Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Application Security
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- Describe operating system hardening 
- Define it
 - Why is it done?
 - What steps are usually done in a Windows environment?
 
 - Describe system restoration methods and procedures  
- Define it
 - Why is it needed?
 - What tools and approaches are recommended?
 
 - Describe network security controls 
- Define it
 - Why is it needed?
 - What steps, tools, and policies are used to secure networks?
 
 - Describe incident response teams and the role of evidence 
- What are incident response teams and why do they exist?
 - How does evidence collection relate to incident response teams?
 - Discuss evidence 
- Describe why evidence is collected,
 - How it should be collected
 - What can happen if it is collected or handled in an inappropriate way
 
 
 
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
 - Utilize at least five scholarly references.
 - Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
 - Utilize Google Scholar and/or the university library.
 - Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
 - Review the rubric to see how you will be graded.
 - Plagiarism will result in a zero for the assignment.
 - The second instance of plagiarism will result in your failure of this class.
 - If you use a source, cite it. If you do not, it is plagiarism.
 
Algorithms about Concept map
The work is to read Chapter 35 and make a concept map for the following topics (skipping the proofs). Make 4 concept maps for below 4 topics. Each concept map should contain most of the key concepts/ideas discussed in the sections.
· Chapter 35 – Approximation Algorithms (skip proofs)
o Content before 35.1
o 35.1 The vertex-cover problem
o 35.2 The traveling-salesman problem
o 35.3 The set-covering problem
Making concept maps to summarize chapter lectures
How to make a concept map?
 1. How to make a concept map? (Links to an external site.)
Online websites to make concept maps 
 1. Lucidchart (Links to an external site.)
 2. Slatebox (Links to an external site.)
Discussion 3- Access control
Cost benefit analysis hypothetical situation. Select an access control based on a hypothetical situation and justify the cost based on the risk . Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative). APA formatting is expected for any references. Initial posts due by Thursday end of day and two peer responses due by the end of the unit.
500 words: Leadership
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course(Information tech and strategic planning) have been applied, or could be applied, in a practical manner to your current work environment (Health care industry)
overall process of developing new software
Discussion: This week we discuss the overall process of developing new software. Please also note the differences between software development and methods.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
Testing Project Proposal Paper on Reconnaissance Phase
Reconnaissance project need help to get done. Below is the project requirement. USA
- Prepare a business case justifying the need for a penetration test. Remember, the project manager is usually NOT excited about the test and is only doing it to check a box. Make sure they are aware of why it is necessary, and what benefits it brings them. In this business case, be sure to include why Penetration Testing is important from the business perspective, not just the security perspective.
 - Develop a project timeline. Use project management software such as Microsoft Project, Zoho Projects, Team Gantt, or any other similar piece of software to develop a Gantt Chart showing the timeline. This project is due to take 5 weeks (Weeks 2-6 of our course).
 - Define what deliverables the organization can expect from you. At what points in your timeline can they be expected (be sure to include these in your timeline above!), and what will they contain?
 - Discuss the difference between active and passive information gathering. What activities are conducted in each type of information gathering?
 - Discuss what OSINT is and what kinds of tasks it entails.
 
Paper Requirements:
- Written Communication: Write in a professional manner using APA 6th Edition and formatting with correct grammar, usage, and mechanics.
 - Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…).
 - APA Formatting: Resources and citations are formatted according to APA 6th Edition.
 - Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
 - Font and font-size: Times New Roman 12pt, double spaced
 
Resources:
VPNs
- Explain some of the security risks associated with VPNs.
 - Describe how organizations can mitigate these risks.
 - Determine the effect of penetration testing and any applicable laws on VPNs.
 
Malware Protection Procedure Guide
Requirements:
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 3 pages
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
case study
In a 3-5 page APA formatted paper, examine the requirements for the system engineering program you were working on during your internship. The following should be addressed in your paper
- Identify and describe the importance of the system engineering management plan (SEMP along with the risk management plan.
 - Apply system engineering processes and disciplines to decompose a complex engineering problem your team has been struggling with.
 - Investigate the use of model-based system engineering tool(s) to simplify the business process and find an optimal solution to the problem at hand. Be sure to include the name of the tool you are recommending and how it can help solve the problem compared to any other competitive tool.
 
Your paper should be formatted in the 7th edition APA style and include references as required.
