## Assignment Content 1. Purpose This assignment provides an opportunity to develop

Assignment Content 1. Purpose This assignment provides an opportunity to develop, evaluate, and apply bivariate and multivariate linear regression models. Resources: Microsoft Excel®, DAT565_v3_Wk5_Data_File Instructions: The Excel file for this assignment contains a database with information about the tax assessment value assigned to medical office buildings in a city. The following is a list of the variables in the database: o FloorArea: square feet of floor space o Offices: number of offices in the building o Entrances: number of customer entrances o Age: age of the building (years) o AssessedValue: tax assessment value (thousands of dollars) Use the data to construct a model that predicts the tax assessment value assigned to medical office buildings with specific characteristics. o Construct a scatter plot in Excel with FloorArea as the independent variable and AssessmentValue as the dependent variable. Insert the bivariate linear regression equation and r^2 in your graph. Do you observe a linear relationship between the 2 variables? o Use Excel’s Analysis ToolPak to conduct a regression analysis of FloorArea and AssessmentValue. Is FloorArea a significant predictor of AssessmentValue? o Construct a scatter plot in Excel with Age as the independent variable and AssessmentValue as the dependent variable. Insert the bivariate linear regression equation and r^2 in your graph. Do you observe a linear relationship between the 2 variables? o Use Excel’s Analysis ToolPak to conduct a regression analysis of Age and Assessment Value. Is Age a significant predictor of AssessmentValue? Construct a multiple regression model. o Use Excel’s Analysis ToolPak to conduct a regression analysis with AssessmentValue as the dependent variable and FloorArea, Offices, Entrances, and Age as independent variables. What is the overall fit r^2? What is the adjusted r^2? o Which predictors are considered significant if we work with a=0.05? Which predictors can be eliminated? o What is the final model if we only use FloorArea and Offices as predictors? o Suppose our final model is: o AssessedValue = 115.9 + 0.26 x FloorArea + 78.34 x Offices o What would be the assessed value of a medical office building with a floor area of 3500 sq. ft., 2 offices, that was built 15 years ago? Is this assessed value consistent with what appears in the database? Submit your assignment.

## You and your partners are security consultants assigned to perform an informatio

You and your partners are security consultants assigned to perform an information security policy and governance assessment of City of Omaha. You can found all policy post under this link: https://hr.cityofomaha.org/public-documents/hr-policies. And please free use ant source you found, there are no limit.
You need to complete an assessment of the organization, write a report summarizing your findings, and give a short presentation to senior management on your findings. So except the 5 page paper, you also need to produce a 3 slide powerpoint summarize your findings.
And I attached an rubrics, please match all of them.
PART 1: Overview and Security Governance (5 Pages; 50 POINTS)
Choose an organization with publicly-available security information (examples include Government, University, or other public entity). Develop an overall understanding of the security governance for the organization that contains information about your client, its governance objectives, and the security policy profile. If you are unable to locate one or more of the items below, then provide statement of justification.
This section should include the following components:
Executive Summary (2 pages) of your client organization does. Be sure to include at least the following elements:
Client’s critical technology services (3-5 key services)
How does IT support the organization to achieve the stated goals and manage/protect the organization?
Legal/Regulatory Environment
Provide a summary of the legal and regulatory environment that applies to the organization.
Be sure to include any applicable laws (e.g. FERPA, HIPPA), regulations, and industry-specific frameworks.
Risk Appetite / Tolerance Statements
Provide a summary of client’s overall risk appetite (This may not be explicitly stated – you may have to infer from evidence gathered.)
Provide a summary of all supporting risk tolerance processes.
Security Governance (Both business and IT)
What is the current state maturity of the client’s security governance processes, including composition of security committees, reporting relationships and security risk management processes?
Are you able to determine the security governance priorities?
Can you provide a summary of how risk appetite directs the client’s security program?
Security Policy Governance and Framework
Provide a summary of the organization’s security policies, including what security framework they leveraged, if any, (NIST, CIS, etc. if any), source of their policies, and any other pertinent information.
Internal Audit
What is the client’s audit process, including development of audit program, reporting relationships (including management and audit committee)?
Compliance
What is the client’s compliance process?
How do they ensure they are compliant with their security policies and standards?

## You and your partners are security consultants assigned to perform an informatio

You and your partners are security consultants assigned to perform an information security policy and governance assessment of City of Omaha. You can found all policy post under this link: https://hr.cityofomaha.org/public-documents/hr-policies. And please free use ant source you found, there are no limit.
You need to complete an assessment of the organization, write a report summarizing your findings, and give a short presentation to senior management on your findings. So except the 5 page paper, you also need to produce a 3 slide powerpoint summarize your findings.
And I attached an rubrics, please match all of them.
PART 1: Overview and Security Governance (5 Pages; 50 POINTS)
Choose an organization with publicly-available security information (examples include Government, University, or other public entity). Develop an overall understanding of the security governance for the organization that contains information about your client, its governance objectives, and the security policy profile. If you are unable to locate one or more of the items below, then provide statement of justification.
This section should include the following components:
Executive Summary (2 pages) of your client organization does. Be sure to include at least the following elements:
Client’s critical technology services (3-5 key services)
How does IT support the organization to achieve the stated goals and manage/protect the organization?
Legal/Regulatory Environment
Provide a summary of the legal and regulatory environment that applies to the organization.
Be sure to include any applicable laws (e.g. FERPA, HIPPA), regulations, and industry-specific frameworks.
Risk Appetite / Tolerance Statements
Provide a summary of client’s overall risk appetite (This may not be explicitly stated – you may have to infer from evidence gathered.)
Provide a summary of all supporting risk tolerance processes.
Security Governance (Both business and IT)
What is the current state maturity of the client’s security governance processes, including composition of security committees, reporting relationships and security risk management processes?
Are you able to determine the security governance priorities?
Can you provide a summary of how risk appetite directs the client’s security program?
Security Policy Governance and Framework
Provide a summary of the organization’s security policies, including what security framework they leveraged, if any, (NIST, CIS, etc. if any), source of their policies, and any other pertinent information.
Internal Audit
What is the client’s audit process, including development of audit program, reporting relationships (including management and audit committee)?
Compliance
What is the client’s compliance process?
How do they ensure they are compliant with their security policies and standards?

## Report: Using the output that you created in SPSS ( the charts I included in the

Report: Using the output that you created in SPSS ( the charts I included in the document attached) , at the top of the same document, describe the analysis and provide conclusions. The report should be in paragraph form, using language appropriate to data analysis. Each numbered set of questions should be answered in a separate paragraph.
Begin your report with an overview of the analysis: what are the goals of the study? What are the relevant variables, and how did you analyze them?
Describe the three variables by referring to the frequency distribution results for the original and new normality statistics. Pay special attention to the skewness and kurtosis, as well the histogram with the normal curve.
Analyze the two scatter plot graphs you made with the newly transformed variables. Discuss if it looks like urbanized nations are more likely to have higher Gross Domestic Products and Gross National Incomes. Compare these results to those of the non-normalized variables.
Draw conclusions from the analysis by summarizing the research question.