Discussion week 2 – Information Governance

Question:  

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References***

No Plagiarism********* 

Discussion 250 words

The CIA Triad is a well-known, venerable model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security. It’s important to understand what the CIA Triad is, how it is used to plan and also to implement a quality security policy while understanding the various principles behind it. It’s also important to understand the limitations it presents. When you are informed, you can utilize the CIA Triad for what it has to offer and avoid the consequences that may come along by not understanding it.

Discussion Questions

  1. What are the components of triad of information security?
  2. How does the information security triad help us keep information secure?
  3. What is the importance of CIA triad explain them with examples?

one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or inconsistencies with the data contents. Do not duplicate answers already posted by other students.

one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or inconsistencies with the data contents. Do not duplicate answers already posted by other students.

Digital Forensics

 Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing). 

Case Study 1- Strategy applied in Project Management

  1. Due DateSunday, August 28, 202211:59 PMPoints Possible50
  2. Read the Case ” A Day in the Life” at the end of  chapter 1 and response to the following questions:
    Rachel, the project manager of a large information systems project, arrives at her office early to get caught up with work before her co-workers and project team arrive. However, as she enters the office she meets Neil, one of her fellow project managers, who also wants to get an early start on the day. Neil has just completed a project overseas. They spend 10 minutes socializing and catching up on personal news.
    (Rest of case not shown due to length.)

    1. How effectively do you think Rachel spent her day?
    2. What does the case tell you about what it is like to be a project manager?

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09

diss16

Please note what you have learnt in the course data mining and how will you apply it in your work life. Anything else of importance regarding the course overall

Topics covered in datamining:

Key concepts of data mining

Knowledge discovery in database

data preprocessing

clustering classification

nearest neighbor and naïve bayes classifiers

Opinion mining, NLP framework

association rule in data mining

k-means, various types of clusters

prototype based, density based and graph based

cluster analysis concepts, an0moly, false discoveries