Disaster recovery

Read the following article: “6 small math errors…

” http://www.cracked.com/article_19623_6-small-math-errors-that-caused-huge-disasters.html

Summarize / thoughts. For each error, please use a bullet and answer A. and B. A. Summarize in your own words each of the 6 errors that were due to math. Do not quote the text rather summarize the problem in your own words showing a complete understanding of the problem. Then, B. include your own thoughts on the error. Your response should be a series of bullets (e.g. a dot, diamond, or dash), with each bullet having an A) and a B). (24 points total possible). • First Error (#6) in article A. your summary of the error B. your thoughts about the error • Second Error (#5) in article A. your summary of the error B. your thoughts about the error

New URL / summarize / avoided. Find an article online that is specific to one additional major problem that is the result of a “small” error. A. Copy and paste the URL into your submission, for the first part of answering #3. B. Next, summarize in your own words the problem. C. Lastly, explain (again, in your own words) how this problem could have been avoided. Explain/provide detail – a general summary is not enough. Your response should be the three parts, A., B., and C. (8 points total possible).

Reflecting on all of these small errors that resulted in major problems (the link assigned, plus the one you used in #3), explain why you believe these may correlate ISM 310. Why the emphasis on the correct requirements? Explain clearly at a minimum, one solid example of why accurate requirements are so important to ISM 310. Be as specific as possible. Please do not provide a generic answer. (example of a generic answer would be “attention to detail is important to avoid making a huge mistake”). Your response will be a few sentences being very specific to ISM 310. To answer this, you may need to read ahead just a little understand what ISM is all about

IT Security Policy Enforcement

 

The enforcement of an organizations IT security policies typically begins when the hard work of creating the policy and providing initial security awareness is done.  How an organizations implements compliance depends largely on their governance and management structure & policies.  Chapter 14 discusses legal considerations organizations should consider when enforcing security policies.  

1.  How can an organization use monitoring to enforce security policies?

2. What legal implications maybe encountered when an organizations attempts to enforce their security policies?

3. What is the significant difference between automated and manual policy enforcement?

4. What are some “best” practices YOU recommend for enforcing an organizations security policies?

week-15

 

Write a paper on a mushroom dataset that you analyze. You cannot collaborate with team members on the final project and you can chose to change the Mushroom dataset . In the paper be sure to include

1. Mushroom Dataset description

2. Exploratory data analysis

3. Machine Learning question – regression vs classification or unsupervised learning?

Operational Excellence Discussion

Discussion : 

Here is an assessment on Leadership Style. Please take this assessment and provide an analysis of the results. How does this relate to you? How does your style impact the technological tools that you will use as a leader? How would you use your style to lead your organization? 

Assessing Your Leadership Style.doc 

It should be at least 300 words in length and you must extensively cite reliable sources, both as references at the end and as corresponding in-text citations (formatted according to APA standards). Attach your completed document to your primary posting. Make sure you discuss your particular results. 

Industrial Control System Cyber Security

The assignment is consists of completing the following:

  • Complete the first part that introduces an ICS product and asks for technical information related to the product, its usage in real-world applications, vulnerabilities that may exist within the product, and how the exploitation of a vulnerability could impact the ability of the product to perform its intended purpose.
  • Complete the second part that looks at the typical control systems that may be existing in a household and how, if any security considerations exist to protect these systems from unauthorized access.

NOTE: ALL WORKS NEEDS TO BE DONE ON .dox FILE ATTACHED BELOW. 

Week 4 Research Paper: ERM Strategy

 The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

SOX

In 80 words or more review and discuss the Sarbanes-Oxley Act (SOX) and why do financial companies have to abide by these guidelines. 

comparing and contrasting documentation

 

Given the material covered in Module 3 (Hardware) and Module 4 (Software), your personal experience, and our good friend reliable sources, provide a well-formatted MS Word document (with citations) that provides a framework for comparing two different computing solutions for both hardware and software issues. [Hint: Such a document would most likely include an introduction paragraph, a table comparing individual characteristics, and a conclusion paragraph.]

For example, you might want to compare an iPhone X with an iPhone 7, or an iPhone X with a Galaxy 7, or a PS4 with an XBox, or an Apple Air with a Razer Blade Stealth.

Considerations might include:

  • # of (or importance of) exclusive software products available for that system
  • backwards compatibility for “old” materials from previous systems
  • cost of the system
  • compatibility of the system with supporting services (such as the cell phone network, gaming community, or preferred app store) 
  • availability of support for the system
  • disk space
  • type of external media supported
  • Graphics Card capabilities
  • Processor speed
  • Peripherals support

…Or any other considerations you consider important. A minimum of 2 hardware and 2 software factors must be included.