Security Awareness

  

Company Description (Tech Lopes)

Tech Lopes delivers expert level IT support. We handle both software and hardware issues, as well as general maintenance and IT consultation. We have IT experts ready to provide assistance and results on data recovery, hardware repair, virus removal, and general IT support. We work with all brands of computers, smartphones and tablets in relation to both hardware and software.

Mission: 

Our mission is to provide fast, expert level IT Support and educate our customers on simple IT solutions.

Vision:

Our vision is to become the most reliable IT Support Company for consumers, and small businesses. 

QUESTIONS;

Create an Information Security Strategy Plan. Use the following outline. For each section use the heading provided and address each bulleted point.

IS Mission Statement

· Explain why you are creating this plan and what the security department hopes to achieve for the business by its implementation.

Introduction 

· Explain how this document will set priorities for the entire organization and provide standards and guidelines for reducing risk associated with computing environments.

Governance

· Explain what Information Technology roles your organization has (CIO, CISO, CISSO, etc.) and their descriptions and responsibilities. Who is leading the efforts outlined in this plan?

Strategic Objectives

· Outline strategic objectives that define where your organization needs to be to effectively manage security risks to its information assets such as:

o Data Loss Prevention

o Risk Management

o Crisis and Security Incident Management

Key Initiatives

· Expound upon programs that can be implemented to meet your strategic objectives. Include a description of each, and explain what objectives the program enables as well as its key benefits.

· Example: Initiative 1 – Information Security Awareness Training 

o Enables Objectives – Data loss prevention, improved security of system and network services, proactive risk management and crisis and security incident management 

Description – Make available information security awareness training, which serves to inform employees of their responsibilities for protecting the information in their care. To further engage the user community, the security office will work to develop a variety of information-sharing forums to include electronic and live mediums. 

o Key Benefits 

§ Better awareness of security threats and their impact on information assets 

§ Fewer security incidents 

§ Common knowledge for all staff

Exp22_Excel_Ch06_Cumulative – AutoSales 1.1

Exp22_Excel_Ch06_Cumulative – AutoSales 1.1

Exp22 Excel Ch06 Cumulative AutoSales 1.1

Excel Chapter 6 Cumulative – AutoSales

  

Project Description:

You are the finance manager for Grossman Auto Sales. Your company offers in-house financing and as part of your duties you create reports detailing purchase options. You want to create a report to determine the optimal purchase price of a vehicle based on your customer’s budget. You also want to create one- and two-variable data tables to provide detailed payment options based on varying interest rates and down payments.

     

Download and open the file named   Exp19_Excel_Ch06_Cumulative_AutoSales.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Create appropriate range names   for Purchase Price (cell C5), Sales Tax (cell C6), Down Payment (cell C7),   Months Financed (C8), APR (cell C9), Down Payment Amount (cell C12), Amount   Financed (cell C13), and Tax Owed   (cell C14). Create the range names using the Create from Selection method,   using the values in the left column. 

 

Edit the existing name range   Tax_Owed to display as Tax. Note, Mac users, in the Define Name dialog box, add the new   named range, and delete the original one.

 

Apply the range names to the   existing formulas and functions in the worksheet.

 

Create a new worksheet labeled Range Names, paste the newly created range   name information in cell A1, and then resize the columns as needed for proper   display.

 

Use Goal Seek to determine the   optimal purchase price to reach a $500 monthly payment with all other variables remaining   unchanged. 

 

Start in cell E5. Complete the   series of substitution values ranging from $20,000 to $75,000 at increments   of $5,000 vertically down column E. Apply Comma Style format to the range   E5:E16 with two decimal points and preserve the thick bottom border on row   16.

 

Enter references to the Down   Payment Amount, Tax Owed, and Monthly Payment (Cells F4, G4, and H4) in the   correct location for a one-variable data table. Use range names where   indicated. 

 

Complete the one-variable data   table and format the results with Comma Style with no decimal places. 

 

Apply Custom number formats to   cell F4:H4 that displays the text Down Payment in cell F4, Tax in G4, and Monthly Pmt in cell H4. Bold and center the   headings and substitution values.

 

Copy the purchase price   substitution values from the one-variable data table and paste the values   starting in cell J5. Adjust the width of column J as needed.

 

Type 5000 in cell K4. Complete the series of substitution   values from $5,000 to $15,000 at $5,000 increments. Apply Accounting Number   Format to the range K4:M4.

 

Enter the reference to the   Monthly Payment function in the correct location for a two-variable data   table.

 

Complete the two-variable data   table and apply Comma Style to the range K5:M16 with no decimal places.

 

Apply a Custom number format to   make the formula reference display as the descriptive column heading Purchase   Price. Bold the   headings in cells J4:M4.

 

Create a scenario named Best Case, using Purchase Price and   Months Financed. Enter these values for the scenario: 40000, and 36.

 

Create a second scenario named Worst Case, using the same changing cells.   Enter these values for the scenario: 50000, and 72.

 

Create a third scenario named Most Likely, using the same changing cells.   Enter these values for the ­scenario: 45000, and 60.

 

Generate a Scenario Summary report   based on Monthly Payment. Be sure to use best practice in formatting the   report by deleting Column A:B, Row 1, and the Current Values column.

 

Load the Solver add-in if it is   not already loaded. Set the objective to calculate a Monthly Payment of $500.

 

Use Purchase Price and Months   Financed as changing variable cells.

 

Set constraints to ensure the   Purchase Price is less than or equal to $50,000, greater than or equal to $30,000, and a whole number. 

 

Set constraints to ensure months   financed are less than or equal to 72, greater than or equal to 24, and a whole number.

 

Solve the problem and save the   results. Generate the Answer Report. If you get an internal memory error   message, remove Solver as an add-in, close the workbook, open the workbook,   add Solver in again, and finish using Solver.

 

Save and close Exp22_Excel_Ch06_Cum_AutoSales.xlsx.   Exit Excel. Submit the file as directed.

Discussion

1. What is “Partition” and it function? What is required before OS can be installed?  

2.What is “File System” and what does it do for computer?

3.Describe the 7 file attributes in computer file System and what are the 6 Operations performed on Directory? 

4. Review scholarly articles and reputable resources and discuss what are the latest technology/software for intrusion detection and prevention techniques.

Please  list  your references/resources.

Research Paper: Blockchain

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?Your paper should meet the following requirements:

  • Be approximately four to five pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Enterprise risk management 5 Research

 

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Health and Genetic Privacy

HIPAA.  Most people in the U.S. today have heard of this acronym even if they don’t know what it means.  Given that medical professionals are required to ask patients to review and sign HIPAA disclosures about the sharing of their privacy data, this week we’ll focus on electronic medical records (EMR).  Your task is to research the EMR issue and identify the “good, the bad, and the ugly” of EMR practices.  

  1. What’s the “up” side of using EMR?
  2. What’s the “down” side of using EMR?
  3. Is it easier to commit a crime with EMR?
  4. Is it easier to detect EMR crimes than it is paper-based crimes?
  5. Will EMR reduce costs or increase them?
  6. How do EMR systems impact HIPAA?

Be specific.  Find and cite specific examples.  

Discussion question, 350 words and 2 references.

Pease list in order of your preference the five top areas in which you think computer-based laws should be passed or strengthened by legislatures, and a brief description of  why you chose this law and its ranking. 

Note: Student lists in order 5 laws which should be passed or strengthened