Information Governance Week – 4 -1

 According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. 

 At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library

— 500 Words 

discussion_week5

Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

Submission ○ For each problem below, submit file(s) electronically to Blackboard according to description.

 Grading Guideline ● Your code should execute. For code with errors executing, points will be deducted. ● Keep code clean, unclean code will get points deducted. Unused lines of code or debugging prints should be removed before submitting. Repeated lines or functionalities should be avoided. You may lose points if code has repeating lines. (for example, you may calculated “prices” already, but later you calculated it again, is considered repeating code) ● Variable Naming: use variable names that make sense, avoid built-in and reserved keywords. 

Assignment-Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

IT 203 8

 Describe an ethical dilemma related to information technology and business management. Look at it from multiple points of view and tell about your ethical solution. Examples of topics: security and liability, privacy, misuse of personal information, HIPAA law, etc. Submit one and a half to two pages in APA format with references. 

PLEC Week 8

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Final

 Please make  posts on the lessons learned for the Into to Data Mining course