Category: Analytics

  • Week 3 discussion – 5890

    please see attached, please use 7th edition apa format , please use text book references that are attached. please correct grammar, please list all references used, please look over all attached material as it helps with the actual assignment.

    Attached Files (PDF/DOCX): Week 3 discussion post.docx, Videos for this week.docx, Stress and burnout lecture.docx, Videos for apa format.docx, Week 3 agenda and readings.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Week 3 discussion – 5890

    please see attached, please use 7th edition apa format , please use text book references that are attached. please correct grammar, please list all references used, please look over all attached material as it helps with the actual assignment.

    Attached Files (PDF/DOCX): Week 3 discussion post.docx, Videos for this week.docx, Stress and burnout lecture.docx, Videos for apa format.docx, Week 3 agenda and readings.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Week 2 module things – BDS – 5870

    Please see attached

    Attached Files (PDF/DOCX): Week 2 modules to complete.docx, Login information for modules.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • crime project

    This is a project that consists of ppt, code, and writing.

    Attached Files (PDF/DOCX): ANLY506 Course Project NEW.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Unit 4 & unit 5

    I will chat with writer what need to be completed

    Attached Files (PDF/DOCX): For Unit 4 discussion post- Market Research Plan.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Data Preparation

    Look at attachments website: Username: ******************** PW:1qaz2wsx!QAZ@WSX
  • Data Preparation

    Look at attachments website: Username: ******************** PW:1qaz2wsx!QAZ@WSX
  • Data Preparation

    Look at attachments website: Username: ******************** PW:1qaz2wsx!QAZ@WSX
  • Mitigating Against Malware Attacks

    Assignment Details

    Unit 4 Assignment: Mitigating Against Malware Attacks

    Outcome addressed in this activity:

    IT545-2: Synthesize knowledge of cybersecurity threats to assess risk in wireless, mobile, and cloud infrastructures, as well as disruptive technologies.

    Purpose

    The purpose of the Unit 4 Assignment is for you to define a mitigation strategy for a malware threat being introduced into the system. You should assume the malware threat is similar to the one you worked with during this week’s lab.

    Assignment Instructions

    1. You must complete the Unit 4 Lab prior to completing this assignment.
    2. You are a cybersecurity professional in a research and development firm working on medical research to identify effective treatments for several diseases. It is known that a foreign state agent recently hacked a similar type of research organization through the use of malware, and many patents and other intellectual property were stolen. Your CEO and CIO want to ensure that their organizations systems are protected against this attack. They have asked you to perform a high-level risk assessment and provide a risk management approach related to this type of malware attack. Assume the following for the assignment:
    • The organization has an outward-facing website that provides information on the progress of research and presents general news of interest to its followers. This website’s web server is in the organizations demilitarized zone (DMZ). The DMZ uses a single firewall system. Users can request information by submitting a form.
    • Servers on the internal network houses several databases. One holds all current patent information for patents held by the organization. The second database holds the researchers notes and all research project information for projects that are in progress. The patent database is encrypted. There is also a collaboration area where researchers who work together can share notes and ideas. A third database houses employee information.
    • Also, an email server, print servers, and application servers are on the internal network.
    • The organization does not use any cloud computing. An incremental backup of the servers and databases is made daily and stored in the same building.
    • The organization has biometric identification on the external door and all internal lab rooms and server rooms. There are no security cameras.
    1. Use the following risk management approach to determine where compromises may exist, what the consequences of those compromises are, and controls and methods to reduce the likelihood or severity of the compromise. Identify at least two vulnerabilities, threats, and risks. Recommend what you think is the best control for each vulnerability, threat, and risk identified.

    Assignment Requirements

    The paper should be at least three pages, use 12-point Times New Roman, and be in APA format.

    For more information on APA Style formatting, refer to the resources in the Academic Tools area of this course.

  • Data Model

    Instructions

    A data model provides a view of how the data is structured throughout an organization. You’ve been provided with a set of data points from a local hospital.

    Instructions:

    • Using the data points provided, create a model. Your data model should structure the data to support the business practices of a health care organization.
    • The data points should be grouped together under a category heading.
    • Include a written document (1 1/2 -2) pages that describes the data model
    • Each category should have a title that is descriptive.
    • Develop your data model using the symbols and notations found in entity-relationship diagrams.

    Data Points

    • Consumer ID.
    • Last name.
    • First name.
    • Date of birth.
    • Sex or gender.
    • Street address.
    • City.
    • State.
    • Zip code.
    • Telephone number.
    • Social Security number.
    • Type of radiological test.
    • Date ordered.
    • Physician last name.
    • Physician first name.
    • Physician’s specialty.
    • Physician ID.
    • **************************.
    • Insurance name.
    • Insurance group number.
    • Insurance type.
    • Effective date.
    • Expiration date.
    • Diagnosis.
    • Signs and symptoms.
    • Presenting problem.
    • Time of arrival.
    • Time of discharge.

    resources

    http://library.ahima.org/doc?oid=107443#.WREtV1XyvIU

    https://www.youtube.com/watch?v=-fQ-bRllhXc%C2%A0%C2%A0