Parametric and Non Parametric Analyses

 

Part 1

A principal wants to determine if a new ACT preparation program is effective. The data are contained in the schools.sav data file. Open the schools.sav file in SPSS. Use SPSS to determine whether a significant improvement existed between student performance on ACT tests in 1993 (act93) and ACT tests in 1994 (act94). Assume that the same students were involved in 1993 and 1994 testing. (This requires a t-test. Review Chapter 10 of the Green & Salkind text for information on paired t-tests and reporting APA results interpretation and writing.)

Create a report that answers the principal’s question. Write these conclusions in formal APA results format. Include your SPSS output to support your conclusion.

Part 2

A pharmaceutical company wants to determine whether there is a need for a new medication based on the data in the electric.sav file. Specifically, they want to determine whether a person is alive or dead 10 years after a coronary incident and whether that is reflected in a significant difference in the patients’ cholesterol levels (chol58) taken when the event occurred. Use chol58 as a dependent variable and VITAL10 as your independent variable. Complete the following:

  • Analyze these conditions to determine whether there is a significant difference between the cholesterol levels (vital10) of those who are alive 10 years later compared to those who died within 10 years.
  • Include the SPSS output, which validates your conclusion.
  • Write a brief paragraph describing your conclusions.

Refer to Unit 6 in the Green & Salkind text for specific information about SPSS tests and APA results interpretation and writing. Pay attention to the Levene’s test throughout for determining whether the assumption of equal variance was met when you make your final decisions about the analysis.

What conclusion did you reach? Write these conclusions in formal APA results format. Include your SPSS output to support that conclusion.

Part 3

Occasionally, you have 1 independent variable that has 3 or more levels or groups. For a parametric data set, an analysis of variance (ANOVA) is the proper calculation. Use an ANOVA to address the following scenario:

A financial planner is interested in understanding the relationship between the dependent variable of the income level of respondents (rincdol) and the independent variable of their education level (ndegree) from the gss.sav data file. Use SPSS to complete the following:

  • Run an ANOVA to determine the overall conclusion.
  • Use the Bonferroni correction as a post-hoc analysis to determine the relationship of specific levels of degree level to income.
  • Explain the overall conclusions based on the analysis, and describe the relationship(s) between the levels of the degree earned and income.
  • Write your conclusion of the findings based upon the output using proper APA formatting.

Submit both the SPSS output file and your Word summary. (Refer to the Green & Salkind section about a one-way ANOVA for information on APA results interpretation and writing.)

Discussion about CIA

Write at least 500 words analyzing a subject you find in this article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf 
related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Week 4 discussion

 

Create one discussion thread and answer the following questions:

(Chapter 5): How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.

(Chapter 6): How is the management of network security similar and different between on-perm and cloud environments? Give some examples.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Week Research Paper 2 – Info Tech Strat Plan

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).

RisK Mgt Project part – 2-3 Page

  

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

  

Project Part

Deliverable

 

Project   Part 1

Task   1: Risk Management Plan

 

Task   2: Risk Assessment Plan

 

Task   3: Risk Mitigation Plan 

 

Project   Part 2

Task   1: Business Impact Analysis (BIA) Plan

 

Task   2: Business Continuity Plan (BCP)

 

Task   3: Disaster Recovery Plan (DRP)

 

Task   4: Computer Incident Response Team (CIRT) Plan

 

Final   Project

Risk   Management Plan Final Submission

Submission Requirements

All project submissions should follow this format:

  • Format:      Microsoft Word or compatible
  • Font:      Arial, 10-point, double-space
  • Citation      Style: Your school’s preferred style guide
  • Minimum 2      pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

  

Project Part 1

Project Part 1 Task 1: Risk Management Plan

For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, you must:

  1. Develop and      provide an introduction to the plan by explaining its purpose and      importance. 
  2. Create an outline      for the completed risk management plan. 
  3. Define the scope      and boundaries of the plan. 
  4. Research and      summarize compliance laws and regulations that pertain to the      organization. 
  5. Identify the key      roles and responsibilities of individuals and departments within the      organization as they pertain to risk management. 
  6. Develop a proposed      schedule for the risk management planning process.
  7. Create a professional      report detailing the information above as an initial draft of the risk      management plan. 

Write an initial draft of the risk management plan as detailed in the instructions above. Your plan should be made using a standard word processor format compatible with Microsoft Word. 

Evaluation Criteria and Rubrics

  • Did the student      demonstrate an understanding of the competencies covered in the course      thus far?
  • Did the student      include all important components of a risk management plan in the outline?
  • Did the student      demonstrate good research, reasoning, and decision-making skills in identifying      key components and compliance laws and regulations?

Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation? 

Content Folder

Cloud Computing

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic.