EH 13

 In 250-300 words.

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

Business Intelligence

1. Define data mining. Why are there many names and definitions for data mining?

2. What are the main reasons for the recent popularity of data mining?

3. Discuss what an organization should consider before making a decision to purchase data mining software.

4. Distinguish data mining from other analytical tools and techniques.

5. Discuss the main data mining methods. What are the fundamental differences among them?

6. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.

Discussion

No matter how well an organizations data is protected, eventually there will be a breach of security or a natural disaster. Well prepared organizations create an incident response team (IRT).  Chapter 12 focuses on the IRT team by discussing its various roles and responsibilities.  

1. What is the relationship between a BIA, a BCP, and a DRP?

2. What are some best practices YOU recommend in regards to incident response policies?

9-1 Discussion: The Role of Social Media in Technical Communications

A relatively new conduit for technical and business communications is social media. Research the various forms and types of social media. Then discuss the types that are useful for technical communications in the enterprise. Why are these types useful? How would you use them if you were in charge of communications for a company? Offer a solid an example.

Discussion post – Govt

Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.  

Question1) What are some advantages and disadvantages to this approach?  

Question 2) Is there another approach that might work better? 

Note: 250 word minimum. At least one scholarly source should be used. In text citation need to be included.

Discussion on Emerging threats

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?Please provide a post and substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly sources should be used. Be sure to use information from your readings. Use proper citations and references in your post.

Research paper – industry

Pick an industry/company to focus on for this assignment.  Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan  Introduction – brief background of company and any issues the company has had in the past such as data breaches Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company) Risk Analysis – political analysis, environmental analysis (more or less depending upon company) Crisis Management Plan: Purpose Committee for crisis management planning Crisis types Structure of the Crisis Management Team Responsibility and control Implementation Plan Crisis Management Protocols Crisis Management Plan Priorities Conclusion References – APA format   Page Count Range should be 20 pages not including:  Title page, Table of Contents and References page  All References are to be in APA format.

Cloud computing

Cloud computing deployment models in 3 pages  , with power point slides , the content should not Have words which has more than one meaning like ”lot” etc..,