Assignement

  

Week-13 Assignment

This week we will focus on a Specific topic “IOT threats to database Security”

Please submit below two questions which relates to above mentioned topic. It is important that you use your own words. Do not use spinbot or other word replacement software.

  1. An annotated reference list of  at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.(Use References attached )
  2. A one page single spaced summary   of what you learned about this topic. it should be written in essay format  with no bullet or numbered lists. It must include quotes from your sources  which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.

Research Paper

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 3 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

EDMS Business Requirements

You are ready to prepare the final version of the EDMS business requirements document (BRD) incorporating the assignments you completed and faculty feedback provided for Weeks 1–5. You will present your BRD to the Board of Directors for Hollywood Organic Co-op.

Write at least 4 to 6 pages for the final business requirements document for the new EDMS and prepare an 8- to 10-slide media-rich presentation summary of the BRD to the Hollywood Organic Co-op’s Board of Directors.

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

Viewing

Editing

Copy/paste (including screen capture)

Printing

Forwarding e-­mail containing secured e­-documents

Identify, define, and describe document access policies and best practices including:

Text documents

Spreadsheets

Financial statements

E-mail messages

Policy and procedure manuals

Research

Customer and project data

Personnel files

Medical records

Intranet pages

Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

Creation

Storage

Categorizing

Metadata tagging

Delivery or sharing

Repurposing

Review and reporting archiving and/or destruction

Format citations according to APA guidelines.

COMPUTER

 

  • This assignment must be in APA format. 
  • The assignment should be in paragraph form using complete sentences and avoiding bullet points and numbered list.
  • Use a Level 1 heading to separate your sections (Page 47 of the APA Publication Manual).
  • Title and reference pages do not count toward the total word or page count. 
  • Textbook and outside sources need to be referenced and cited in the paper.

Essays: (at least 300 words per prompt)

1. How is the Gram stain used to classify bacteria? How do antibiotics inhibit the growth of bacteria? Explain how carriers play an important role in the transmission of pathogens. Jan acquired a MRSA infection during a stay at a rehabilitation facility. Jan’s physician tells her that her MRSA was caused by S. aureus. How would you explain to Jan what S. aureus is and how it can cause diseases?

2. Lou had abdominal surgery. During his stay at the hospital a catheter was inserted into his bladder. After returning home Lou was diagnosed with a nosocomial infection. What are the principle routes of transmission of nosocomial infections? What can be done to prevent nosocomial infections? What are three reasons why rates of nosocomial infections are markedly higher in developing countries? What are five things that increase the risk of nosocomial infection?

3. What is the difference between a neoplasm, benign tumor, and malignant tumor? Identify four chronic infections that may cause cancer, and what cancer the infection might cause. Mr. Brown age 63 and Mrs. Brown age 61, are being seen in for a routine check-up. What cancer screenings should Mr. and Mrs. Brown receive (name at least 3 and why)?

4. In Western societies, why is colorectal cancer the most common cancer, but yet there has been a decline in the incidence and mortality of cervical cancer over the last 40 years? Identify and discuss four nonspecific warning signs of cancer and which cancer the warning sign is linked to. Aaron is a 28-year-old who had an EBV infection during high school. He noticed one of his lymph nodes in his neck is swollen but is not painful. He is also experiencing night sweats. What is a possible diagnosis? Give some possible treatments for this diagnosis?

Information Sec System

  

At present, there is a banking service that is needs improved authentication and authorization. Your goal in this assignment is to improve this service so that it does authenticates and authorizes its users properly. You will propose an array of solutions (see slides from module 1 – authentication, access control, introduction) so that 

1. Users are authenticated with password-based method

a. discuss the method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

2. Then discuss if users could be authenticated using biometric method or a second method of authmetication/verification– 

a. discuss the potential method, 

b. how to technically implement it, 

c. advantages and limitation, 

d. Include any sources you are using to answer including websites, books, and papers from conference and journals. 

3. Compare both password and biometric based method in terms of advantages and disadvantages.

ITM Capstone – Discussion 1

Question: 

How can one distinguish between an organizational weakness and a threat to the organization? 

Post should be 250 words. Add at least one reference in APA format.

R Homework

Question 1

Please submit a Rmarkdown (word format) report capturing the following:Use the attached Iris Dataset: iris_exams.csv  (click to download).Provide at least the following in the report for full credit: (1) Understanding the Data:

  • The structure of the data and a preview of the data.
  • Frequency Distribution. (Frequency Tables & Plots for each variable in the dataset (Barplots/Histograms)). Make sure to capture the skewness and kurtosis. – Provide an interpretation in one paragraph  (no more than 300 words) explaining the distribution of the data. 
  • Summary Statistics of the Data at least including mean, quartiles, min/max, and standard deviation. 

Question 2

Using the mtcars dataset, demonstrate the skills you have learned so far in class and submit a Rmarkdown (word doc) report including the following:

  • Develop a hypothesis
    • What is your hypothesis?
    • What columns are IVs
    • What columns are DVs
    • What columns are ignoble (why)
  • Check for Errors & Missing Data
  • Clean the data
    • How did you deal with NAs
    • How did you deal with outliers
  • Check Assumptions using Parametric Tests
    • Additivity 
    • Linearity
    • Normality
    • Homogeneity, Homoscedasticity

    Question 3

    Create a bar graph using the attached Iris dataset: iris_exams.csv  (click to download). Compare the Sepal Length of the flower Species. Include the following:

  • Main Title
  • X and Y-Axis Labels
  •  Colors by Species 
  • Provide an interpretation in one paragraph  (no more than 300 words) explaining the distribution of the data. 

Which Species Sepal.Length is greater?