case study

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

Discussion : Global Wireless

We looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

note minimum of 250 words.  At least one scholarly source should be used 

Week 4 Research Paper: ERM Strategy

  1. The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.
    Your paper should meet these requirements: 

    • Be approximately four to six pages in length, not including the required cover page and reference page.
    • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
    • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion

  

1. Watch the following two videos:  https://www. youtube.com/watch?v=GHc63Xgc0-8 and  https://www.youtube.com/watch?v=ggN8wCWSIx4 for a  different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more  likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply  for many jobs?

2. Conduct research to identify the most recent develop-ments in self-driving cars.

Assignment

 

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Assignment

 

Complete the following assignment in one MS word document:

Chapter 7 –discussion question #1-4 & exercise 3 & Internet exercise # 7

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

Week 7 Assignment

 

The scenario:

The Prime National Properties Group is considering selling some of its educational facilities. The facilities have been tracked in an Access database. Shelly Williams, the President of the company, has asked you to prepare a report. Import the Access data in the file Facilities_Data as a table into Excel. Using the PMT function, calculate the monthly payments the company could expect. The company would charge an 8% rate over 10 years. The result should be a positive number. Mr. Williams also asked you to calculate an extra processing fee for monthly loan payments using the IF function. If a monthly loan payment is less than $6000, the company would charge a processing fee of $150; otherwise, there would be no processing fee. Filter the rows to display only those facilities where there is a $0 processing fee. Hide all of the address fields and the processing fee column. Save the Excel file as Lastname_Firstname_Educational_Facilities

For this assignment, you will need the following files:

New blank Excel workbook

Facilities_Data

Educational_Report

You will save your files as:

Lastname_Firstname_Educational_Facilities

Lastname_Firstname_Educational_Report

  1. Open the Word document Educational_Report, and then save the file as Lastname_Firstname_Educational_Report
  2. Add a cover page of your choice, and then complete the content controls on the cover page.
  3. In the report, format headings as Level 1 or Level 2, and then insert a table of contents on a new page.
  4. In the worksheet, hide all of the address fields and the processing fee column
  5. paste the Excel data into the Word document.
  6. Add an appropriate heading formatted as Level 1, and then update the table of contents.
  7. In each file, insert the your name as a field in the footer

Upload the completed assignment files in the Assignment area. 

Adding Images to the discussion board

R Program – using visualization to misrepresent data.

 

Misrepresenting Data

There are many ways to misrepresent data through visualizations of data. There are a variety of websites that exist solely to put these types of graphics on display, to discredit otherwise somewhat credible sources. Leo (2019), an employee of The Economist, wrote an article about the mistakes found within the magazine she works for. Sosulski (2016) wrote an entry in her blog that highlights misrepresentations, as well.

  • After reading these two articles, create two visualizations in R that show identical data.
  • In one, create a subtle misrepresentation of the data.
  • In the other remove the misrepresentation.
  • Add static images of the two visualizations to your post.
  • Provide a description of what is misrepresented and how the visualizations were created in R by you. Include the programming code you used to generate the visuals and the reference for the data that you use for these plots.
  • Do not plagiarize by copying the graphs, programming code, or your peers.
  • When adding images to the discussion board, use the insert image icon.

Adding Images to the discussion board

References

Leo, S. (2019, May 27). Mistakes, we’ve drawn a few: Learning from our errors in data visualization. The Economist. https://medium.economist.com/mistakes-weve-drawn-a-few-8cdd8a42d368

Sosulski, K. (2016, January). Top 5 visualization errors [Blog]. http://www.kristensosulski.com/2016/01/top-5-data-visualization-errors/

Assignment of Effective Physical Security

Scenario-  The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings.  

  

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

  

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

Will provide more details.