ERM W 11 D

 

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

question

 

1.how both quantitative & aualitative analysis have been applied to research in cybersecurity.

2. Identify & explain 3 IT leadership models and how each can positively influence behaviours in an organization

3. Evaluate the importance of IT leasdership & it’s role in helping acheive governance to help solve organizational problems.

System Analysis and Design – 5th Chapter 4 Minicase Williams Specialty Company – assignment

System Analysis and Design – Fifth Edition

Chapter 4 – Minicases Williams Specialty Company – Assignment 

Important: I did it from Chegg and its showing 90% match in university database.

Please make sure it unique and pass paraphrasing.

Mincase

——-

Williams Specialty Company is a small printing and engraving organization. When Pat Williams, the owner, brought computers into the business office eight years ago, the business was very small and very simple. Pat was able to utilize an inexpensive PC-based accounting system to handle the basic information processing needs of the firm. As time has gone on, however, the business has grown and the work being performed has become significantly more complex. The simple accounting software still in use is no longer adequate to keep track of many of the company’s sophisticated deals and arrangements with its customers. Pat has a staff of four people in the business office who are familiar with the intricacies of the company’s record-keeping requirements. Pat recently met with her staff to discuss her plan to hire an IS consulting firm to evaluate their information system needs and recommend a strategy for upgrading their computer system. The staff are excited about the prospect of a new system, since the current system causes them much aggravation. No one on the staff has ever done anything like this before, however, and they are a little wary of the consultants who will be conducting the project. Assume that you are a systems analyst on the consulting team assigned to the Williams Specialty Co. engagement. At your first meeting with the Williams staff, you want to be sure that they understand the work that your team will be performing and how they will participate in that work.

a. Explain, in clear, nontechnical terms, the goals of the analysis phase of the project.

b. Explain, in clear, nontechnical terms, how use cases will be used by the project team. 

Explain what these models are, what they represent in the system, and how they will be used by the team.

monitoring

 

Module 06 Content

  1. For the final submission of your course project you will complete both your Risk Register and submit the Risk Monitoring Plan that you have been developing throughout the course.

    Note: Make sure to refer to the Risk Management Plan template if needed.

    CIS3139fw_Risk_Monitoring_Plan_06172019

    Risk Register
    For the final additions to your Risk Register, you will fill out the Risk Control section (Column 3a-3c) for the top 10 risks identified in Module 03. Be sure to identify the control measures that can be used to mitigate each operational risk. A reassessment of the RPN (Risk Prioritization Number) must also be addressed.

    Risk Monitoring Plan
    For your final submission, you will use all your previous work on the Risk Register and your summary reports to complete the Risk Monitoring Plan. For your final Risk Monitoring Plan be sure to:

    • Classify business risks as they relate to information gathered in Module 01 – 05.
    • Identify three Security Controls.
    • Evaluate security control effectiveness for each risk mitigation.
    • Identify who, if anybody, should be in charge of an organization’s conduct.
    • Identify regulating ethical standards and who should watch over the regulators and define information system risks.
    • Identify the key components needed to create a risk management continuous monitoring plan.
    • Finally, your plan will provide your proposals for providing Continuous Assessment, Continuous Reporting, and Continuous Authorization.
    • Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.

       

Assignment 2

 Assignment 2 CS 120/121 Getting Started Objectives: 1. Gain an understanding of research strategies 2. Expand the preliminary outline, developed in Assignment 1, into a final full-sentenceoutline 3. Evaluate sources for credibility 4. Develop an annotated bibliography Important Note: You must complete the individual portion of this assignment in order to receive credit for the group portion. Format: 1. Use APA 6th edition or later for all references 2. Use EndNote as your Bibliographic Manager Note: Information Literacy Tutorials 3 and 4 must be completed prior to the submission of the individual portion. You must post screenshots of your tutorial completion on Blackboard. If you do not submit the screenshot, you will not receive any credit for your individual portion of this assignment. Due date: Refer to Important Dates document or the Schedule (PLE) . A2 -Individual Portion Directions: Search and Annotated Bibliography 1. Conduct in-depth research using journal databases, books and other academic/peerreviewed sources. a. Understand the difference between Keywords and Subject Headings. b. Keep track of the subject headings you used to find your sources i. NOTE: Wikipedia, newspapers and .com’s are not acceptable sources. 2. Create an annotated bibliography for any TWO accepted and any TWO rejected sources . a. Include all accepted sources used in your research in your bibliography. b. Evaluate each source carefully using at a minimum the CRAAP test as discussed in the recitations and any other criteria to help you determine its credibility or lack of it. c. Annotated Bibliography: i. Import your sources using EndNote and add your annotations tothose sources on the Word document. 2 Example: Annotated Bibliography Samples | The Writing Lab & OWL at Purdue ii. Annotations contain a summary, assessment and reflection for each source. 3. Conduct the following searches through the ODU library’s home page. a. Do a Keyword Title search for relevant books for your thesis i. List a minimum of 6 search terms used (put each search combination on a separate line) ii. Write an annotated bibliography for at least ONE book that you accepted or rejected. b. Do TWO Journal Database searches in the ODU library databases for articles relevant to your thesis. Use a subject specific journal database that relates to your topic. i. List the exact name of database, not just EBSCO OR ProQuest ii. Do a Subject Heading search. iii. For subject heading searches, you can employ any “narrow by subject” option (such as the Subject dropdown to the left of the results list inany EBSCO database, or you might find subject headings by clicking on an “indexes” tab or on a link entitled “Thesaurus) iv. List the search terminology used (indicate what words you used tosearch with, and in what combinations, each search listed on a separate line). v. Write an annotated bibliography for TWO (one from eachdatabase) accepted or rejected sources. c. Do a Google Scholar search to find articles relevant to your thesis. Read the information in this link on the advantages and limitations of using Google Scholar: http://guides.lib.odu.edu/content.php?pid=383017&sid=3138706 i. List the most relevant search terminology used ( indicate what words you used to search with, and in what combinations, putting each search on a separate line) ii. Indicate if this source is available as full text directly through Google Scholar. If not, how do you access it through ODU libraries databases ? iii. Write an annotated bibliography for ONE accepted or rejected source. Note: You are required to talk about these justifications during the oral presentations. Full-Sentence Outline: 1. Expand your section in the preliminary outline (from Assignment 1) to create a fullsentence outline, as described in Badke 6th Edition 2. The outline must be in proper APA format: All elements of the outline must be written in complete sentences. 3. Include in-text citations wherever evidence is quoted ● Example: http://owl.english.purdue.edu/owl/resource/544/03/ 3 Microsoft Word Document Requirements: ● Name the document: ● a2-ind-group-##-name.docx ▪ Replace ## with your group’s number ▪ Replace name with your name ● Include a cover page with the following information: ● Your name ● Professor’s name ● CRN ● Group number ● Line spacing: single spaced ● Margins: 1 inch all around ● Font type: Times New Roman (12pt) ● Order of Information: ● Cover page ● Group thesis ▪ Indicate if it has changed and the reason for the change ● Full sentence outline in proper APA format ▪ List the names of your group members against each Level-1 heading including the Rebuttal ● Annotated bibliography – Include your annotations for TWO accepted and TWO rejected sources along with a thorough analysis of each source using the CRAAP test and any other criteria you used to determine its credibility or lack of it. ● Bibliography with a list of all accepted sources you plan to use in your research (you may have more than just the two- for which you wrote annotations) ● All sources must be created in and imported from EndNote. Do not Copy and Pastethe sources. Microsoft PowerPoint Requirements: ● Name the document: ● a2-ind-group-##-name.pptx ● Replace ## with your group’s number ● Replace name with your name ● Slides are well designed, readable, and contain zero errors in punctuation,grammar, capitalization, and spelling. ● Slide contains the student’s name on each slide. ● No more than 5-7 bullet points on each slide. Avoid using paragraphs inyour PowerPoint slides wherever possible ● Order of Information: ● Title slide with the following information ▪ Your name ▪ Professor’s name ▪ CRN ▪ Group number 4 ● Group Thesis statement ● Full-sentence outline. ● Introduction of your portion of the research topic ● Thorough explanation of how you chose the topic, how you narrowed it down throughout the research. What combination of keywords and subjectheadings gave you the best results? ● Contains ONE rejected source and ONE accepted source with a critical review of each. ● Add screenshots of how you evaluated each source for each criterion ofthe CRAAP test and any other criteria you used. 

File

dataanalytics

 

Attached Files:

File data2.zip  Click for more options (8.919 MB) File Restoring_Postgres.txt  Click for more options (996 B)Go to this  site to install PostgreSQL and pgadmin.

Here is a video tutorial on how to install Postgres on the Mac.

Extract the data.dump file from the attached data.zip file and use the psql command to create the sqlda database (see attached file)

Go to this site (https://www.python.org/downloads/) to install the latest Python distribution. 

Go to this site (https://www.r-project.org/) to install the R programming language and this site to download the free R Studio development environment.

After watching this video, install Git and Github. 

Submit one document with five screen shots from your computer. Include enough of the screen so the viewer can see that the image is of your computer.

1. sqlda tables in pgadmin

2 use l to show a list of your PostgreSQL databases

3. An Idle page with a hello World script (tutorial here and here)

4. Github

5. R Studio

Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 

Please note that all code assignments must be submitted as a screenshot with a slice of your desktop showing the timestamp.If the time and date are not visible, you will be graded 0. 

 

Using PGAdmin4 create the database sqlda. Then, use the psql command line tool available in the Postgres 12 program folder to restore the database. 































































Here is the sample text that I used.
c:Program FilesPostgreSQL12bin>psql -U postgres -d sqlda -f "C:UsersdavepOneDriveDesktopdata2.dump"



In the cmd window, navigate to the foler where psql.exe resides. You can see above where it resides on my Windows computer after a default installation.

Execute the psql command tool and input these responses to the questions posed as follows:

c:Program FilesPostgreSQL12bin>psql

Server [localhost]: localhost

Database [postgres]: postgres

Port [5432]: 5432

Username [postgres]:postgres

Password for user postgres:

You can list your databases in the command line with l

You can connect to the sqlda database with c

Then you can list the database tables with dt

You can also check in PFAdmin4 for the new database (you may need to refresh).