create a tikz graphs based on attached pictures

create a tikz based on attached pictures.

 Make sure all the content is in one tikzpicture environment.  Do
         not create more than one tikzpicture environment.
         b. Do not use section heading (section{…}) for any text.

1.a: The black words and red words in the green box should be aligned:
         one red symbol under each word, you can use a tabular environment for
         this.  Same for the last box with black and blue text.
        .

1.b:  The three boxes in the bottom row should still be aligned in one row.

2: The “axis labels” (search/discover/structured data/etc) should be
         where they are in the original picture.  And the labels should be in
         one node (Search (goal-oriented) in one node, Discover (opportunistic)
         in another node, etc)

discussion question 1

Please respond to the following:

  • According to the textbook, one of the toughest problems in investigating systems requirements is ensuring that they are complete and comprehensive. Imagine that you are a systems analyst. Decide the primary way in which you would ensure that you secure the necessary information during an interview session with a client.
  • Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.

Develop a disaster recovery plan using ISO 27031 or ISO 24762 template

 Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements: 100% original content

  • Be approximately 4 to 6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.

Data Structures & Algorithms Graphs

Assignment 5: Graphs

Family tree’s and genealogy software has become more and more prevalent in recent years. From the name you might expect that a family tree would be easily represented by a tree structure, but that is not the case! A more appropriate data structure to

represent a family tree would be a type of graph. Using the description of the family that accompanies this assignment, you must represent this family using a graph structure. The graph needs to be a weighted graph. The weights will constitute the types of

relationships, I recommend using some kind mapping between numbers and strings to represent the relationships. When adding family members to the graph, this can be done programmatically for the provided family members within the description file.

Additionally, I also want there to be an interface in which a user can create a new family member and add them to the tree. This can be a simple CLI where the user provides a name, gender, and age to create a person. Then another simple CLI where they select

which member of the family they want the original relationship to be with and what kind of relationship it should be. Finally, they can edit the family member using another CLI and selecting the family member they wish to edit, the operation they wish to

perform (edit name, edit age, edit relationship), and then add new relationship between family members which can call a function that you create in order to add the original relationship. Remember the DRY philosophy, where code can be modularized or made

into a function, it should be if you plan on using the logic again.

Finally, I want you to make data assertions within the FamilyTree class that enforce certain “rules” that exist in a typical human family. An example would be a person should not have any kind of relationship to itself (a person can not marry themselves, a person

can not be their own brother, sister, father, mother, etc.). There should be at least 3 data assertions. These should exists as part of the family tree, not as part of the graph.

As a hint, for a successful design: I would recommend using layers of abstraction. Your graph class is the backing structure to the family tree class. Your family tree should implement methods that interface with the graph class, i.e. add_family_member() should

call the constructor to create a node and then call a function within the graph class to add a node to the graph. Then using the relationships function parameter, you can add edges to the graph between the new nodes and the existing nodes. The family tree

should be what enforces what relationships can exist through the data assertions, the graph does not care about what relationships are made between family members. Your functions that the user would interface with would be greatly reduced compared to the

total number of methods within the classes themselves. The user should be able to add, remove, and modify family members and that’s about it. Therefore those should be your function calls.

Submission Goals

(120 pts.) Create a FamilyTree class that will represent a family tree for a given family.

The class should contain several types of relationships that commonly happen within a family (siblings, marriage, offspring, etc.)

(40 pts.) Programmatically add the family members to the graph as described by the accompanying family description file.

(40 pts.) Give data assertions to the FamilyTree class to enforce restrictions for basic family structure (at least 3); i.e A person can not marry themselves.

(40 pts.) Provide a simple CLI the enables users to add, remove, and edit family members.

* Note that there is a total of 240 points on the table here. The assignment is only worth 200 points. You have 40 points of optional goals.

Your

Datamining Disussion:cluster of objects from a binary transaction data set.

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Please ensure to use APA7 for your references and citations as you support your initial post.

Initial posts are to be 250 words minimum and are due by Thursday.

Replies (2) are 150 words minimum and are due by Sunday.

Discussion 66

 

Murder Case

Preamble

An organization system administrator was labeled as the key suspect in a homicide case. The accused claimed that he was at work at the time of the murder. 

Police Intervention

The police asked his employer to help them verify his alibi. Unpredictably, the same organization, occasionally trained law enforcement personnel to investigate computer crimes and was eager to help in the investigation. 

Collaborative Strength: 

The organization worked with police to assemble an investigative team, seized the suspect computers in his office and residence, and backup tapes on a file server managed by his employer. All of these evidence were stored in a room to where only members of the team had access. 

Harsh Situation

At the initial stages, the operation appeared reasonably well documented, but the reconstruction process was a disaster. The investigators made so many omissions and mistakes that one computer expert when reading the investigator’s logs, suggested that the fundamental mistake was that the investigators locked all of the smart people out of the room. The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up.

As a result of the investigators’ omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.

Lesson Learned

  • The case amplifies forensic investigators’ requirements to obtain fundamental knowledge of computers, compatible operating systems, and application software programs.
  • Forewarning forensic investigators to seek the assistance of the system administrator during the criminal investigation. 

Scenario 

  • You have been retained as a Deputy Technology officer at the University and charged with the responsibility of developing an Acceptable User Policy for the department of computer science based on this murder case.
  • Question 1
  • Use the AUP to amplify the advantages and disadvantages of investigators’ quarterly training on most currently used operating systems such as Microsoft Windows, Macintosh, UNIX, Linux, Sun System, and more. 

Scenario 2

  • The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up. As a result of such omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
  • Question 2 “Investigators allowed the Murderer to go free.”

2:1. Defend the impasse of the investigator’s unwillingness to admit the slip-up?

2:2 Use the Acceptable User Policy to amplify why the murderer was allowed to go free and penalties for violations.

USE The Following attached file, called Technology Acceptable User Plolycy

Discuss the key components of human resource management

 

  1. Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.
  2. Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
  3. How do leaders select the best talent? What are some tools they can use to select the best-talent?

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive. Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread. Please ensure to use information from your readings and other sources from the UC Library. Use APA references and in-text citations.