How to clean and organize your closet?

How to clean and organize your closet?

make 3 slides ppt and 1.5 pages speaker notes, notes plz sign the number of slides pages, like;slide 1 is talking about xxxxxx slide 2 is talking abt xxxxxx

topic is : how to clean and organize your closet?

plz use basic level english, words and sentence to make,

in PPT, do not more words, no more than 40 words in each page, make academic pic insert

Demo demo this is a few steps separate from the map

First step, what needs to be done

Second step What needs to be done

third

fourth

The post How to clean and organize your closet? appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Debt lesson

Debt lesson

300 word spreadsheet

As an assistant vice president at a regional bank, your boss has tasked you and the other AVPs to work in a group to acquire $100 million of residential mortgages to be securitized in a pass-through MBS. There must be between 250–300 mortgages in the portfolio, none of them with a maturity below 200 months or greater than 360 months. In the interest of time, your boss suggests that the group assign group members to find (meaning create some hypothetical) a group of diverse mortgages (meaning each with a different interest rate, principal amount, and maturity) and then as a group, aggregate each member’s mortgages into a pool to calculate the portfolio WAC and WAM. Your group’s task is to provide your boss with a summary spreadsheet that shows the individual mortgages and the portfolio’s WAC and WAM calculations, along with a memo of at least 300 words that explains the following:

The number of residential mortgages in the portfolio and the range of principal values, interest rates, and maturities

The residential mortgage portfolio’s WAC and WAM

A discussion of the WAC of the pass-through MBS the group has created and whether it represents a coupon rate indicative of a high credit quality or a lower credit quality pool of mortgages. Include in the discussion the MBS issue’s spread over the comparable Treasury rate.

Include in your analysis at least 1 outside source for the Treasury rate

The post Debt lesson appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

New World Symphony Orchestra

New World Symphony Orchestra

In order to complete this assignment you will need to attend a public concert outside of class. You must attend a concert selected from the types of music included in the next paragraph. Reviews of concerts that are not on this list are not accepted and will receive no credit. If you wish to attend a type of concert that is not on the list you must ask me whether it can be added to the list before you attend the concert. Concerts will not be added to the approved list after they take place.

Acceptable concerts include professional orchestras, soloists, jazz, Broadway musicals and instrumental or vocal ensembles, and comparable college or community groups performing music relevant to the content of this class. (Optionally, either your concert report or your concert review – but not both unless advance permission is given – may be based on a concert of non-western music selected from events on the concert list.)

Acceptable concerts include the following:

· Symphony orchestras

· Concert bands and wind ensembles

· Chamber Music (string quartets, brass and woodwind quintets, etc.)

· Solo recitals (piano, voice, etc.)

· Choral concerts

· Early music concerts

· Non-western music

· Some jazz concerts

· Opera

· Broadway Musicals

· Flamenco

· Ballet

· Tango

Assignment Format

The following are required on the concert review assignment and, thus, may affect your grade.

· Must be typed

· Must be double-spaced

· Must be between 2 and 4 pages in length not including the cover sheet.

· Must use conventional size and formatting of text – e.g. 10-12 point serif or sans serif fonts with normal margins.

· Must include the printed program from the concert and/or your ticket stubs. Photocopies are unacceptable. (Contact me at least 24 hours before due date if any materials are unavailable.)

· All materials (text, program, ticket stub) must be stapled together securely. Folded corners, paper clips, etc. instead of staples will not be accepted.

· Careful editing, proofreading, and spelling are expected, although minor errors will not affect your grade.

Papers that do not follow these format guidelines may be returned for resubmission, and late penalties will apply.

Concert Review Assignment Content

I. Cover Sheet: Include the following on a cover sheet attached to the front of your review:

· Title or other description of the event/performers you heard, along with the date and location of the performance. For example:

New World Symphony Orchestra

1258 Lincoln Road

Saturday, June 5, 2013

Lincoln Road Theater, Miami Beach

· Your name, assignment submission date, course. For example:

Pat Romero October 31, 2013 Humanities 1020 MWF 8:05 a.m.

II. Descriptions The main body of the concert review should include brief discussions of three of the pieces in the concert you attend. In most cases, a single paragraph for each piece should be sufficient, although you may wish to break descriptions of longer pieces into separate short paragraphs, one per movement.

Your description of each piece (song) should include:

· The title of the piece and the composer’s name if possible, as listed in the concert program.

· A brief description of your reaction to the piece. For example:

When the piece started I thought it was going to be slow and boring, but the faster section in the first movement made it more exciting. A really great flute solo full of fast and high notes in the third movement caught my attention. I’m not sure, but I thought that some of the brasses may have been a bit out of tune in the next movement when it got very loud…

You must describe these 3 pieces which were performed in the concert. Partial reports will earn a lower grade.

III. Summary: Following your review of the individual pieces and described above, you should conclude your paper with a final “Summary” paragraph in which you offer your reaction to the experience of the concert as a whole.image1.png

PAGE

2

The post New World Symphony Orchestra appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

CASE: write A Cybersecurity Incident Response Team

CASE: write A Cybersecurity Incident Response Team

Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the “Love Letter” worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service.

http://video.cnbc.com/gallery/?video=3000469792

“Every minute, we are seeing about half a million attack attempts that are happening in cyber space.” -Derek Manky, Fortinet global security strategist

For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can’t come quickly enough, according to security experts such as Mansky:

Watch: http://video.cnbc.com/gallery/?video=3000469792

Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization’s strategy, and it is a component that needs to be embedded and embraced at all levels of the organization.

So what happens when the organization is breached? Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb (for example, https://www.washingtonpost.com/news/on-leadership/wp/2014/01/13/target-ceo-opens-up-about-data-breach/?utm_term=.9ae38512b926)

As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: “identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.” (https://hbr.org/2016/10/good-cybersecurity-doesnt-try-to-prevent-every-attack)

It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure.

Case Background

iFinance is one of the largest banks in the country with a national network of branches, products and services that span the entire financial range—from traditional consumer banking and investment services to insurance and corporate investment banking.

iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks. iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management.

A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinance has acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents. iFinance’s approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process.

The top executives of iFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this fall iFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs.

Your Role

You are a newly-hired Information Security Manager that started a few months ago. You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented.

Guidelines:

Part 1: Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class.

· Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa’s online library), and include supporting materials and references from your web-based research of the selected organization.

· Your paper and all citations/references should be in APA format. The Purdue OWL website is an excellent resource for APA formatting and reference examples: https://owl.english.purdue.edu/owl/resource/560/05/

· You should include the following sections in your paper:

· Mission and vision statement for the CSIRT

· Identify key stakeholders that the CSIRT will serve, and how you will

· Determine the scope and levels of service the CSIRT would provide

· Staffing Recommendations – identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT

· Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed)

· Identify any needed external resources needed

· Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance’s industry, size, structure, etc.

· Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate

· Estimate the amount of additional funding needed to implement and maintain the CSIRT

· Communications plan to make security a priority for iFinance’s many employees in offices distributed throughout 25 states

· Establish a proposed timeline for implementing the CSIRT

· Conduct research to establish ROI

· Find examples of cybersecurity incidents in similar organizations

· To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company’s reputation and brand image.

Part 1 – Case Study Write-up Rubric:

200 points total:

15 points — 3 scholarly, peer-reviewed references

10 points – APA formatting throughout the paper

10 points – Mission & Vision Statement

10 points – Key Stakeholders

10 points – Scope of Services

10 points – Staffing Recommendations

10 points – CSIRT Organizational Structure/Reporting

50 points – Key Policies/Best Practices

15 points – Funding Request/Estimate

25 points – Communication Strategy

10 points – Proposed Timeline

25 points – ROI research/rationale

Part 2 (This will occur during your Day 3 session) Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT. You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization.

Your team will be given time to discuss each other’ write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are “selling” your proposal in a persuasive presentation.

Guidelines/Rubric 50 points

· Your presentation should be 10 minutes in length, including a clear introduction and conclusion, which clear supporting arguments.

· Be free from grammar and spelling errors, and avoid too much text per slide

· Slides include compelling and professional graphics.

· The presentation is persuasive, presenting a clear need for the CSIRT, a well-developed rationale for the team’s proposal as a solution to the need

· Every member of the team should present in a balanced and well-coordinated presentation, and prepare for up to 10 minutes of Q&A by your classmates

Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-case-study.cfm

The post CASE: write A Cybersecurity Incident Response Team appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Develop what you believe are the top 5 key CSIRT policies and procedures

Develop what you believe are the top 5 key CSIRT policies and procedures

Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the “Love Letter” worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service.

http://video.cnbc.com/gallery/?video=3000469792

“Every minute, we are seeing about half a million attack attempts that are happening in cyber space.” -Derek Manky, Fortinet global security strategist

For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can’t come quickly enough, according to security experts such as Mansky:

Watch: http://video.cnbc.com/gallery/?video=3000469792

Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization’s strategy, and it is a component that needs to be embedded and embraced at all levels of the organization.

So what happens when the organization is breached? Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb (for example, https://www.washingtonpost.com/news/on-leadership/wp/2014/01/13/target-ceo-opens-up-about-data-breach/?utm_term=.9ae38512b926)

As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: “identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.” (https://hbr.org/2016/10/good-cybersecurity-doesnt-try-to-prevent-every-attack)

It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure.

Case Background

iFinance is one of the largest banks in the country with a national network of branches, products and services that span the entire financial range—from traditional consumer banking and investment services to insurance and corporate investment banking.

iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks. iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management.

A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinance has acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents. iFinance’s approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process.

The top executives of iFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this fall iFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs.

Your Role

You are a newly-hired Information Security Manager that started a few months ago. You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented.

Guidelines:

Part 1: Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class.

· Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa’s online library), and include supporting materials and references from your web-based research of the selected organization.

· Your paper and all citations/references should be in APA format. The Purdue OWL website is an excellent resource for APA formatting and reference examples: https://owl.english.purdue.edu/owl/resource/560/05/

· You should include the following sections in your paper:

· Mission and vision statement for the CSIRT

· Identify key stakeholders that the CSIRT will serve, and how you will

· Determine the scope and levels of service the CSIRT would provide

· Staffing Recommendations – identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT

· Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed)

· Identify any needed external resources needed

· Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance’s industry, size, structure, etc.

· Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate

· Estimate the amount of additional funding needed to implement and maintain the CSIRT

· Communications plan to make security a priority for iFinance’s many employees in offices distributed throughout 25 states

· Establish a proposed timeline for implementing the CSIRT

· Conduct research to establish ROI

· Find examples of cybersecurity incidents in similar organizations

· To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company’s reputation and brand image.

Part 1 – Case Study Write-up Rubric:

200 points total:

15 points — 3 scholarly, peer-reviewed references

10 points – APA formatting throughout the paper

10 points – Mission & Vision Statement

10 points – Key Stakeholders

10 points – Scope of Services

10 points – Staffing Recommendations

10 points – CSIRT Organizational Structure/Reporting

50 points – Key Policies/Best Practices

15 points – Funding Request/Estimate

25 points – Communication Strategy

10 points – Proposed Timeline

25 points – ROI research/rationale

Part 2 (This will occur during your Day 3 session) Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT. You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization.

Your team will be given time to discuss each other’ write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are “selling” your proposal in a persuasive presentation.

Guidelines/Rubric 50 points

· Your presentation should be 10 minutes in length, including a clear introduction and conclusion, which clear supporting arguments.

· Be free from grammar and spelling errors, and avoid too much text per slide

· Slides include compelling and professional graphics.

· The presentation is persuasive, presenting a clear need for the CSIRT, a well-developed rationale for the team’s proposal as a solution to the need

· Every member of the team should present in a balanced and well-coordinated presentation, and prepare for up to 10 minutes of Q&A by your classmates

Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-case-study.cfm

The post Develop what you believe are the top 5 key CSIRT policies and procedures appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Discuss what happens when the organization is breached?

Discuss what happens when the organization is breached?

CASE: Create A Cybersecurity Incident Response Team

Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the “Love Letter” worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service.

http://video.cnbc.com/gallery/?video=3000469792

“Every minute, we are seeing about half a million attack attempts that are happening in cyber space.” -Derek Manky, Fortinet global security strategist

For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can’t come quickly enough, according to security experts such as Mansky:

Watch: http://video.cnbc.com/gallery/?video=3000469792

Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization’s strategy, and it is a component that needs to be embedded and embraced at all levels of the organization.

So what happens when the organization is breached? Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb (for example, https://www.washingtonpost.com/news/on-leadership/wp/2014/01/13/target-ceo-opens-up-about-data-breach/?utm_term=.9ae38512b926)

As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: “identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.” (https://hbr.org/2016/10/good-cybersecurity-doesnt-try-to-prevent-every-attack)

It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure.

Case Background

iFinance is one of the largest banks in the country with a national network of branches, products and services that span the entire financial range—from traditional consumer banking and investment services to insurance and corporate investment banking.

iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks. iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management.

A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinance has acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents. iFinance’s approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process.

The top executives of iFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this fall iFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs.

Your Role

You are a newly-hired Information Security Manager that started a few months ago. You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented.

Guidelines:

Part 1: Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class.

· Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa’s online library), and include supporting materials and references from your web-based research of the selected organization.

· Your paper and all citations/references should be in APA format. The Purdue OWL website is an excellent resource for APA formatting and reference examples: https://owl.english.purdue.edu/owl/resource/560/05/

· You should include the following sections in your paper:

· Mission and vision statement for the CSIRT

· Identify key stakeholders that the CSIRT will serve, and how you will

· Determine the scope and levels of service the CSIRT would provide

· Staffing Recommendations – identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT

· Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed)

· Identify any needed external resources needed

· Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance’s industry, size, structure, etc.

· Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate

· Estimate the amount of additional funding needed to implement and maintain the CSIRT

· Communications plan to make security a priority for iFinance’s many employees in offices distributed throughout 25 states

· Establish a proposed timeline for implementing the CSIRT

· Conduct research to establish ROI

· Find examples of cybersecurity incidents in similar organizations

· To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company’s reputation and brand image.

Part 1 – Case Study Write-up Rubric:

200 points total:

15 points — 3 scholarly, peer-reviewed references

10 points – APA formatting throughout the paper

10 points – Mission & Vision Statement

10 points – Key Stakeholders

10 points – Scope of Services

10 points – Staffing Recommendations

10 points – CSIRT Organizational Structure/Reporting

50 points – Key Policies/Best Practices

15 points – Funding Request/Estimate

25 points – Communication Strategy

10 points – Proposed Timeline

25 points – ROI research/rationale

Part 2 (This will occur during your Day 3 session) Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT. You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization.

Your team will be given time to discuss each other’ write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are “selling” your proposal in a persuasive presentation.

Guidelines/Rubric 50 points

· Your presentation should be 10 minutes in length, including a clear introduction and conclusion, which clear supporting arguments.

· Be free from grammar and spelling errors, and avoid too much text per slide

· Slides include compelling and professional graphics.

· The presentation is persuasive, presenting a clear need for the CSIRT, a well-developed rationale for the team’s proposal as a solution to the need

· Every member of the team should present in a balanced and well-coordinated presentation, and prepare for up to 10 minutes of Q&A by your classmates

Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-case-study.cfm

The post Discuss what happens when the organization is breached? appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Establish a proposed timeline for implementing the CSIRT

Establish a proposed timeline for implementing the CSIRT

Cybersecurity events can happen at any time. Notable historic security events show the shortening cycle of threats: the Melissa virus, which took several days to spread; the “Love Letter” worm, which became rampant in just a day; and the Nimda worm, which wreaked havoc in just hours. These incidents show that little time is needed to infect systems around the world, and a company must therefore have the capability to respond quickly to prevent major losses and interruptions in service.

http://video.cnbc.com/gallery/?video=3000469792

“Every minute, we are seeing about half a million attack attempts that are happening in cyber space.” -Derek Manky, Fortinet global security strategist

For regulated businesses such as banking and health care, governments are enacting laws that require businesses to provide mechanisms for protecting consumer data and privacy. And those mechanisms can’t come quickly enough, according to security experts such as Mansky:

Watch: http://video.cnbc.com/gallery/?video=3000469792

Because of rapid changes in security threats, even huge capital expenditures for hardware and software design for the security of your network will only help reduce, but not eliminate, the risks associated with a security event. A well-organized CSIRT is one of the components of an organization’s strategy, and it is a component that needs to be embedded and embraced at all levels of the organization.

So what happens when the organization is breached? Every incident yields a cost for the organization. If caught early, the cost can be minimal. However, if an incident occurs and there is no clear plan and a good team to execute the plan, the costs associated with a breach can climb (for example, https://www.washingtonpost.com/news/on-leadership/wp/2014/01/13/target-ceo-opens-up-about-data-breach/?utm_term=.9ae38512b926)

As we read earlier, a good cybersecurity plan does not attempt to catch EVERY intrusion, but instead strategically focuses on: “identifying and protecting the company’s strategically important cyber assets and figuring out in advance how to mitigate damage when attacks occur.” (https://hbr.org/2016/10/good-cybersecurity-doesnt-try-to-prevent-every-attack)

It is a simple fact that the number of computer and software vulnerabilities is growing and the sophistication of attacks is increasing. Organizations need to develop a comprehensive plan to secure sensitive information and ensure the survivability of their critical infrastructure.

Case Background

iFinance is one of the largest banks in the country with a national network of branches, products and services that span the entire financial range—from traditional consumer banking and investment services to insurance and corporate investment banking.

iFinance was formed during the three decades ago through acquisitions of regional banks in the West and Midwest. Those banks had grown from the mergers of numerous smaller banks resulting in the acquisition or merger of dozens of banks. iFinance has billions in assets and operates 2,225 banking offices in 25 states, over 4000 ATMs, and provides online banking and mobile banking apps to both business and personal customers. The bank employs 25,000 tellers, staff, and management.

A problem facing iFinance is that, due to these mergers and acquisitions, each of its business units has its own legacy networks and vision of how security measures would be implemented to protect its resources. As iFinance has acquired more companies and increased the number of service offerings, it has become more critical that a standard set of repeatable processes be put in place to deal with security incidents. iFinance’s approach to security must be carefully coordinated across all business units to provide a coordinated, consistent, repeatable process.

The top executives of iFinance recognize that, to be successful in the financial industry, they must have a clear understanding of its security risks and be able to identify solutions to eliminate or minimize any potential threats to the organization. To get started, this fall iFinance published and distributed its security architecture plan for infrastructure security on its internal website. This activity helped iFinance articulate a starting direction for its information security needs.

Your Role

You are a newly-hired Information Security Manager that started a few months ago. You have noticed that security incidents are occurring, and although these incidents are being addressed, they were being handled inconsistently across the iFinance organization. You recognize that a consistent incident response system needs to be implemented.

Guidelines:

Part 1: Submit your individual write up on the last day of the intersession (in the Inter-session Activities Assignment Area of the Bb course), prior to arriving in class.

· Use a minimum of 3 scholarly references from peer-reviewed, academic journals (must be accessed through Ottawa’s online library), and include supporting materials and references from your web-based research of the selected organization.

· Your paper and all citations/references should be in APA format. The Purdue OWL website is an excellent resource for APA formatting and reference examples: https://owl.english.purdue.edu/owl/resource/560/05/

· You should include the following sections in your paper:

· Mission and vision statement for the CSIRT

· Identify key stakeholders that the CSIRT will serve, and how you will

· Determine the scope and levels of service the CSIRT would provide

· Staffing Recommendations – identifying and procuring personnel, equipment, and infrastructure requirements for the CSIRT

· Identify and utilize existing information security technical staff and resources to support the CSIRT activities (when needed)

· Identify any needed external resources needed

· Develop what you believe are the top 5 key CSIRT policies and procedures (based on best practices and everything you have reviewed and learned in this course, and any additional resources needed) that should guide all other policies and processes, given iFinance’s industry, size, structure, etc.

· Define the CSIRT reporting structure, authority, and organizational model to ensure that the team has the access, funding, and a clear mandate

· Estimate the amount of additional funding needed to implement and maintain the CSIRT

· Communications plan to make security a priority for iFinance’s many employees in offices distributed throughout 25 states

· Establish a proposed timeline for implementing the CSIRT

· Conduct research to establish ROI

· Find examples of cybersecurity incidents in similar organizations

· To identify the total cost of an incident, consider the direct costs of manpower, equipment, and lost production time, and also other indirect costs, such as the potential cost of lost business and damage to the company’s reputation and brand image.

Part 1 – Case Study Write-up Rubric:

200 points total:

15 points — 3 scholarly, peer-reviewed references

10 points – APA formatting throughout the paper

10 points – Mission & Vision Statement

10 points – Key Stakeholders

10 points – Scope of Services

10 points – Staffing Recommendations

10 points – CSIRT Organizational Structure/Reporting

50 points – Key Policies/Best Practices

15 points – Funding Request/Estimate

25 points – Communication Strategy

10 points – Proposed Timeline

25 points – ROI research/rationale

Part 2 (This will occur during your Day 3 session) Armed with support from key stakeholders, knowledge of best practices currently being used in incident management, an understanding of the current and potential threats to iFinance, and a vision and plan for implementing a CSIRT, it is now time to make the business case to the Chief Technology Officer (CTO), Chief Operations Officer (COO), and the Chief Legal Counsel to finalize plans for funding and staffing an operational CSIRT. You should present a well-researched, compelling rationale that includes existing/pending government regulations, the costs of attacks (direct and indirect costs), and a proposed timeline, budget, and organizational structure for the CSIRT and how it fits into the organization.

Your team will be given time to discuss each other’ write ups, and you can mash up the best aspects of your write ups into one team framework. Your team will then present your CSIRT proposal. Remember, communication and internal buy-in is key to your role as managers and executives on all projects. You are not merely presenting facts, you are “selling” your proposal in a persuasive presentation.

Guidelines/Rubric 50 points

· Your presentation should be 10 minutes in length, including a clear introduction and conclusion, which clear supporting arguments.

· Be free from grammar and spelling errors, and avoid too much text per slide

· Slides include compelling and professional graphics.

· The presentation is persuasive, presenting a clear need for the CSIRT, a well-developed rationale for the team’s proposal as a solution to the need

· Every member of the team should present in a balanced and well-coordinated presentation, and prepare for up to 10 minutes of Q&A by your classmates

Case adapted from: https://www.cert.org/incident-management/publications/case-studies/afi-case-study.cfm

The post Establish a proposed timeline for implementing the CSIRT appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Make a file with data organized without extraneous rows and columns but including headings.

Make a file with data organized without extraneous rows and columns but including headings.

For this assignment, you will need to become familiar with specialized business intelligence (BI) software, then download the software. Complete the following steps to begin:

Step 1: Watch an instructional video on the BI software.

Step 2: Review various BI Software options including Tableau; Excel or other Business Intelligence. Search the CTU Library and the internet to learn about optional software.

Step 3: If you choose Tableau, download the Tableau BI software. After you select the link, look for the orange icon in the middle portion of your screen to begin the download or use any Business Intelligence software to create at least 2 graphs illustrating at least 2 comparisons between the US and zip code data.

Consider the following scenario, continued from the Unit 1 Individual Project:

Big D Incorporated needs to prepare an assessment regarding the feasibility of making a recommendation for expansion into another market. As the Business Analyst, your assignment is to prepare a short presentation for the Board of Directors that apply concepts learned in Unit 1 and concepts from Unit 2 to make the necessary recommendations and justifications for those recommendations. You will need to compare and contrast the varying markets in order to make the best recommendation possible. Complete the following:

Click here to download the reports for the United States. The Web site provides free demographical services where one can choose from a variety of criteria and generate reports based on the U.S. Census data. This particular file contains 4 reports: General Summary, Census Trend 1980 to 2000 Summary, Occupation and Employment Summary, and Income Summary based on the entire United States.

Click here to download the reports for zip code 60614. This particular file contains 4 reports: General Summary, Census Trend 1980 to 2000 Summary, Occupation and Employment Summary, and Income Summary based on the U.S. zip code 60614.

Using all 4 demographic reports (General Summary, Census Trend 1980 to 2000 Summary, Occupation and Employment Summary, and Income Summary) for the United States and zip code 60614, prepare a 1-page memo explaining how your territory differs from the national profile. Feel free to note anything that you found surprising in this data.

Use the business intelligence software you choose to depict information from these reports.

Prepare a presentation of 5–6 slides of your major findings. You may group a category of data from the Total United States and zip code 60614, and create a graph to show how they differ. The presentation should have at least two graphs and a headline that summarizes a key takeaway from the graph. The last page should contain at least 3 questions that you would want answered based on what you’ve seen in this comparison.

Your presentation should include 5–6 slides in PowerPoint, plus title and reference slides with speaker notes (200–250 words per slide).

For assistance with the usage of Tableau for analysis and reporting, review and use the following instructions. This should be helpful if you are having problems with the software usage or with problems with the data. But, you do not need to use Tableau. For BI software usage such as Excel, resort to using the Help functions and other resources on the internet and in videos to learn how to use Excel to create graphical presentations including table usage.

Instructions to Create Bar Graph in Tableau (optional) or in another BI Software.

Open the assignment CTU instructions.

Download Business Intelligence Software.

Create your Tableau Public Account.

Click the download link for the zip code (60614) file (file will open in Excel).

Click the download link for the US file (file will open in Excel).

The following are some options:

Create separate demographical worksheets. For example: Education Attainment File – Worksheet (include both Zip Code and U.S. data); Household Income (include Zip Code and U.S. data)

See a sample of the file available with column headings and extraneous blanks.

Household IncomeChicago U.S.198019901980 to 199020001990 to 20001980Median Household Income18,43841,2271.23669,3110.68116,902Average household Income24,24567,6071.788114,6150.69520,382Per Capita Income13,56438,5181.8463,7910.6567,321

See a sample of the file available with column headings and extraneous blanks.

2000 Educational AttainmentU.S.ChicagoCollege: Associates Degree6.3%1.9%College: Bachelor’s Degree15.5%44.2%College: Graduate Degree8.9%34.0%College: Some College, no Degree21.1%8.7%School: 9th to 11th grade, no diploma12.1%3.2%School: Grade K-96.1%2.0%School: High School Graduate28.6%5.6%

Create a file with data organized without extraneous rows and columns but including headings.

The idea is to clean up the file before usage. Separating files and worksheets may be the best way to make this happen

Note in the real situation, when using BI software, you will want to ensure your data are clean and you have similar data in your files.

Save the file(s) on your computer.

Open Tableau. Then do a File > Open > Open your saved file.

At the bottom of the screen on the left, click on the little box next to Sheet 1 (looks like a bar graph with a plus in the top left corner).

Under Measures (on left), you should see Chicago and U.S. Click on U.S. and pull it into rows at the top of the screen. Then click on Chicago and pull it over into rows.

Under Dimensions on the left, you should see Household Income. Click on Household Income and pull it into column.

Now in the second column from the left, you should see measures.

In the top right corner, you should see a “show me” box illustrating ways you can view the data based on the values you have chosen. To do side-by-side comparisons, put your cursor over the rightmost picture on the third line with the side-by-side blue and orange bars. Click on it. Your graph should appear on the page. You can play around with how you want to portray your data.

To save in Tableau Public, click File > Save to Tableau Public as… > give the file a descriptive name. You will be asked to log into Tableau Public using your e-mail and password.

When your graph is saved in public, at the bottom right, there is a download button. Decide how you will save the file. (You can create an image and name the .png file. It will be saved in tableau public.)

After the file is saved, open the .png file, and edit or copy the graph.

Open your PowerPoint file, then paste (special) it on the slide. You can adjust the size.

Repeat the same in Tableau opening of any other prepped and cleaned file.

Note: Measure values are your number fields; measure names are the descriptors.

Please submit your assignment.

For more information on creating PowerPoint Presentations, please visit the Microsoft Office Applications Lab.

Additional Resources

American Marketing Association. (n.d.). Summary reports. Retrieved from http:/www.marketingpower.com/content753.php

Igines. (2012, December 9). How to make a line graph in Excel (Scientific data) [Video file]. Retrieved from https://www.youtube.com/watch?v=Xn7Sd5Uu42A

Microsoft. (2018). Create a chart from start to finish. Retrieved from https://support.office.com/en-us/article/Create-a-chart-from-start-to-finish-0baf399e-dd61-4e18-8a73-b3fd5d5680c2

References

Pak, A. (2013, August 12). Tableau Public – Overview and Applications [Video file]. Retrieved from http://youtu.be/PnkMiHocqRw

Tableau. (2018). Tableau public. Retrieved from http://www.tableausoftware.com/public/

The post Make a file with data organized without extraneous rows and columns but including headings. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Psychology is a science and is based on scientific methodologies.

Psychology is a science and is based on scientific methodologies.

Things to know:

Primary sources are the actual articles written by the individuals doing the study.

Secondary sources are articles written about the study (e.g., newspapers, magazines, blogs, Wikis, and trade journals).

South University online library has extensive databases that should be used to find primary source articles. For help in finding articles, please click on the link to the Library where you will find research guides and information about how to ask for help.

The difference between Primary vs Secondary resources

How to do an article search (Library Search Quick Guide)

Video guide to finding Scholarly/Peer Reviewed articles

Locate one primary source study article that deals with behavior or psychology in general.

The article should not be more than 5 to 6 years old.

For your report, please provide a summary of the article that includes the purpose of the study (usually located in the beginning of the study), participants, methodology, and results. Conclude your report with your thoughts on the study.

Submit your essay in a Microsoft Word document to the Submissions Area by the due date assigned. Cite your sources, if any, on a separate page using the APA format.

Name your document SU_PSY1001_W1_Project_LastName_FirstInitial.doc.

The post Psychology is a science and is based on scientific methodologies. appeared first on graduatepaperhelp.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"