The Final Portfolio Project

 

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. 

Emerging threats_6.2

Discussion:

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

Note: Answer should be a minimum of 300 words

Upload Data visualization Assignment: Written Assignment 3: Data Collection Techniques

Background: As noted by Kirk (2016), working with data is one of the four stages of the visualization workflow.  According to Kirk (2016), “A dataset is a collection of data values upon which visualization is based.” In this course, we will be using datasets that have already been collected for us. Data can be collected by various collection techniques.

Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.

Assignment: Summarize 3 data collection techniques (Interviews, Surveys, Observations, Focus Groups, etc.). Compare and contrast the 3 data collection techniques you selected. Lastly, what collection techniques do you prefer and why?

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Creating Company E-mail/WIFI/Internet Use Policies

Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment.

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Requirements:

– 2 pages

– No plagiarism 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Research paper subject data mining

 

discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

AB3

Be able to discuss the history of labor unions in 250 words with 2 references 

ERM Implementation at IT Organization

  

Read chapter 25, Considering an IT organization you are familiar with, describe how the same ERM techniques from this week’s use case (chapter 25) could be used to mitigate risks. If you do not think the same ERM techniques can be used in the organization explain why or create a proposed set of ERM techniques that could help mitigate risks identified. Be sure not to use a use case from a previous lesson.

Be sure to include the following requirements in the paper: 

   – Brief description of the organization and proposed risks

   – Rationale if the same ERM models and/or techniques can be used in the organization to mitigate risks identified.

   – If the ERM techniques described from the use case cannot be used, explain why, and propose ERM techniques that could be used to mitigate risks identified. 

Your paper should be 2-3 pages not including the title and reference pages and written according to APA formatting. Must include in-text citations and textbook as a reference. 

DQ

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.