you think they are substantiated?
4.How would you describe those factors that determine the tone at the top.(550 words)
5. How would you explain the correlation between the amount of corruption in a country and economic development (550 words)
6. Discuss the risks of avoiding confrontation of a problem employee (550 words)
7.Stanford University medical researchers conducted a study on the correlation between the use of fertility drugs and ovarian cancer. Their study, published in the American Journal of Epidemiology, concludes that the use of the fertility drugs, Pergonal and Serophene, may increase the risk of ovarian cancer by three times. The lead author of the studies, Professor Alice Whittemore, stated, “Our finding in regard to fertility drugs is by no means certain. It is based on very small numbers and is really very tenuous.”
FDA Commissioner David Kessler would like the infertility drug manufacturers to disclose the study findings and offer a warning on the drug packages. He notes, “Even though the epidemiology study is still preliminary, women have a right to know what is known. We’re not looking to make more of this than there is.”
If you were a manufacturer of one of the drugs, would you voluntarily disclose the study information(1100 words)
8. Explain the impact of private equity firm acquisition of manufacturing and retail firms (550 words)
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial.
This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives. In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:
1) Introduction – What is an ERM?
2) Why Should an Organization Implement an ERM Application?
3) What are some Key Challenges and Solutions to Implementing an ERM?
4) What is Important for an Effective ERM?
5) Discuss at least one real organization that has been effective with implementing an ERM framework/application.
6) Conclusion – Final thoughts/future research/recommendation
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
Please Provide the Following Topics and Provide 250 words for Each question. you can use the attachment as a reference
1) Using the Chapter 27 Case Study, Nerds Galore, develop a Risk matrix for the HR-related risks on p. 532. For each of the Risks in your matrix justify your decision as to their placement on the Risk matrix.
2) Embedding Strategic ERM into Strategic Planning is an important means to implement ERM for an organization. Develop a Cause and Effect (Ishikawa) chart that would show the factors needed to make a decision to include ERM in Strategic Planning. Provide a description explaining your chart?
3) Using the case study from Chapter 14 on Zurich Insurance, explain how Zurich’s Capital Management Program supports ERM and provide examples of where Zurich created new value with their ERM program?
4) What are at least 3 Traditional Risk Management practices that are included in ERM? Clearly define the traditional risk management practice and how it fits with ERM. Adequate support including applicable case study examples from your text can be applied.
5) Describe how Important Enterprise Risk management in the Information Technology Industry or Organization and things to learn from ENterprise Risks management
Grading:
Each question is graded on content, how well you address the question, and on good academic writing as follows:
1) 15 points on question response content (written word, diagrams, etc.)
2) 5 points on maintaining focus by keeping to the question, its content, and not providing unneeded material.
3) 5 points on good collegiate academic writing.
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.