(200 word minimum, 150-words summary, for each question)

1Q.

Using the Web, search for at least three (3) tools to automate risk assessment.

Collect information on automated risk assessment tools. 

●      How much do the tools cost?

●      What features do the tools provide?

●      What are the advantages and disadvantages of each tool?

2Q.

Professional written communication is a key skill required in the workplace. Provide an example of either documentation or written communication that you have done this week in your workplace. What was the result of the communication? In what ways could you potentially improve?

Problem 7- Proj Risk

Question 1.

Build a full risk management plan, including a complete risk matrix for a project for a wedding including the wedding itself, the reception and the dinner.  You own the wedding planning company doing this event. 

Question 2.

Create a three page paper with three references other than your text. Explain how the concepts of risk control and quality are related within the project management discipline.  How do the two knowledge areas impact one another?  Explain the work in these two areas from a strategic perspective. 

Question 3.

How does monitor and control play an intricate part in risk management?  How would this involve project communication?  Create a sample communication plan for a project which also includes a RACI as part of the plan.  Include at least 10 different individuals and organizations which must be included in the project communications.

Text-

Title: Managing Project Risks; 464 Pages ISBN: 978-1-119-48975-7 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: Wiley-Blackwell Publication Date: 2019 

Create User Access Policies

You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII). Your organization needs to create user access policies and provide them to its employees.

Sean, your manager, asks you to write a report detailing relevant user access policies. He needs you to research a generic template and use that as a starting point from which to move forward.

For this assignment:

  1. Research existing policy templates and examples from organizations of a similar type.
  2. Write a report detailing at least three relevant user access policies based on your research.
    • Create a table for the policies.
    • Include a short summary explaining why you chose the policies.
    • Include an introduction and conclusion.
    • Provide citations for your sources.

Social Engineering

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation be avoided? Need this in APA format in a word document with no less than 350 words with “Two references & Citations”

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Exp22_Excel_Ch04_ML1 – EBL Sporting Goods 1.1

Exp22_Excel_Ch04_ML1 – EBL Sporting Goods 1.1

Exp22_Excel_Ch04_ML1 – EBL Sporting Goods 1.1

Excel Chapter 4 Mid-Level 1 – EBL Sporting Goods 

  

Project Description:

You are the inventory manager for EBL Sporting Goods. EBL is a national sporting goods store with several warehouses. You are currently performing an analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

     

Start Excel. Download and open   the file named EXP22_Excel_Ch04_ML1_Inventory.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Freeze the panes at cell B2 so   that the column labels do not scroll offscreen.

 

Convert the data to a table and   name the table Inventory2024.

 

Apply Light Green, Table Style   Light 18 to the table.

 

Sort the table by Warehouse (A   to Z), then by Unit Price (smallest to largest), and then by Department.   Create a custom sort order for Department so that it displays in this   sequence: Training, Athletic Apparel, Footwear, Fitness, Outdoor Gear, and Toys.

 

Remove duplicate records from   the table. Excel should find and remove one duplicate record.

 

Create an unqualified structured   reference in column G to determine the value of the inventory on hand. To   calculate the inventory on hand, multiply the Unit Price and the Amount on   Hand.

 

Apply a Total Row to the   Inventory2024 table; set the Amount on Hand to Average. Format the results to   display with two decimal points.

 

Create a new conditional   formatting rule in column D that displays any Inventory Value for the Toys   department with a value of $10,000 or more as Red, Accent 2 fill color (the   6th color located on the top row of the Format Cells window) with White,   Background 1 font color. There will be two qualifying entries.

 

Ensure the warehouse information   is not broken up between pages when printed. Add a page break to make sure   that each warehouse prints on its own consecutive page.

 

Set the worksheet to Landscape   orientation and repeat row 1 labels on all pages and page order prints Down,   then over.

 

Display the Inventory sheet in   Page Break Preview.

 

Save and close EXP22_Excel_CH04_ML1_Inventory.xlsx.   Exit Excel.

Exp19_Word_Ch03_ML2_Fresh

 Exp19_Word_Ch03_ML2_Fresh

  

Project Description:

You are preparing a one-page flyer promoting a meal planning service and app. The flyer includes information, some of which is shown in a table, describing the new service. You will merge the flyer with a data source to produce personalized copies of the flyer.

     

Start Word. Download and open   the file named Exp19_Word_Ch03_ML2_Fresh.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Ensure that nonprinting   characters are displayed. At the second blank paragraph that follows the   document logo, insert a 2×1 table. Type Meal Planning Series in the first cell of the table.   Type   Volume 24 in   the next cell and right-align it. Format all text in the table as italics,   with a font size of 10 pt.

 

Adjust the width of both columns   in the table to 2″. Center the   table horizontally on the page. Shade the table with Green, Accent 6, Lighter   60%.

 

Select text at the end of the   page, beginning with Citrus Salmon   Whole Grain Rice Bowl and ending in 490   (whether you select the paragraph mark that follows 490 is irrelevant). Convert the selected text to a table,   accepting all default dialog box selections.

 

Adjust the width of the second   column to 1”. Insert a row above the first row and type Meal   Selection in   the first cell. Type Calories in the second. Apply Align Center alignment to both   entries in row 1.

 

Insert a column at the right of   the second column. Type Remaining Calorie Count in row 1 of the new column. Text   will wrap in the cell.

 

Click in the third column on the   second row (below Remaining Calorie   Count). Include a formula to subtract Calories from 1200. You do not need to select a   Number format. Repeat the formula down the column, adjusting the cell   reference for each row.

 

Insert a column to the left of   the first column and adjust column width of the new column to 1”. Merge all   cells in the new column. Type FRESH! in the merged cell. Click Text Direction in the Alignment group   on the Table Tools Layout tab twice to rotate the text attractively. Click   Align Center. Change the font size of text in the first column to 26.

 

Modify all formulas in the last   column to adjust for the newly inserted column. You should change the letter   in each formula from b to c. Note that the formula will   change, but the results remain the same. Change the calorie count for Barbecue Chicken Pizza to 550. Update the formula field in   the next cell to reflect the new amount for calories remaining.

 

Apply a table style of Grid   Table 5 Dark – Accent 6 (row 5, column 7 under Grid Tables). Select text in   row 1 (but not the merged cell) and choose Align Center alignment. Apply   Align Center alignment to all numbers in the last two columns.

 

Center the table on the page horizontally. Select the first column.   Select the first double line style shown (click the Line Style dropdown   arrow, not Border Styles) and a line weight of ½ pt. Select a pen color of   Green Accent 6. Apply the border selection to all borders of the selected   column.

 

Place the insertion point at the   end of the document (after Download the   Fresh! app from your friends at). Press SPACEBAR. Click the Mailings tab   and begin a mail merge, choosing to create letters and selecting recipients   from an existing list. You will use the Access database, Fresh App Contacts.accdb. Note, Mac users will use the text file,   Fresh App Contacts.txt. Edit the   recipient list and sort by Grocery Name in ascending order.

 

Insert a merge field of Grocery_Name. Preview the results and   finish the merge of all records. Select and copy all text in the new   document. Display the original document, move to the end of the document   (after Download the Fresh! app from   your friends at Associated Grocers), and insert a page break. Paste the   copied text, resulting in a 6-page document.

 

Save and close Exp19_Word_Ch03_ML2_Fresh.docx. Close   all other open documents without saving. Submit Exp_Word_Ch03_ML2_Fresh.docx as directed.

Digital forensics

 There is a cyber attack against Company X and you are the only digital forensics analyst for the company.  You think the attack is coming from an insider. You have a good idea that employee Kevin is not happy at the company and launched a cyber attack. Kevin is in IT department. He uses Linux computer and has an iPhone.  The attack is against HR database. Database is an SQL database. All social security numbers are being deleted. You find that the attacker uses phishing email to capture a database password. Phishing e-mail has following body lines: “Your password is expired, please click the link to reset your password”.  You will get his computer and iPhone to analyze. Please describe steps you will take from taking his computer and iPhone and doing digital forensics analysis. Describe tools you will use, methodology you will follow.