Contingency Planning

Contingency PlanningContingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Digital forensics and how it could be used in a risk management program?

  

Articles:

 

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019  IEEE 12th International Conference on Global Security, Safety and  Sustainability (ICGS3), Global Security, Safety and Sustainability  (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S.  (2016). Metrics Based Risk Assessment and Management of Digital  Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

The readings this week expand on investigation and of digital  forensic analysis and investigations. Organizations, especially those in  the public, health and educational areas are bound by legal and  statutory requirements to protect data and private information,  therefore digital forensics analysis will be very beneficial when  security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

BI_Assignment_3

Discussion: 
1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.
2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
4. What are the most common metrics that make for analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education,
climate to public safety. Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site.
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
 

Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
 

Python Coding (list and loops)

 

Instructions:

You will complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly. You will download it from this site.

You will code the following and submit it in one file. Use the information in the Lessons area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

  • Create a comment block (starts at line 1 in the code) with the following information:

Joshua Kreider

Week 8

26DEC2020

  • Problem 1: Create a list (or tuple only, no dictionary) that contains the months of the year. ( do not hardcode the month number)
  • Problem 2: Create a loop to print the number and the months of the year from the list. 
  •      The output should like this:

Month 1 is January

Month 2 is February

….

….

Month 12 is December

java

he chart below lists the 2020 season passes for skiers at the Massanutten Ski Resort theme park in Massanutten, VA. You must write a program that calculates the season ticket price for a customer who may be purchasing as an individual or for a family. First, you must ask the customer for their last name as input into the program. Then, you must ask the user if they are purchasing a Family Pass or Individual Pass. If they are purchasing a Family Pass, then you need to display the menu options for purchasing a Special Value Pass for Family of 4 or Full Season Pass for Family of 4. If they are purchasing an Individual Pass, then you need to display the menu options for purchasing a Special Value Pass or Full Season Pass or Student Full Season Pass. After the pass is chosen by the user, you will need to ask the customer if they are active duty military or a veteran since a military discount will be given for 10% off of any pass purchased. You will need to calculate the military discount amount for those receiving it. You will need to calculate the Final Price by taking the price for the pass that the customer has chosen less the military discount amount. Display details to the customer that include the customer name, pass purchased, pass price, military discount amount given if any, and the final price. See the test cases below to see the exact order of menus to use when writing the program. You will need to format monetary amounts with 2 decimal places. This requires use of the printf command to create the columns and control decimal places. You must ensure that if the user enters lower case or upper case responses, that your decision structures will process the customer correctly. You must use a char data types and string data types in the menus as shown.

BI_Assignment_1

 

Complete the following assignment in one MS word document:

Chapter 1 –discussion question #1 & exercises 9 and 15 (limit to one page of analysis for question 15)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

Discussion question #1:

Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources

Exercise 9:

Go to microstrategy.com Find information on the five styles of BI. Prepare a summary table for each style.

Exercise 15:

Visit the Million Song Dataset(http://millionsondataset.com/), search the collection, and download a few titles. How are the songs indexed, and how would you download the entire database?
 

Discussion

 

Create a discussion thread to answer the following question:

The protections from the security software must continue when the device is taken off the network, such as when it is off-grid, or in airplane mode and similar. Still, much of the time, software writers can expect the device to be online and connected, not only to a local network but to the World Wide Web, as well. Web traffic, as we have seen, has its own peculiar set of security challenges. What are the challenges for an always connected, but highly personalized device? 

cs

 

Directions

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Divide your student ID by 26, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for this online discussion.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

Week 10 Discussion – Cyber Law

Discussion on Social media:

Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.

Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 450 words. Please add references in APA format.