Enterprise Risk Management

 Textbook : 

 https://books.google.com/books?id=LOHhBQAAQBAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=snippet&q=532&f=false 

There are 4 questions and each question is worth 25 points and they are as follows:

1) Using the Chapter 27 Case Study, Nerds Galore, develop a Risk matrix for the HR-related risks on p. 532.  For each of the Risks in your matrix justify your decision as to their placement on the Risk matrix.

2) Embedding Strategic ERM into Strategic Planning is an important means to implement ERM for an organization.  Develop a Cause and Effect (Ishikawa) chart that would show the factors needed to make a decision to include ERM in Strategic Planning.  Provide a description explaining your chart?

3) Using the case study from Chapter 14 on Zurich Insurance, explain how Zurich’s Capital Management Program supports ERM and provide examples of where Zurich created new value with their ERM program?

4) What are at least 3 Traditional Risk Management practices that are included in ERM?  Clearly define the traditional risk management practice and how it fits with ERM.  Adequate support including applicable case study examples from your text can be applied.

Grading:

Each question is graded on content, how well you address the question, and on good academic writing as follows:

1) 15 points on question response content (written word, diagrams, etc.)

2) 5 points on maintaining focus by keeping to the question, its content, and not providing unneeded material.

3) 5 points on good collegiate academic writing.

Extra Credit Question:  By responding to the extra credit question correctly and as per instructions, 5 points will be added to the final exam score.  There will be no partial extra credit awarded.  Provide your answer at the bottom of your last page of the final exam document and label it as: “My Extra Credit:”  Respond to the following question in 50 – 100 words: What is the most important thing I learned in the course and why?

Thesis

Task-1:

Provide an outline for your Chapter 2.  Also write the Introduction to the Topic of your dissertation centered on the Problem for your research.

Task-2:

Provide 4 pages for Chapter 2 – discuss the dissertation topic and brief introduction to the literature review as well as develop a PPT for presentation

Please provide a PPT for the following information as well as

• What is the problem statement for your dissertation:
• Gaps in Literature
• What is your theory?
• Re search questions ?
• Geographical Area/Demographics
• Background information
• Importance of the topic
Which Methodology are you using? Quantitative or Qualitative

2 Discussions and 1 case study

Discussion 6.1

What can you do using a Raspberry Pi?    Why would you use one?  Is there another devise that you believe be better?  Why or why not?  If so, what is it? 

Discussion 6.2

Discuss what spear phishing is in your own words.  Pretend you are explaining it to someone who has no idea about it.  How are Trojans used during spear phishing?  What is the worst damage can they do?  Why?   

Case Study 6.1

Write a 2 to 3 page paper picking a particular area to monitor and come up with a way you can use the Raspberry Pi to monitor the area. Provide some creative ways you would use the Raspberry Pi . In addition How would you use the Raspberry Pi in Spear Fishing?  Make sure you adhere to the grading rubric and write the report in APA format.  

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited 
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

Weekly Summary 6.1

Due: Sunday, End of Module by 11:55 p.m. EST

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

APA formating and NO PLAGIARISM 

Threat Model

 Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (” Do not copy and paste images from the Internet, I need 100% original work, no plagiarism is encouraged or tolerated” ). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately 2 to 3 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Develop the C or C++ source code required to solve the following problem

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Assignment #3

Lexical Analyzer

Develop the C or C++ source code required to solve the following problem.

Problem

Develop a lexical analyzer in C or C++ that can identify lexemes and tokens found in a source code file provided by the user. Once the analyzer has identified the lexemes of the language and matched them to a token group, the program should print each lexeme / token pair to the screen.

The source code file provided by the user will be written in a new programming language called “DanC” and is based upon the following grammar (in BNF):

P ::= S S ::= V:=E | read(V) | write(V) | while C do S od | S;S C ::= E < E | E > E | E = E | E <> E | E <= E | E >= E E ::= T | E + T | E – T T ::= F | T * F | T / F F ::= (E) | N | V V ::= a | b | … | y | z | aV | bV | … | yV | zV N ::= 0 | 1 | … | 8 | 9 | 0N | 1N | … | 8N | 9N

Your analyzer should accept the source code file as a required command line argument and display an appropriate error message if the argument is not provided or the file does not exist. The command to run your application will look something like this:

Form: danc_analyzer

Example: danc_analyzer test_file.danc

Lexeme formation is guided using the BNF rules / grammar above. Your application should output each lexeme and its associated token. Invalid lexemes should output UNKNOWN as their token group. The following token names should be used to identify each valid lexeme:

Lexeme

Token

Lexeme

Token

Lexeme

Token := ASSIGN_OP + ADD_OP do KEY_DO

<

LESSER_OP

SUB_OP

od

KEY_OD > GREATER_OP * MULT_OP IDENT

=

EQUAL_OP

/

DIV_OP

INT_LIT <> NEQUAL_OP read KEY_READ ( LEFT_PAREN

<=

LEQUAL_OP

write

KEY_WRITE

)

RIGHT_PAREN >= GEQUAL_OP while KEY_WHILE ; SEMICOLON

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Additional Solution Rules

Your solution must conform to the following rules:

1) Your solution should be able to use whitespace, tabs, and end of line characters as delimiters between lexemes, however your solution should ignore these characters and not report them as lexemes nor should it require these characters to delimit lexemes of different types.

a. Example: “while i<=n do”

i. This line will generate 5 lexemes “while”, “i”, “<=”, “n”, and “do”.

ii. This means the space between “while” and “i” separated the two lexemes but wasn’t a lexeme itself.

iii. This also means that no space is required between the lexemes “i”, “<=”, and “n”.

2) Your solution should print out “DanC Analyzer :: R<#>” on the first line of output. The double colon “::” is required for correct grading of your submission.

3) Your solution must be tested to ensure compatibility with the GNU C/C++ compiler version 5.4.0.

4) Lexemes that do not match to a known token should be reported as an “UNKNOWN” token. This should not stop execution of your program or generate an error message.

Hints

1) Draw inspiration by looking at the lexical analyzer code discussed and distributed in class.

2) Start by focusing on writing the program in your usual C/C++ development environment.

3) Once your solution is correct, then work on testing it in Linux using the appropriate version of the GNU compiler (gcc).

4) Linux/Makefile tutorials:

a. Linux Video walkthrough: http://www.depts.ttu.edu/hpcc/about/training.php#intro_linux

b. Linux Text walkthrough: http://www.ee.surrey.ac.uk/Teaching/Unix/

c. Makefile tutorial: https://www.tutorialspoint.com/makefile/index.htm

What to turn in to BlackBoard

A zip archive (.zip) containing the following files:

___Assignment3.c / ___Assignment3.cpp

o C/C++ Source code file

o Example: Eric_Rees_R123456_Assignment3.c

• Makefile

o A makefile for compiling your C/C++ file.

o This makefile must work in the HPCC environment to compile your source code file and output an executable named danc_analyzer.

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Example Execution

The example execution below was run on Quanah, one of the HPCC clusters. It shows all the commands used to compile and execute my analyzer. Bolded text is text from the Linux OS, text in red are the commands I typed and executed, and the text in blue represents the output from each step.

quanah:/assignment_3$ make clean

rm -f danc_analyzer

quanah:/assignment_3$ make

gcc -o danc_analyzer Eric_Rees_R123456_Assignment3.c

quanah:/assignment_3$ ./danc_analyzer test.danc

DanC Analyzer :: R123456

f IDENT

:= ASSIGN_OP

1 INT_LIT

; SEMICOLON

i IDENT

:= ASSIGN_OP

1 INT_LIT

; SEMICOLON

read KEY_READ

( LEFT_PAREN

n IDENT

) RIGHT_PAREN

; SEMICOLON

while KEY_WHILE

i IDENT

<= LEQUAL_OP

n IDENT

do KEY_DO

f IDENT

:= ASSIGN_OP

f IDENT

* MULT_OP

i IDENT

; SEMICOLON

i IDENT

:= ASSIGN_OP

i IDENT

+ ADD_OP

1 INT_LIT

od KEY_OD

; SEMICOLON

Python Assignment

  airports = [{‘name’: ‘Cincinnati’, ‘altitude’: 2000, ‘code’: ‘CVG’}, {‘name’: ‘Chicago’, ‘altitude’: 1800, ‘code’: ‘OHA’}, {‘name’: ‘Indianapolis’, ‘altitude’: 1700, ‘code’: ‘INY’}]

1. Given the “airports” list above, create 3 lists, one of the airport names, one of the airport altitudes and one of airport codes using for loops… using list comprehensions…using another technique

2. Given the 3 lists from #1, combine them back into a list of dictionaries using the most efficient technique you can think of

3. Given the “airports” list above, find the total combined altitude using for loops… using the sum() function… using the reduce() function.

PLEASE PROVIDE PYTHON 2.X/3.X CODE FOR SOLVING THE EXERCISES ABOVE.

1 Discussion Case Study Lab Work and Weekly Summary

Discussion 7.1

Complete Chapter 9, C12 conceptual question (page 406 from textbook).

Discussion writing requirements

  • 150 words (Excluding the references)
  • List References and Citations

Case Study 7.1 – Full 3 Pages In length excluding References.

  • Read the Case Study: 9.2 and 9.3
  • Write a summary analysis and answer the questions. 

Case study writing requirements

  • 3 pages in length  (excluding cover page, abstract, and reference list)
  • Follow full APA format
  • List References and Citations

Lab 5

Complete the following problems by Thursday
Chapter 9 – Problem #53 and Problem #54 (page 406 from textbook)

Lab writing requirements

  • The assignment must be an APA formatted paper with embedded excel files and screenshots from excel calculation
  • Follow full APA format
  • List References and Citations

Weekly Summary 7.1

Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture.

Writing Requirements

cys-d-11

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 300 words

Discussion

 What are some of the benefits and drawbacks of using smart device automation (Smart home, Alexa, Google, etc)?