Wk 1 – NIST Publications and Outcomes

 2 Part question is below both need to be completed

Assignment Content

  1. Part 1
    The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

    Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

    Include the following column headings: 

    • SP number 
    • SP name  
    • SP purpose
    • Include the following row headings: 
    • SP 800-30 
    • SP 800-34 
    • SP 800-37 
    • SP 800-39 
    • SP 800-53
    • Part 2
      You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

      Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

      Cite all sources using APA guidelines. 

      Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

question

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four pages length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Study Questions and Essays

– APA format

– Strictly plagarism free

– title page and 2 references for every assignment

Assignment 1(3 pages)(textbook – Information Systems for Business and Beyond)

Chapter 5 – study questions 1-9, Exercise 1 (Information Systems for Business and Beyond)
Chapter 6 – study questions 1-10, Exercise 6 (Information Systems for Business and Beyond)

Assignment 2(2 pages, 1 page per chapter)(textbook – Information Technology and Organizational Learning)

Chapter 4 – Review the section on Linear Development in Learning Approaches. Discuss how learning changes over time impact organizational culture. What is the impact of this cultural change on the success of IT projects? (Information Technology and Organizational Learning)

Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections. Note the various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. (Information Technology and Organizational Learning)

Assignment 3 (1 page)

Discussion: This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.

Machine Learning Iris

Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:

1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.

Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.

Assignment and Discussion

Discussion:
This week we focus on the knowledge management cycle noted in Figure 5.3 in the Information Technology and Organizational Learning text. Note the various aspects of knowledge management, continuous innovation, and competitive advantage and how they integrate with one another.
Need 125 words and Textbook is attached.

Assignment:  
Chapter 4 – Review the section on Linear Development in Learning Approaches. Discuss how learning changes over time impact organizational culture. What is the impact of this cultural change on the success of IT projects? (Information Technology and Organizational Learning) 

Chapter 5 – Review the Roles of Line Management and Social Network and Information Technology sections. Note the various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization. (Information Technology and Organizational Learning)

The above submission should be two pages in length (one page for each chapter) and adhere to APA formatting standards.

Exercise 6:
How are you doing on keeping your own information secure? Review the steps listed in the chapter and comment on how well you are doing.  (Information Systems for Business and Beyond Text – Refer to Chapter 6) 

Data Gathering Instrument

 

Data Gathering Instrument

Task: Create one (1) instrument that could be used to gather data for your mock dissertation topic. (cyber secuirty)
The instrument should be designed to be exactly how it would be deployed to collect data. Since instrumentation usually goes through several steps of field testing, for purposes of this assignment you can submit a deployment-ready draft of your instrument without field testing it. Be sure the instrument collects data appropriately to measure your research question.  If your study will not use an instrument to collect data because your data is archival and already exists, you will discuss your process for data retrieval. 

Assignment

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).