Remote Access Policy

Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies.
MY SPECIFIC POLICY IS “REMOTE ACCESS POLICY”

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management’s expectations).
After the scope has been defined, research the various components, and create an appropriate policy.
Prepare a Word document of 2-3 pages (excluding title page, abstract, and references page) that includes the network security policy for an organization that addresses all of the stated design requirements. It should be in APA format, including an introduction and conclusion.

Usability

Watch videos of 3 participants in a usability study and take notes about:

whether or not the participants are successful
how much time they take to complete a task
what problems they have when completing the task
Write a brief report of the results of the study, usability findings, and recommendations for re-design on the discussion board. Respond to the findings from 2 other classmates, did you find the same things, would you add anything to their findings and recommendations?

Participant videos: https://docs.google.com/document/d/10pkfJfMfAv3cnpVdx-L8snZrCd1vueq0iWCiad0-tBY/edit?

Finishing MyPaper and creating Jupyter Notebook

Here is the Intro and work related sections COMPLETED ( see MyPaper attached). Please finish the rest of the sections so it looks like the sample( See PAPER SAMPLE attached as a reference).

In order to do this: You must create a Jupyter Notebook with detailed comments of why you did what you did with each coding block. See Coding Example attached of similar dataset with different research objectives at the links below:

https://github.com/mrinmaisharma/Online-Retail-Dataset/blob/master/script.ipynb

https://github.com/scheckley/online-retail/blob/master/analysis.ipynb

Note: I want mine to be as simple as possible. I want it just enough to fulfill the research paper objective. Hopefully shows choosing the optimal model out of couple of models.

My research topic:

Using transactions data and machine learning model to predict what a customer is going to purchase on their next visit to the store. This is done using point of sale data (sales transactions data) and a machine learning model ( a classifier ).

The data I intend to use for this paper (sales transactions data):

https://archive.ics.uci.edu/ml/datasets/Online+Retail+II

Note: It would be better to use real data if you find one (please revise the dataset section in the paper had you decided to do so):

NOTE: See the unfinished paper (attached) . I also want the rest of the sections to look and sound like the (SAMPLE PAPER attached).

Deliverables: MyPaper.doc updated and Juypter Notebook created.

Thank you

Thoroughly answer the following questions; 1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? What concerns should privacy advocates have about biometrics? Do you agree or disagree w

Thoroughly answer the following questions;

1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? What concerns should privacy advocates have about biometrics? Do you agree or disagree with the concerns? Please explain.

2. Using the Internet and other sources, research the topic of biometrics. What type of biometrics is the most accurate? The lease accurate? Are specific biometric devices more realistic than others?

Thoroughly answer the following questions; 1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights. 2. Describe the differences between authentication and privacy and what mech

Thoroughly answer the following questions;

1. Discuss which biometrics method provides the best security while minimizing the potential of violating the user’s privacy rights.

2. Describe the differences between authentication and privacy and what mechanisms WLANs can use to ensure both.

3. Compare how 802.11a works and list the advantages and disadvantages of 802.11a over 802.11g. Because ACS is a technical group, the list should have a high level of technical detail.

Risk Management framework

pply RMF on the software product of a hypothetical company. The textbook page 48 to page 70 shows an example how RMF is applied to KillerAppCos iWare 1.0 server product. This is a team project. Your team will hypothesize a company and a product of the company. Plant a few reasonable technical risks. It could be based on your past software development experiences, could be based on a software you have built, or some open source or commercial software application.
This project will be done as three person teams. Each member is an analyst. One member also plays the role of a manager and another one also plays the role of a software developer/tester.
Stage 1 Understand Business Context
o Have a discussion as a group on the name/nature of the software product and the company.
o Analyst extracts business goals, priorities (at least 3 goals)
o Analyst summarizes the system in text or diagram
o Analyst determine any technical, management, and operational controls that the project currently as in place to detect or prevent software risk
Stage 2 Identify Business and Technical Risks
o Analysts develop a list of questions related to business risks, project risk, product risks, refers the textbook or presentation for details.
o Interview the manager and software developer of the RMF team.
o List and rank the business goals using  table 2-1
o Describe business risks using table like table 2-3
o For each business risk. find the business risk indicators and likelihood of occurrence, estimate the cost and severity. Record the result in a table similar to Table 2-9.
o Analyze Software Artifacts. Identify technical risks (at least 3). Categorize likelihood of occurrence, and business impact. Record the result in a table similar to Table 2-12.
Stage 3: Synthesize and Rank Risks
o Create goal-to-risk relationship, produce a table similar to Table2-13.
o Assess technical risks severity and present the result in a table similar to Table 2-14.
Stage 4: Define Risk Mitigation Strategy
o Define risk mitigation strategy. Weigh risk mitigation methods against effectiveness/cost/risk coverage/impact.
o Generate recommended Risk Mitigation Methods, document results in a table similar to Table 2-15.
o Generate a complete validation plan.

Homework

Here is the midterm exam.  Write 3 or 4 good paragraphs for each questions with references for each individual question listed with the paragraphs for that question.

Answer the following 5 questions in essay format (should be about a page for each question) and provide references using APA format.

1) Could a business use information technology to increase switching costs and lock in its customers and suppliers?  Use business examples based on cloud computing to support your answers.

2) What are several major business benefits and concerns that organizations can realize by connecting all of their employees with wireless mobile devices?  How should the firm handle the security issues?

3) CRM and CRM powered by AI raises issues of invasion of privacy since conclusions can be drawn about a customer’s behavior from the data commonly collected.  Discuss the potential privacy issues.  How can an organization meet the needs of serving its customers while simultaneously protecting their privacy?

4) Assume you are starting a Web-based business.  Are any economic, business, or societal developments occurring that are being overlooked as new Web-based business opportunities, or would you choose a second-mover strategy against an established Web-business?  Discuss the reasons for your choice of a Web-based business.

5) How can a manager of a large corporation demonstrate that he or she is a responsible end user of information systems?  Give several examples

Multiple anomaly detection

1.    Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.
2.    With the ever-increasing use of web and social-media data, data scientists must often perform text mining. Define and describe text mining. Then, describe the available tools.
3.    With cameras becoming ubiquitous, more and more companies and agencies are leveraging image recognitionoften for security purposes. Discuss whether such applications pose privacy threats.

Practical Connection Paper

Provide a reflection of at least 750 words (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

NOTE: I have included the textbook and Table of Contents so you have an idea of the topics that were covered.

Introduction
Data
Exploring Data
Classification: Basic Concepts, Decision Trees, and Model Evaluation
Classification: Alternative Techniques
Association Analysis: Basic Concepts and Algorithms
Association Analysis: Advanced Concepts
Cluster Analysis: Basic Concepts and Algorithms
Cluster Analysis: Additional Issues and Algorithms
Anomaly Detection
Appendices
Linear Algebra
Dimensionality Reduction: PCA, SVD, and More
Probability and Statistics
Regression

Network Security Policy

Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environments that violate your vision for security. After discussing the situation with various parties, they all admit they do not fully know or understand what is expected from them as they set up and configure the environment. To solve this situation, your group has been asked to create a network security policy for the organization.

Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies. Students may either interview someone in the local FBI field office or research the FBI and DHS Web sites related to information-sharing programs that the government offers; this could be advantageous to the organizations information security program.

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management’s expectations).
After the scope has been defined, research the various components, and create an appropriate policy.

Prepare a Word document of 710 pages (excluding title page, abstract, and references page) that includes the network security policy for an organization that addresses all of the stated design requirements. It should be in APA format, including an introduction and conclusion.

Attention!

Using this service is LEGAL and IS NOT prohibited by any university/college policies.

You are allowed to use the original model paper you will receive in the following ways:

  1. As a source for additional understanding of the subject
  2. As a source of ideas / reasoning for your own research (if properly referenced)
  3. For proper paraphrasing (see your educational institution's definition of plagiarism and acceptable paraphrase)
  4. Direct citing (if referenced properly)

Thank you very much for respecting our authors' copyrights.

Site Management