Discussion

Search for a recent article on data mining. 

Describe the role of a data mining in that article in your own words.

Give specific examples of how techniques like classification and clustering has been applied in that particular case study.

700 words: Information Technology and Organizational Learning. Please look in the description for detailed info.

· Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization. 

· Chapter 10 – Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude? 

Operational Security Discussion

Discuss the differences in policy requirements of the government and health care sectors. Additionally perform a quick search on the following agencies to determine similarities and differences:

  • National Institute of Standards and Technology (NIST) and National Security Agency (NSA) Web sites for information on policy requirements for the government sector
  • The Health Insurance Portability and Accountability Act (HIPAA) and any other laws that regulate the health care sector

Should Military Personnel Receive Extra Rights?

 

Some people believe those under 21 serving in the military should be allowed to drink alcohol even if non-military citizens are not. The crux of the argument is, “if I am old enough to die for my country, I am old enough to drink.” Still, America’s Founding Fathers clearly believed the military, as an extension of the government, should serve the people rather than the other way around, so, one could argue, military members should be held, not only to the same standards as non-military citizens, but to an even higher standard.

·  For the assignment this week, write a 500-750 word paper arguing whether military personnel should or should not receive rights and/or liberties not afforded to non-military citizens. In the paper, include the opposing position along with your rebuttal (of that opposing position).

·  For instance, if you wrote a paper arguing that military personnel should receive rights not afforded to non-military citizens (and why), then the rebuttal would be that military personnel should not receive rights not afforded to non-military citizens (and why).

·  Note: A rebuttal is a form of evidence that is presented to contradict other evidence that has been presented by an adverse party

Research paper

Attached the document with the instructions and also the reference article. need 4 pages of content on given questions  with zero plagiarism

Cybersecurity Program Maintenance

Create an actionable plan including executive level support and budget allocation to ensure security controls can be rapidly updated and expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

Procedures to track performance

Procedures to monitor and measure performance for areas of improvement

Procedures to identify new threats, vulnerabilities, or any countermeasures

Procedures to obtain feedback on the effectiveness of policies

Procedures and technical tools to monitor the internal and external environment

Procedures for budget allocation

Procedures to catch any oversights

Discussion: Blockchain

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

300 words with a minimum of 2 references in APA style

Discussion 4 Info tech import strat plan

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Signature Assignment: Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

Complete the following in your outline: 

  • List the tools used for backup purposes. 
  • Explain the following: 
  • Where employees should work from that day 
  • How employees can get to their data 
  • The communication methods about updates 
  • Outline step-by-step instructions to recover your databases and telecommunications. 
  • Provide a step-by-step guide to recover and provide any additional company assets. 
  • Discuss policies for backup media storage. 
  • Discuss policies for encryption of backup data. 

Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines. 

Week 4 discussion 2

Respond to the following in a minimum of 175 words: 

  • Choose one of the control families described in FIPS 200 and describe how a security policy would be written to address that control family. 
  • Discuss the primary components of the security policy with respect to the security requirements described within the control family.