7 Discussion

 

Information Dissemination—How to Educate Employees

Participate in a discussion on information dissemination—how to educate employees. For this discussion, identify at least four (4) best approaches to a security awareness policy. Answer the following in your own words:

  • What would you do if you needed to develop a user training program on security awareness and security policy implementation?
  • What type(s) of training would you offer? Formal, informal, or both?

What different types of training, such as classroom, computer-based training (CBT), and so on would you use? What are the advantages and disadvantages of each.? Is one type of training better than the others? Why or why not? Explain your answers.

Lab work Data Analytics

Hi, 

Please solve below mentioned 2 problems and answer all the questions asked in each. Use the attached excel files to solve each question.

1. Question 54 – Use P03_54.xlsx

2. Question 58 – Use P03_58.xlsx

Note: Below attached are 2 questions and required 2 excel files to be used in solving those questions.

Writing Requirements:

– Provide the excel file with calculations performed

– Provide detailed explanation to each question in a word document with screenshot

– Full APA Format

– NO PLAGIARISM

Case Study

 Public Sector Case Study In November 2012, South Carolina state officials disclosed a massive data breach at the Department of Revenue. Few details on the breach were disclosed. But it involved exposing more than 3.6 million taxpayers’ personal information records and 650,000 business tax–related records. The breach occurred in September 2012. It’s clear that massive amounts of personal information were stolen. A former top official with the FBI estimated the cost to the state at more than $350 million, based upon past FBI experience, including the cost of offering free credit monitoring to affected individual taxpayers and businesses. 

The root cause of the breach cited in news reports was the lack of mandatory security policies across 100 state agencies, boards, commissions, and colleges and universities. 

All state agencies have some type of computer security system in place. It’s fair to assume they all have some level of security policy in place. But it is clear these policies were discretionary. That meant an approach to information security across state government that was at best inconsistent. Nor did the state appear to have a comprehensive approach to sharing best practices for information security or for coordinating response to these types of data breaches. 

In the case of the South Carolina Department of Revenue, the policies clearly were neither adequate nor consistent. Additionally, reports indicate the source of the hack was in Eastern Europe. The hacker or hackers gained access through a phishing e-mail. Phishing e-mails try to trick a user to open an e-mail and execute a link or program with malware. Security awareness is a strong control that educates users on how to protect themselves from such attacks, including how to recognize such attacks and why not to open suspect links. If a phishing e-mail was a source of the attack, it might be an indication that the security awareness program at this state agency was inadequate  

write a paper not more than 300-400 words on the following

  1. Do you think that the attack could have been prevented? If so, how? Alternatively, if you disagree that the attack couldn’t have been prevented, provide your analysis as well.
  2. What is your takeaway from the attack? And how does it prepared you to prevent future attacks in your organization?
  3. All papers must adhere to APA format. Please, don’t forget to use double spacing, and create in-text citations before making any references.

Assignment_DataScience

Data Science is a vastly growing field. Part of what makes this such a significant field to be in is its applicability to many other fields and nearly every industry. One of these is Artificial Intelligence (AI). Specifically, artificial neural networks (ANN) is a sub-field of AI. The topic is addressed beginning on page 249 of the text. The text notes issues with deep learning based on the vanishing gradient problem’s effect on learning. This is rather significant as it has made for ineffective learning, poor training, and test performance.

From the readings, intuitive reasoning, and experience, these (deep learning and vanishing gradient) appear to be related. Describe how these are related. While this is the case, also describe how these are different.

Need 3 pages with APA format and references as well.
This is ISBN of the text:9780133128901

PowerPoint Presentation on Healthcare Payers Industry  

Required Text: Stair, R. M., & Reynolds, G. W. (2018). Principles of information systems. Boston, MA: Cengage Learning. 

Assignment needs to be present a business use case where Blockchain Technology can address a significant challenge within the industry (Healthcare Payers)

Topic:

you have to convince the executive leadership in your company (think CEO, CTO, CIO, CFO) why the use of Blockchain Technology will solve your business problem. 

The presentation must include the following:

  • A overview of the industry Healthcare Payers
  • Key industry players in the Healthcare Payers

Requirements:

  • The presentation should be a MINIMUM of 4 slides.
  • You should make the presentation for an executive audience. That means, Times New Roman Font Face, Size 14-18 for text. Size 20-24 for headers. 
  • Graphics are essential. A minimum of 1-2 graphics should be included that are meaningful. Custom graphics/tables are preferred!
  • Clearly, concise well written presentations are essential. 
  • Each slides should include a minimum of one reference. 

Paper on Conflict resolution

Need to write a 5-7 page paper on a conflict that he or she experienced in an organizational setting.  The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font.  The organizational analysis will contain the following sections:

Background and history that led to the conflict.

How/why did the conflict escalate?

How was the conflict resolved?

What would the student have done differently, based on what he or she has learned in the class?

Strictly no plagiarism and need 7 pages of paper.  

IT Strategy Case Study

Read the ModMeters Case Study on pages 82-85 in the textbook. Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format (Attached a Sample document). See the sample assignment for expected format and length 1200 + Words. T

Discussion Question

1. Develop an IT planning process for ModMeters to accomplish the demands as set out in Case Study.

therefore

Create a Game class. It has a method called public Date getRandomDate

  

Using Java create the following classes below.

Game

Create a Game class. It has a method called public Date getRandomDate() which returns a (pseudo-)randomly-chosen Date between 1600 and 2199, inclusive.

In the public void guessTheDate() method, have the user try to guess the year, then the month, and then the day that is chosen by getRandomDate(). Each time the user is wrong, tell them “higher” or “lower” as appropriate. At any time, if the user types q or Q, the game will quit.

An example game run could look as follows:

New game! Please guess the year (or Q to quit): 1900
Wrong. Higher. Please guess the year: 2000
Wrong. Lower. Please guess the year: 1988
Correct. Please guess the month: -4
Wrong. -4 is not a valid month. Please guess the month: 4
Wrong. Lower. Please guess the month: 2
Correct. Please guess the day: 30
Wrong. 30 is not a valid day for month 2. Please guess the day: 29
Correct. The date was February 29, 1988. This was a Monday.
New game! Please guess the year (or Q to quit): 1950
Wrong. Lower. Please guess the year: 1944
Wrong. Lower. Please guess the year: 1943
Correct. Please guess the month: 13
Wrong. 13 is not a valid month. Please guess the month: 10
Wrong. Higher. Please guess the month: 11
Correct. Please guess the day: 0
Wrong. 0 is not a valid day. Please guess the day: 13
Wrong. Lower. Please guess the day: 5
Wrong. Lower. Please guess the day: 2
Correct. The date was November 1, 1943. This was a Tuesday.
New game! Please guess the year (or Q to quit): q
The game is over. Thank you.

In the public void guessTheBirthdateDay() method, have the user try to guess the day of the week on which a given date fell. Only use dates between January 1, 1900 and January 1 of the current year (just hard code the current year). Use your getRandomDate() method to select a date inside a loop, until it (randomly) picks a date between those listed above. Then ask the user to guess which day of the week it fell on. The user guesses five dates, one guess per date, and then is given a score. An example game run could look as follows:

Date #1: What day of the week was October 5, 1972: Friday
Wrong. It was a Thursday.
Date #2: What day of the week was October 1, 1900: Monday
Correct.
Date #3: What day of the week was March 31, 2000: Friday
Correct.
Date #4: What day of the week was August 10, 2016: Wednesday
Correct.
Date #5: What day of the week was December 25, 1965: Sunday
Wrong. It was a Saturday.
You scored 3 out of 5. Game over.

therefore Create a main method which calls first the guessTheDate() method and then the guessTheBirthdatDay() method.

Module 6 – Discussion Questions

Include references in APA format.

  1. You are investigation an e-mail harassment case. Would you suggest collecting evidence for the case be handled by internal corporate investigations or by an outside criminal investigation organization?  Provide reasons for your selection.
  2. Select one of the “specialized” e-mail recovery tools listed in chapter 11 and describe the tools attributes and how the tool is used to recovery e-mail evidence.
  3. Discuss the advantages and disadvantages of using circular logging verse continuous logging.

For number 2 some specialized email recovery tools mentioned are: DataNumen, FINALeMAIL, Sawmill-Novell Groupwise, MailXaminer, Fookes Aid4Mail, Paraben E-Mail Examiner, AccessData FTK, R-Tools R-Mail, MXToolBox

Please only use online references, no books or journals.