4s week 9 assignment IA

In 300 words,

Describe two cryptographic applications and how they are used in Information System Security. 

Include references.

No copy paste, use your own words.

3 page writing in APA 6th standard- Chapter Readings Reflections Journal

Writing needs to summarize Chapter 1, 2, 3 from the attached text book. There shouldn’t be any plagiarism and should be in APA 6th standard. 

Chapter 1, 2, 3 Reading Reflection should address the following prompts: 1. Summarize the content of the chapter addressed. 

2. What were some of the highlights in this chapter and learning opportunities?

Project Cyber Security

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT).

Week6

 

Part 1: 

Prepare a Business Impact Analysis (BIA) for an information system, such as a payroll system.

Download the template “Business Impact Analysis (BIA) Template” from the ……….Template attached……………. website.

Read the template. Notice that text in italics is instructive and placeholder text. You may use the template and complete the information required in the template with your points and information.

Compete the Business Impact Analysis (BIA) Template.

Part 2: 

Download the Information System Contingency Plan template from the ……..Template attached…….. Choose the low, moderate, or high template based on the impact value you identified in the Outage Impacts section of the BIA template for Part 1.

Complete the template. Completing the appendices is not required, but recommended. You may use the template to fill in the information requested within the template.

discussion

Raw data is often dirty, misaligned, overly complex, and inaccurate and not readily usable by analytics tasks. Data preprocessing is a data mining technique which is used to transform the raw data in a useful and efficient format.

The main data preprocessing steps are:

•          Data consolidation

•          Data cleaning

•          Data transformation

•          Data reduction

  1. Research each data preprocessing step and briefly explain the objective for each data preprocessing step.  For example, what occurs during data consolidation, data cleaning, data transformation and data reduction?
  2. Explain why data preprocessing is essential to any successful data mining.  Please be sure to provide support for your answer.

Discussion – Enterprise Risk Management (350 words)

 

After reading both articles this week (see below), and any other relevant research you locate, please discuss the following: 

Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

**************************************——————**************

Reading Assignments

Reading Assignments

Security Risk Mitigation Plan

  

Take on the role of Risk Management Analyst for Capital One Finance.  

Using the attached Segregation of Duties Matrix, create a 6- to 8-page Security Risk Mitigation Plan for the Capital One Finance.

Research and include the following: 

· Refer to additional resources below and attached, and the grading rubric.

· Security Risk Mitigation Plan:

· Select and document security policies and controls.

· Provide authentication recommendations.

· Document administrator roles and responsibilities.

· Document user roles and responsibilities.

· Determine authentication strategy.

· Determine intrusion prevention and detection strategy.

· Determine virus detection strategies and protection.

· Create auditing policies and procedures.

· Recommend an education plan for employees on security protocols and appropriate use.

· Provide recommendations for managing identified risk

· Avoidance

· Transference

· Mitigation

· Acceptance

· Address change Management/Version Control.

· Outline acceptable use of organizational assets and data.

· Present employee policies (separation of duties/training).

· Incident response process

· Preparation

· Detection

· Containment/analysis

· Eradication

· Restoration/Recovery

· Lessons learned (root cause analysis and action plan)

Additional Resources

· Intrusion prevention begins with an IPS that can automatically detect and stop intrusions. However, no control can stop all intrusions. Consequently, we need strong detection controls, including

· Log Management

· User Behavior Analysis

· Network Behavior Analysis

· The purpose of separation of duties is to ensure no one person can perform all tasks associated with a critical business process. This helps prevent fraud and mistakes. A common way to do this is the creation of roles (RBAC) and the assignment of tasks in an access matrix (spreadsheet). This allows data owners to understand who can do what and how to remove one or more tasks to ensure no role can perform all business process tasks. A separation of duties tool is attached below. The tabs along the bottom take you to the various business processes included. Adapt this to any set of business processes.

· Employee training is typically focused on the contents of the acceptable use policy.

DM Dis-3

Questions:

1) The rule-based classification can be used to refer to any classification scheme that make use of IF-THEN rules for class prediction. Discuss the rule-based classification schemes and what is Rule Pruning in data mining?

2) Bayesian classification is based on Bayes’ Theorem. Bayesian classifiers are the statistical classifiers. Discuss what is Bayesian classification in data mining? How do Bayesian networks work? What do Bayesian networks predict?

Write in 2 pages and everything in APA format.

on time delivery.

plagiarism free.