5s week 11 assignment PL

In 500 words

Video Link: https://time.com/5168202/russia-troll-internet-research-agency/

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Include References, do not copy paste strictly.

Need Response 2 to below discussion

Please read the two discussion post and provide response to each discussion post in 75 to 100 words

Post1:

 

Quantitative Risk Analysis uses available relevant and verifiable data to produce a numerical value which is then used to predict the probability (and hence, acceptability) of a risk event outcome. Qualitative Risk Analysis, on the other hand, applies a subjective assessment of risk occurrence likelihood (probability) against the potential severity of the risk outcomes (impact) to determine the overall severity of a risk. (Shuttleworth, Mike, 2017) 

Qualitative risk assessment excels at giving the risk assessor and the risk manager information about how well the control is currently implemented.

In qualitative risk analysis, impacts and likelihood evaluated using some established methods.  After evaluation, we describe them in terms such as very high, high, moderate, low, very low.

The purpose of qualitative risk analysis is to:

Identity (or mark) risks for further analysis.

The risk which is not marked for further analysis, it identifies actions for them based on the combined effects of the probability of occurrence and impact on project objectives.

Qualitative analysis does not analyze the risks mathematically to identify the probability and likelihood. Instead, it uses stakeholders inputs to judge the impact.

Quantitative Risk Analysis uses the probability distributions to characterize the risk’s probability and impact.

The risk assessment methodology you use should depend on what you are trying to measure and what outcomes you’d like to see from that measurement. A quantitative risk assessment focuses on measurable and often pre-defined data, whereas a qualitative risk assessment is based more so on subjectivity and the knowledge of the assessor. A quantitative risk management methodology is best suited for a detailed look at comparing like-things across your organization, while a quantitative risk assessment is best for evaluating the implementation of a framework that does not inherently have pre-defined values. ( Buzz Hillestad)

Post2:

 

A common question that companies ask during the risk management process is whether a quantitative or qualitative approach should be taken. The good news is that you can actually make your method more effective and achieve the desired level of security by using both approaches. On the other hand , quantitative risk analysis is objective. It uses comprehensible data to evaluate the impacts of risk on overruns, differences in reach, use of resources and delay schedules. In the end, the objective is the same; the difference is that a more analytical, data-intensive approach is needed.

“In layman’s terms, quantitative risk analysis assigns a numerical value to extant risks- risk A has a 40% chance of occurring, based on quantifiable data (fluctuations in resource costs, average activity completion time, logistics etc.) and a 15% chance of causing a delay of X number of days. It’s thus entirely dependent upon the quantity and accuracy of your data” (Wood, 2019)

It also enables the detection of special areas — a risk incident, for example, with a high possibility of raising or a disastrous outcome. And it can be used to manage risk in real time at any point of the project. However, there is no doubt that a combined solution is better. They are basically two sections of a single whole, so that the ‘risk stage’ of each operation can be completely defined in the project schedule.

“It’s generally accepted that qualitative risk analysis is an older form of risk management than its quantitative counterpart. Not because human civilization’s earliest project managers had any particular bias towards the qualitative methodology; the answer is actually much simpler than that” (Wood, 2019)
One issue with qualitative evaluation is that those who conduct it are highly complex both in likelihood and in effect.HR consequences are more important than qualitative impacts for HR individuals , for example, and vice versa. In terms of a probability bias, a lack of understanding of the timeframes of other procedures can lead someone to believe that mistakes and failures occur more frequently in one’s own process than others.

While the quantitative risk evaluation, relies on factual and measurable data and highly statistical and analytical basis for estimating risks and impact values, usually expressing the risk value in monetary terms, rendering their findings useful beyond the framework of the evaluation.

“To reach a monetary result, quantitative risk assessment often makes use of these concepts:SLE (Single Loss Expectancy): money expected to be lost if the incident occurs one time.ARO (Annual Rate of Occurrence): how many times in a one-year interval the incident is expected to occur.ALE (Annual Loss Expectancy): money expected to be lost in one year considering SLE and ARO (ALE = SLE * ARO). For quantitative risk assessment, this is the risk value” (Leal, 2017)

As you can see, qualitative and quantitative tests have some characteristics that enhance each for a particular risk assessment situation, but incorporating both methods can, on the wide scale, prove to be the best alternative to a risk assessment. You can easily define most of the risks under normal circumstances with the use of the qualitative method. And the fears of people about their work can be used as a simple guide for evaluating these risks as important or not. You can then use the quantitative approach to relevant risks for more comprehensive decision-making details.

Risk evaluation is one of the most important and most difficult elements of risk management – individual, technological and administrative. When done correctly, the introduction of an ISO 27001 Information Security Management Framework could undermine any effort that organizations might make about the execution of qualitative or quantitative evaluations. However, you do not rely on a single methodology because ISO 27001 makes it possible to measure both qualitative and quantitative risk.

Discussion 7 – Response to Peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

malicious attacks

Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure in 4-5 pages, including a cover page and reference page, at least three references and in APA format.

threat modeling

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writin

Week 5 project

 

Putting It All Together

This assignment has 3 parts. Be sure to check off each one so you know that you accomplished it. You will be creating a personal résumé in Microsoft Word, and a PowerPoint presentation, and then zipping these files with your Excel spreadsheet that you created for the Week 4 Project into a compressed folder (a .zip file) to upload to the Week 5 Project submission area.

Create your résumé for when you are about to graduate from your program of Psychology. Don’t limit yourself to experiences and achievements you have today; you may add experiences and achievements you expect to have by the time you graduate. Later, you can keep adding skills and experiences to your résumé as you complete classes, gain more job experience, or change jobs.

Tip: You learned about tables in Week 2. Tables are great for creating résumés. Most of the time borders are turned off on the tables after the résumé is created although sometimes a top or bottom border is turned on to separate categories. However, the easiest way to create your résumé is to use a Word résumé template.

Click on the link below, Week 5 Project Tips, for some visual aids on how to tackle this week’s project.

Week 5 Project Tips

Part I: The Resume

Create your résumé based on the following criteria in Microsoft Word and save it as W5P_Resume_LastName.docx. Remember that the program will automatically add the extension of .docx.

  1. Ensure that the résumé was logically laid out and easily understood
  2. Create categories: create distinct separation and identification of important line-item job skills and experiences using bullets or numbers with appropriate application.
  3. Have content separation: provide a distinguishing feature that separates one line or paragraph from the others.
  4. Modify text: modify default typeface in one line or section and modify the default color or style of a line or section.
  5. Modify text size: modify the default typeface size by changing the points in at least one line on the page
  6. Create an overall professional look to your résumé.
  7. Include a header with your name and include page numbers. In reality, you would only do this if your résumé was more than one page, but you are demonstrating your skills in this document.

Part II: The PowerPoint

Create a new PowerPoint presentation and save it with the file name of W5D_Presentation_LastName.pptx.

  1. Choose a slide design that suits you. On your first slide, include a title of your choosing to introduce yourself. In the subheading, include the course number, your name, and the date.
  2. Create five slides where you can share your hobbies, interesting times in your life, or just different things about you. You should not include any personal information such as your address, social security number, student ID, or anything sensitive that you would not share publicly. Make sure that whatever you share is classroom appropriate.
  3. Create one slide that will be an “invitation” to your graduation party. Identify the who, what, when, where, and why of the party details. Include appropriate graphics and text formatting to make your invitation appealing.

All slides should be formatted creatively and appropriately.

Part III: The Zip Folder

Create a new folder called W5P_LastName. Put your résumé Word file, your PowerPoint file, and your Excel file from Week 4 Project into this folder and “zip” the folder following directions below to upload one file as your Week 5 Project submission. In the Comments box, briefly share your experiences with completing this project.

This is a handy way to treat multiple files. Once uploaded, be sure to download and unzip your folder to make sure that it contains exactly what you want in it. Sometimes in a rush, students upload empty folders and lose one-fourth of their grade for the class. Don’t let this mistake happen to you!

* To zip the folder on a PC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Send To -> Compressed (zipped) Folder
  • Attach the resulting ZIP file to your response in the classroom.

* To zip the folder on a MAC:

  • Right-click on the main folder (W5P_LastName).
  • From the drop-down menu select Compress.
  • Attach the resulting ZIP file to your response in the classroom.

wk3_531_A

1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

4. What are the most common metrics that make for analytics-ready data?