PLEC14

 

Discuss each question in a paragraph of at least five sentences. Include the question and number your answers accordingly

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

CIA

In 80 words or more provide examples for security controls for each leg of the CIA (confidentiality, integrity, availability) Triad? And which does Ransomware impact? What are the security controls (i.e., countermeasures/safeguards) to prevent or minimize the impact of a successful Ransomware attack?

Research paper for inferential statistics in decision making

1. Title page ( Article…….)

2. T-test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis 

Results of the test

3. Anova test (2 pages) 

Half page introduction(article) 

Image should be like statistical graph

Analysis 

Results of the test

4. chi square test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis 

Results of the test

5. 1 sample proportion test

Half page introduction(article) 

Image should be like statistical graph

Analysis 

Results of the test

6. correlation test

Half page introduction(article) 

Image should be like statistical graph

Test Analysis 

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 10 pages

Cyber security Managment

 

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

bdawk6paper

 

Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Assignment (Paper 2)

In Paper 1 you discussed information security issues faced by organizations and described threats to information assets. Your assignment for Paper 2 is to analyze specific countermeasures for each of the threats you described in your Paper 1.

The requirements for the paper are as follows:

  • The paper should include a minimum of five peer-reviewed scholarly references published since 2015
  • Citations and references should be in APA format
  • The paper should be a minimum of 2000 words
  • The SafeAssign score of the paper should be less than 20%

Comment – Added Paper-1 for reference.

Residency Project

  

•Find a company that has suffered a security breach in 2019. Provide background information on the company such as the type of business, their services, public or private, locations, etc. The reader should have a good understanding of the company after reading the bio. Next, provide information on the security breach; the Who, What, When, Where, Why, and How. 

•Create an Incident Response Plan (IRP) for the company. You can use the breach as a foundation if desired. The IRP should be a professionally looking document that is included as an attachment.

•Create a Disaster Recovery Plan (DRP) for the company. Again, you can use the previous breach as a foundation if desired. The DRP should be a professionally looking document that is included as an attachment.

Prepare an 8 page APA style paper

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer-reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. Remember to use APA formatted headings for each section of the paper and provided in-text citations of the sources you use. This paper should address the following questions: 

(1) Does Blockchain technology have the potential to cause the paradigm shift in business practices that many experts are predicting? Explain why or why not.  Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way HR is practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of human resource management could be most impacted by Blockchain technology? How might the HR functions change? Support your answer with research.

Course writing requirements:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and a reference page with ALL submissions (even initial discussion posts)
  • Provide the EXACT web link on the reference page citations for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second-person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a PowerPoint is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Discussion

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a narrative description of your choices and explain why you made your choices. Also, describe what advantages do your choices have over the others. Lastly, provide an example that illustrates how you would use your chosen visualizations.

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.