Data Analysis

 

the analysis of the data you’ve chosen. The assignment due this week is simply an outline/template for your final presentation in MS PowerPoint format.

You should prepare approximately 15 slides, outline below is suggested:

  • Cover Slide
  • Agenda
  • [Name of Your Data Set] (discuss the data chosen and who would benefit from this analysis)
  • [Visualization slides – at least 8-12 viz’] (display a screenshot of the viz created in Tableau – each of these slides should include not only the viz but also a brief description of it, the trend you’ve found or other important things you’ve found in the data – you will explain in greater detail when you record your presentation for the final submission)
  • [Data Set Dashboard – 1 dashboard] (this will be one dashboard displaying the most important viz’s you created. You will explain in greater detail the dashboard and how it could be used for the identified stakeholders of such data.)
  • Conclusion – based on your findings, what would next steps be to dig into an issue you’ve found, or interesting trends? Are there any predictions that could be implied based on your findings? These are just some questions to help you formulate your conclusion.

Overview

    Overview:

The purpose of the project is to create an incident response/disaster recovery document that can be used by your organization in the event of a perceived or potential threat that may harm your business or employees. First, make sure it is a credible solution since a hurricane disaster plan for a business in Michigan is about as realistic as a loss of power due to a major snow storm at sea level in Hawaii. Yes, it could happen, but the likelihood is very slim. Second, it should be a threat that has a potential for happening such as mechanical failure, natural disaster, human caused and so on. Lastly, make sure it is a business and a geographic location you are familiar with to make this a worthwhile exercise.

Examples of incidents could include, but not be limited to;

Malicious Virus infects a computer

Employee Destruction of Critical Information

ISP provider goes down

City-wide Power Outage

Flooding

Physical break-in with damage and/or theft of major equipment

Paper Requirements:

(1pg) Cover page

Name

Course Number

Date

(~2pgs) Business overview

Current business situation

Customers

Employees

Geographical Location

Potential threats

The purpose of the document

Known threats encountered by other businesses in a similar setting

(5-8pgs) Incident response/disaster recovery/contingency planning

This may include more than one scenario

(1pg) Sources cited page.

APA or other formal documentation method is not required.

All sources must be listed here and cited within the document.

Five to ten sources should be used when putting your plan together.

Incident Response Procedures, Forensics, and Forensic Analysis (Part B)

 

Submit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:

  • Summary of the lab
  • Analysis of the activities performed in the lab and their importance to the course topics
  • How the lab relates to the course and current module topics
  • Related concepts from the module readings and lectures
  • At least one external reference
  • 1-3 pages in length
  • Proper APA formatting and citations
  • Minimum of 1-3 references are required
  • Screens shots are encouraged but should be included as an appendix and not part of the total page count.

Discussion 3- Executing the Project

When acquiring resources and preparing to implement a project, team members can or will take on one of two roles: “Supportive Roles” or “Destructive Roles”.  The project manager must be cognizant of both types of roles, so he/she can manage them.  

The simulation exercises in this course are done as teams(Assume there are 4 team members in the project). State the team number assigned to you, the names of your team members, and the method(s) your team have decided to collaborate for the simulation decisions. When was the last date and time you met with your team members? If you have team members that are taking more of a ‘descrictive role’ or ‘non-supportive role,’ how do you plan on managing that?

Text

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

MyTestDb

Write a query to show customers regardless they have paid any money or not 2. Write a query to show customers regardless they have ordered any products or not. 3. Write a query to show products regardless they have been ordered or not. 4. Write a query to show employees and customers. 5. Write a query to show countries that customers and employees are from (no duplicates) Administration Schemas Query 1 SCHEMAS 1 Q Filter objects Bowling League Modify mysqlTutorialOrg Tables customers employees offices orderdetails orders payments productlines products Views Stored Procedures Functions MyTestDb Object Info Session Schema: mysqlTutorialOrg

Assignment 401

What does the Bible have to say regarding ethical practices in how one approaches doing business? In reading Romans 12:2, we are challenged to transform our minds so that God can focus us toward a good, acceptable, and perfect response to His will. Romans 12:2 states, “Do not conform to the pattern of this world but be transformed by the renewing of your mind. Then you will be able to test and approve what God’s will is—his good, pleasing and perfect will” (New International Version). Also, Micah 6:8 says, “He has shown you, O mortal, what is good. And what does the Lord require of you? To act justly and to love mercy and to walk humbly with your God.”

As an example, Chick-fil-A is known for its stance on operating within biblical principles. The franchise believes it should be closed on Sundays (another example of a business closing on Sunday is Kneaders). Chick-fil-A’s website states that the company believes it is entrusted to be a faithful steward in what God has given the organization as a business. The late founder, Truett Cathy, felt the business did more than just sell chicken sandwiches. His scriptural perspective still permeates every franchise even after his death.

  1. Watch the video “God and Business at a Chick-fil-A.” (https://www.youtube.com/watch?v=O9Lsd2OYa20)
  2. Be sure to address the following prompts in your paper:
    1. Discuss your ethical perspective based on your cultural or religious background.
    2. Describe a situation in your professional experience when you were able to respond ethically or utilize a biblical principle to respond to the situation in doing business.
    3. After watching the video “God and Business at a Chick-fil-A,” how do you think Christian values impact Chick-fil-A’s operation and success?
  3. Your paper should be at least 350 words in length.

Microsoft Word Project

 Purpose:

The purpose of this assignment is for students to use various sources (both print and online) to research a technology-related issue. Students will then write a paper in Microsoft Word that further describes the issue and communicates the student’s position. 

Content Requirements :

Search the Internet for a current technology-related issue/debate. An example of one, “which you cannot use for the project”, might be whether it’s right or wrong for potential employers to require applicants’ Facebook credentials so that they can peer into their personal lives. 

Benchmark – Network Threat Identification

 

To properly defend a given network, Cyber Security Specialists have to be able to identify threats as they appear on a network in order to mitigate their longstanding affects, should they go undetected.

Using a free timeline creator of your choice (must have download capabilities), create a timeline that outlines the history and evolution of cybersecurity threats.

Be sure that the timeline includes the following:

  1. A history of viruses, malware, and other recurring software enigmas
  2. A history and explanation of the birth of ransomware
  3. The evolution of firewalls and other network security defense systems
  4. The initiation of white hat vs. black hat hacking
  5. The evolution of tools (software and hardware) used to mitigate cybersecurity threats
  6. The historical exploits affecting current security architecture and deployment

Then, in a 250- to 500-word document, explain how the evolution of cybersecurity threat solutions and cybersecurity laws affect security architecture and design. Provide supporting rationales with concrete evidence.

Download the timeline to a document compatible with the learning management system and submit both documents.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopeWrite.

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

1.4: Evaluate the appropriate security solutions required to design a security architecture.

Application security – Practical Connection

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

See attachment for assignment requirements.