Business Intelligence question
Week 4 assignment
Complete the following assignment in one MS word document:
Chapter 7 –discussion question #1-4 & exercise 3 & Internet exercise # 7
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
**Please don’t wait until the last minute to set up an account: To complete this week’s assignment you will need to create an account with Teradata by going to the email address below from your school account and they will send them a password: [email protected]. **
AVD Raj A
Please go through instructions carefully
In the 1st document, I need the outline covering all the Professor’s requirements.
In the 2nd document, I need the research paper covering all the Professor’s requirements.
Outline for Assignment 1
Using the research guide and the assignment 1 instructions, develop your outline. Submit the outline in an MS Word document file type. Utilize the standards in APA 7 for all citations or references in the outline. Ensure that the document includes your name. Do not include your student identification number. You may use the cover page from the student paper template, but it is not required. The assignment 1 instructions are at the bottom of this content folder.
Submit your outline on or before the due date.
By submitting this paper, you agree:
(1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy;
(2) that your institution may use your paper in accordance with UC's policies; and
(3) that the use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Wk 5 – HIPAA Compliance Planning
4 Part Assignment
1.Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide
2.Write a 1- to 2-page concise outline of the contents of the security management plan.
3.Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.
4. Write a 1- to 2-page concise outline of the contents of the security management plan.
Assignment Content
- Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.
Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:
- A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
- An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
- An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
- Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur.
Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide
- Accurate information on the HIPAA requirements for securing PHI
- FISMA and HIPAA requirements for a security plan
- Scope of the work you will perform to meet the Health Coverage Associates’ requests
- Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.
Write a 1- to 2-page concise outline of the contents of the security management plan. Include
- Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
- The recommended risk management framework Health Coverage Associates should adopt
- Key elements Health Coverage Associates should include in its plan of actions and milestones
- Cite all sources using APA guidelines.
Submit your assignment.
Technology to support Access Control
Discuss the benefits of technology to support Access Control.
500 words
APA format with References
Case Study 5.1 and Lab Work 5.1
Discussion 5.1
What are decision trees used for in a business setting? Why are they popular? Provide examples.
Case Study 5.1
- Read the Case Study: Case 6.2 West Houser Paper Company (page # 289) from text book
- Write a summary analysis and determine if they used the correct tools to conduct the analysis.
Writing Requirements
- 3–4 pages in length (excluding cover page, abstract, and reference list)
- Provide reference list and citations.
- APA format, Use the APA template located in the Student Resource Center to complete the assignment..
Lab 4
Complete the following in Chapter 6
Problems: #31 , #34 from textbook (Page #282, #283). Excel data has been attached below.
Work on the problems and clearly explain answering the questions in word document.
Provide the worked on excel files
The assignment must be an APA formatted paper with embedded excel files
Mathematical analysis hmwk using python
Can somebody please answer this question using python please.
5s week 3 assignment PL
Answer each of these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. What is privacy?
2. What risks, if any, does facial recognition software raise?
3. How much information about you can be found on-line with a simple google search?
4. How much information about you can be found by searching government and commercial databases?
5. Describe informed consent.
6. Should secondary use of consumer provided data be available without notice to the consumer?
7. How do data mining and predictive analytics work?
8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will?
9. Should Facebook be regulated, at least as far as it’s privacy and data policies?
10. How many public cameras is too many?
No copy paste strictly, plagiarism results in course termination.
CASE STUDY
As a team, pick one of the following department in your organization:
· Computer Operations
· Accounting
· Marketing
· Payroll
· Sales
· Distribution
· Human Resources
· Purchasing
· Service (i.e., Vehicle Maintenance)
· Administration (i.e., Executive Branch)
Requirements:
Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.
After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.
Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.
To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.
Deliverables:
Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.
Cloud Computing
Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.