Security Risk Assessments Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

What is a Security Risk Assessment?
A security risk assessment identifies, assesses, and implements security controls within company assets (data, hardware, software, etc.). Threats and vulnerabilities are the main fucus of that risk and the assessment helps to minimize the risk by implementing controls.

What elements does it entail?
There are five elements that include risk analysis, identifying risks to manage, selecting controls, implementing and testing controls, and evaluating the controls.

Does it include or exclude Penetration Testing?
Penetration testing is a type of security risk assessment. This type of testing attempts to evaluate the security of an IT infrastructure by attempting to exploit vulnerabilities in a safe way.

What types of Security Risk Assessments exists? Identify at least 3.
Facility physical vulnerability, information systems vulnerability, and proprietary information risk.

-ROSE

RESPONSE 2:

1. Security Risk Assessments happen on multiple levels. First, identify the IT assets and their significance to an organization, then distinguish the threats and vulnerabilities to the assets and prioritize them. Next, recognizing the probability that one of these vulnerabilities will be abused will ultimately identify the consequence of the risk. Finally, whichever risk is highest should be fixed first. 

2. The elements entailed in a Security Risk Assessment are assessing the risks, identifying risks to manage, selecting controls, implementing and testing the controls, and evaluating controls.  

3. Security Risk Assessments do include Penetration Testing. These tests are used for external networks, Websites, and Web applications and also for internal networks. 

4. Three types of Security Risk Assessments are insider threats posed by people inside the organization, information systems vulnerabilities that can be introduced via malware, backdoor programs, or phishing attacks, and proprietary information risk, which are trade secrets of an organization that could be detrimental if leaked. Joshua

Computer

 create a spreadsheet for your employees as a managerial nurse.

This spreadsheet must have 10 entries with job descriptions

Must have an hourly rate for each entry

Must have hours worked for the week

Must have total wages earned done with formula  (I will check)

Must have chart with information 

I uploaded an example.

Exp19_Excel_Ch06_HOEAssessment_Scholarship_Dinner

 Exp19_Excel_Ch06_HOEAssessment_Scholarship_Dinner 

 Exp19 Excel Ch06 HOEAssessment Scholarship Dinner

Excel Chapter 6 Hands-On Exercise Assessment – Scholarship Dinner

  

Project Description:

You have recently been elected social coordinator for your University’s student government association. As part of your duties, you are required to plan an annual scholarship dinner. The dinner is a fundraiser in which the proceeds are used to fund scholarships. You will perform What-If Analysis to calculate the budget information required for the event to be successful.

     

Start Excel. Download   and open the file named Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Create range names   based on the left columns in the ranges A4:B9, A20:B20, and A30:B30. 

 

Edit the named range of_Guests_Using_Valet to Guests_Using_Valet.

 

Enter a formula in   cell B27 using Named Ranges to calculate projected cost of catering. The cost   of catering is the cost per meal * the total number of tickets sold.

 

Enter a formula in   cell B28 using Named Ranges to calculate total cost for room setup.

 

Enter a formula in   cell B29 using Named Ranges to calculate the total valet expenses. The total   valet expenses can be calculated by multiplying tickets sold * total guests   using valet * valet cost per car.

 

Use a function to   total all expenses in cell B30.

 

Enter a formula in   cell C32 to calculate the remaining balance (Total_Income – Total_Expenses).

 

Enter a series of   substitution values in the range E5:E20. The values should start at 50 and   increase in increments of 5 stopping at 125.

 

Enter references to   Total_income, Total_Expenses, and Balance in the correct locations (F4, G4,   and H4) for a one-variable data table. Use range names where indicated.

 

Complete the   one-variable data table in the range E4:H20 using cell B5 as the column input   cell, and then format the results with Comma Style.

 

Type Price   in   cell E4 and apply custom number formats to make the formula references appear   as descriptive column headings. In F4, Total Income; in G4, Total   Expenses,   in H2, Balance

 

Copy the range E5:E20   and paste it in the range J5:J20.

 

Type 400   in   cell K4. Complete the series of substitution values from 400 to 525 in   increments of 25.

 

Enter the reference   to the Balance formula in the correct location for a two-variable data table.

 

Complete the   two-variable data table in the range J4:P20. Use cell B4 as the Row input   cell and B5 as the Column input cell. Format the results with Comma Style   formatting.

 

Apply a custom number   format to make the formula reference appear as a descriptive column heading Price

 

Load the Solver   add-in if it is not already loaded. Set the objective to calculate the   highest Balance possible (C32).

 

Use Tickets Sold   (cell B4) and Ticket Price (cell B5) as changing variable cells. Do not use   range names.

 

Use the Constraints   section of the spreadsheet model to set constraints for minimum ticket price,   maximum ticket price, and ticket sales. The ticket price must be less than or   equal to the maximum ticket price (cell B14). The ticket price must also be   greater than or equal to the minimum ticket price (cell B13). The total   tickets sold must be less than or equal to the ballroom capacity and the   number of tickets sold must be an integer. 

 

Solve the problem.   Generate the Answer Report and Keep Solver Solution.

 

Save and close   Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx. Exit Excel. Submit   the file as directed. 

Crypto Project & Thesis

A crypto project that highlights a thesis and research, in:

NFTs/ Tokenization for physical objects, and their application/impact to building decentralized local communities with IoT technologies.

(10 pages)

110p2

Project Deliverable 2: Risk Assessment Outline and Certification Test Matrix Plan

For this deliverable you will generate the Risk Assessment Outline and the Certification Test Matrix Plan based on the results of the Potential Vulnerabilities Report created in Module 1.

Risk Assessment
Using the format in the Howard text on page 279, develop the Risk Assessment Outline. Insert this document as Appendix 2 in the SSP submitted in Module 1. 

Certification Text Matrix
Using the format in the Howard text on page 285, create a certification test matrix. Insert this as Appendix 3 in the SSP.

WEEK 10

  1. Technical Paper: Proof of Concept (POC)
    Your company is a 4-year-old startup called XYZ Software Enterprises. XYZ produces a point of sale system and was awarded a Proof of Concept (POC) to one of the largest and oldest restaurants in the industry (you know, the ones in the commercials all the time). The restaurant wants XYZ to prove that the software will do what the sales people said it could do.
    Your Proof of Concept will include four parts:

    • Part 1: Gantt Chart.
    • Part 2: Testing and User Acceptance Report.
    • Part 3: Use Case Diagram.
    • Part 4: Activity Diagram.
    • Part 1: Gantt Chart
      A Gantt Chart (see page 353, Figure 11-18 in your textbook) needs to be created for the entire process of the Proof of Concept. There is a two-month deadline from today to complete the POC.
      Using Visio or Excel, create a Gantt Chart that includes all of the items listed below and adds five more tasks minimum from the concepts learned from the course:
    • The initial meeting—today. 
      • Should appear as the first line.
    • Teams selected to participate in the project (1 week).
    • Information gathering (add the information gathering methods you will use and how long each will take).
    • System configurations based on information gathering methods (2 weeks).
    • Create Activity Chart based on information gathering (information to create chart supplied).
    • Create Use Case Diagram based on information gathering (information to create chart supplied).
    • Show the finished configurations to the team and get feedback (1 day).
    • Make changes based on feedback (3 days).
    • Install the system in the test store (2 days).
    • Train staff (1 day).
    • Run a live test of POC (2 weeks).
    • Note: The five or more additional tasks can be sub-tasks for information gathering methods as well some other sub-task or major task not in the initial list.
      You may add items from the SDLC, specific item or items on testing, or any other concept you think should be part of the POC process learned in the course of this semester.
      Note: Remember that events in a Gantt chart can happen at the same time as other events. Some items also cannot start until others are completed. Everything has an estimated time frame and it is displayed in the chart.
      Part 2: Testing and User Acceptance Report
      As part of the expected documentation in the POC, XYZ wants a report on Testing and User Acceptance.
      Your manager is asking you to research the testing criteria they listed in the POC documents.
      The POC document states that they are looking for the following:
    • System and Stress Testing.
    • User Acceptance Testing (UAT).
    • For both categories, research and report on the following:
    1. What these tests are.
    2. Why the industry leader would want these particular tests.
    3. The best ways, in detail, to accomplish the tests so that your company meets the criteria they are looking for.
    4. These items can be added to your Gantt Chart (Part 1).
      Part 3: Use Case Diagram
      The restaurant, as part of the information gathering, outlined a use case in a chart, which is below.
      Your manager assigned you to create the Use Case Diagram using Visio, MS Word, or any other software. (See the diagrams on Page 84 and 85 of the textbook.)
    • Paste the diagram into the created report.
    • USE CASEACTOROrder FoodWaiter, Patron, ChefServe FoodWaiterCook FoodChefPay for foodWaiter, PatronEat FoodPatronPart 4: Activity Diagram
      As a part of the information gathering process, a chart of items was provided by XYZ.
      Your manager has asked that you use Visio, MS Word, or any other software with which you are familiar to create the Activity Diagram (see pages 138 Figure 5-5 and 139 Figure 5-6 in the textbook.)
    • Paste the diagram into the created report.
    •    POS SALES PROCESS       Activity DiagramHost or Hostess seats patronServer takes drink orderServer opens order for table in POS systemServer places drink order in the POS systemSystem sends drink order to the BarBar makes drinksServer brings drinks to tableServer takes food orderServer adds food order in the POS systemOrder goes to kitchenChef and staff cook the orderFood Runner brings food to tableServer takes dessert orderServer adds dessert order to POSChef and Staff create dessertsFood Runner brings desserts to tableServer creates check in POSServer collects payment and enters it in POSServer adds tipped amount to POSServer closes table in POSAdditionally, you must do the following:
    • Use at least 3 quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.
    • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
      The specific course learning outcome associated with this assignment is:
    • Develop a proof of concept of a software system for a potential customer.

Business Analyst Project

  

Digital Transformation at Miroglio Fashion

Fashion industry can be characterized as a hard to predict industry as fashion trends and consumer tastes evolve quickly and continually. This means that both demand forecasting and inventory allocation processes are challenging for the industry. Francesco Cavarero seeks to “bring analytical rigor to the company’s planning and inventory management decisions” leading to a digital transformation. The question becomes can artificial intelligence (AI) and machine learning replace human intuition in this industry? More importantly, how will this impact the current business processes?

He has created a team of analysts to help him in this process. As the team of analysts charged with this task you are required to address the following issues.

1. What would you recommend to Francesco to transform Miroglio’s information systems? Create a visual map for the steps you identify and describe the specific steps for the path that the organization will traverse to transform their information systems. Highlight the assumptions you make and discuss why these steps will help Miroglio be successful in their digital transformation.

2. Please write down the lessons learnt from this project. What challenged you the most and why?

Need 750+ Words With No Plagiarism And 2+ Scholarly References In APA Format

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide outside schoarly sources (for example, an article from the UC Library https://www.ucumberlands.edu/library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

information cascade

 In this problem we will ask whether an information cascade can occur if each individual sees only the choice of his immediate neighbor rather than the choices of all those who have chosen previously. Let’s keep the same setup as in the Information Cascades lecture, except that, when individual i chooses, he considers only his own color and the choice of individual i − 1. 1. Briefly explain why the decision problems faced by individuals 1 and 2 are unchanged by this modification to the information network. 2. Individual 3 observes the choices of individual 2, but not the choice of individual 1. What can 3 infer about 2’s color from 2’s choice? 3. Can 3 infer anything about 1’s color from 2’s choice? Explain. 4. What should 3 do if he picks a red ball and he knows that 2 declared Red? What if 3’s picked ball was blue and 2 declared Red? 5. Do you think that a cascade can form in this world? Explain why or why not. A formal proof is not necessary, a brief argument is sufficient.