Response to Peers – Week 5 – Info tech

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion

R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?

Discussion Length (word count): At least 250 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.

CC-4

 

Discuss, in your own words using 500 words or more, how the business process as a service (BPaaS) reduces the risk for commercial enterprises. 

 Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.  

Block chain discussion and replies

In chapter 6, the author describes basic components of a business network. Create a new thread, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion. 

You must do the following:

1) Create a new thread. As indicated above, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

  • Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

  • I agree with you about …
  • I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

  • I can connect with you about …
  • I once read a story about …
  • I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

Remember that ALL discussions must use the 3CQ approach to interaction.

Discussion: Enterprise Risk Management – ITS835

subject name: Enterprise Risk Management – ITS835

word count:300+

Chapter 14  case study provides a broad spectrum of issues—both opportunities and potential threats—that arise from creating growth opportunities. Many risks can be explored and debated as part of various approaches to enterprise risk management (ERM), including using strengths, weaknesses, opportunities, and threats (SWOT) analysis and risk profiles.

For this discussion, consider the following two questions:

How do Zurich ERM tools help them better understand their existing and emerging risks?

Why is it important to include a Business Resilience program in your organization’s ERM program?

Additional details for the discussion:

Student should complete all required portions of the discussion assignment. Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct. Proper use of APA formatting. Properly and explicitly cited outside resources. Reference list matches citations and Plagiarism check required. 

Textbook(s) Required:

Fraser, J., Simkins, B., & Narvaez, K. (2014). Implementing enterprise risk management: Case studies and best practices. John Wiley & Sons

discussion 2 21

  1. This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 
    Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.
    Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.
    The paper should meet the following requirements:

    • 3 pages in length (not including title page or references)
    • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
    • A minimum of five peer-reviewed journal articles.
    • The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Research Paper

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 5-8 pages long, including both a title page and a references page (for a total of 7-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 5-8 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles from the UC library to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat Hunting

  

Your team currently works as a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number(Port22), a series of attacks that has been identified, or an IP address to research and identify.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:

· Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.

· Step 2:  You will provide this answer based on your research.

· Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.

· Step 4:  You will provide this answer based on your research.

· Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.

· Step 6-7:  Calculate

· Step 8:  Assume Moderate

· Step 9:  Assume Moderate

· Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

Java Script

 

  1. Create a directory for the Javascript challenge. Use the folder names to correspond to the challenges: UFO-level-1 and UFO-level-2.
  2. Add your html files to this folder as well as your static folder containing your javascript. This will be the main script to run for analysis.

Level 1: Automatic Table and Date Search 

  • Create a basic HTML web page or use the index.html file provided (we recommend building your own custom page!).
  • Using the UFO dataset provided in the form of an array of JavaScript objects, write code that appends a table to your web page and then adds new rows of data for each UFO sighting.
    • Make sure you have a column for date/time, city, state, country, shape, and comment at the very least.
  • Use a date form in your HTML document and write JavaScript code that will listen for events and search through the date/time column to find rows that match user input.

Level 2: Multiple Search Categories 

  • Complete all of Level 1 criteria.
  • Using multiple input tags and/or select dropdowns, write JavaScript code so the user can to set multiple filters and search for UFO sightings using the following criteria based on the table columns:
    1. date/time
    2. city
    3. state
    4. country
    5. shape