Purpose
This assignment allows you to define cybercrime and the categories included under cybercrime. You will then examine laws related to cybercrime from three different countries and compare and contrast those laws. You will discuss the ethical dilemmas that can arise from these differences.
Assignment Instructions
Define cybercrime and the categories of cybercrime.
Research how cybercrime (either in general or with respect to certain crimes — e.g., hacking, identity theft, cyberstalking) is handled in at least three different countries (one can be the United States).
Compare and contrast each country’s laws. What ethical issues arise as a result of differences in cybercriminal prosecution across cultures?
How will your understanding of the differences among cultures affect your ability to make decisions within your company?
Assignment Requirements
Your paper should be a minimum of 3 double-spaced pages.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.
Category: Computer Science homework help
IT591-3: Apply auditing processes within a technical scenario. Purpose This
IT591-3: Apply auditing processes within a technical scenario.
Purpose
This assignment helps you learn how to prepare for a specific audit, in this case, the PCI-DSS audit. You will use the PCI-DSS Self-Assessment Questionnaire D for Merchants (Version 4.0 (Available in your readings) and become familiar with the various sections that the audit will cover, and what preparation must occur to ensure compliance within each section.
Assignment Instructions
Use the link to the PCI-DSS self-assessment questionnaire (SQA-D) for Vendors (V. 4.0) provided in this week’s readings and use this information to complete the assignment.
Consider the PCI-DSS self-assessment questionnaire D for Merchants (V. 4.0) which a typical retail merchant would have to show compliance in order to continue doing business with credit cards.
Review the questions associated with four different requirements of the twelve covered by the assessment questions (specifically sections 3, 8, 9, and one other section of your choice)
For each section explain:
The purpose of that section, why it is important, and what these questions seek to achieve.
Pick any three questions in that section and explain:
What the question means
What evidence would be needed to show compliance
Whether it would be easy or difficult to achieve compliance and why
Do not pick three that are all easy
Summarize your impressions of the questions for this section and discuss how a merchant would establish or maintain compliance.
For any question that you examined in item 2 above, (which was deemed hard to comply with) assume that you cannot fully meet the requirement and draft up a half-page compensating control (Refer to Appendix B) that would substitute for a fully compliant response.
Write a 1-paragraph summary about what you learned from this exercise.
Assignment Requirements
5–6 pages of content (exclusive of the cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s).
At least 1 credible source cited and referenced
No more than 1 table or figure
No spelling errors
No grammar errors
No APA errors
IT590-2: Discuss recent legislation related to ethical computing. Purpose Thi
IT590-2: Discuss recent legislation related to ethical computing.
Purpose
This assignment allows you to place yourself in an ethical dilemma related to data security and privacy. You will analyze the scenario from a number of ethical perspectives, identify laws that are relevant for this scenario, and decide how you would respond to the situation.
Assignment Instructions
Select from one of the following scenarios:
You are the IT administrator for your company. One of the employees discovers a loophole in the security whereby the employees may access the personnel records of other employees in the company. Personnel records include names, addresses, Social Security numbers, disciplinary actions, annual reviews, and salary information. You are working on a time-sensitive project and do not fix the problem for 2 weeks. As you are fixing the problem, you note that several employees have accessed personnel records using the loophole.
You are the CIO of a large national auto retailer. As a part of your service, you offer auto loans through your dealerships. This requires your company to collect and store personally identifiable information on your customers. Additionally, you store customer bank account and credit card information so that customers can use automatic payment options for their loans. Recently, your company has been hacked, and a significant number of client accounts have been breached. The CEO is demanding that the IT group handle this privately rather than reporting the breach for fear that publicizing the information will have a negative effect on quarterly earnings.
Complete the following for your chosen scenario:
Analyze your chosen scenario from the aspect of computing ethics and privacy ethics.
Discuss the ethical dilemma from the perspective of societal ethics, organizational ethics, and individual ethics.
Research on the Internet to determine what data security and privacy laws are relevant in this scenario.
Describe each law and consequences for violation of the law.
Discuss the reputational and financial impact this scenario might have on the organization.
From the perspective of the IT administrator in Scenario 1, or the perspective of the CIO in Scenario 2, how would you respond to the situation? Justify your response from an ethical and legal perspective.
Assignment Requirements
Your paper should be 2–3 double spaced pages in length.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.
Using either the Wall Street Journal or U.S. Newsstream, search for the term “ph
Using either the Wall Street Journal or U.S. Newsstream, search for the term “physical security breach.” Select two news articles on the search topic that were posted within the last six months.
For each of the articles answer the following questions
Summarize, concisely, the key details of the physical security breach described in the articles
Describe, clearly and accurately, the steps that were taken in the articles, or are being taken, to alleviate the effects of the breaches after the fact or to resolve each issue
Explain whether the physical security breaches were preventable, why or why not, and if preventable, what preventive steps could have been taken
Describe physical access security best practices that could have been used to prevent the breaches, citing specific, credible sources of best practices
Perhaps one of the business areas that faces the greatest risk each day is th
Perhaps one of the business areas that faces the greatest risk each day is the lending industry. Banks, mortgage companies, and other types of lenders face one specific risk many times every day: Are they going to be paid back when they make a loan? Organizations that make their money by lending money must be able to anticipate risk and predict the likelihood that they will be paid back, with interest, or else their business model will fail and they will have to close their doors. In this Assignment, you will use R with two data sets to predict the risk of loan default for a lender, and then report and explain your results.
Assignment Instructions
Complete the following steps:
Using the university’s online Library and Internet resources, research the lending industry. In a Word document, prepare a risk management plan outline for loan default risk faced by lenders. Include all five parts of risk management planning: Identification, Understanding, Data Preparation, Modeling and Application. Cite all sources used to prepare your risk management plan.
Download the Loans.csv and Applicants.csv files. Import both of these as data frames into RStudio. Give each a descriptive name. Show this in your Word document.
Using the Loans.csv file, build a logistic regression model to predict the “Good Risk” dependent variable (use family=binomial() in the glm function in R). In this column, ‘1’ indicates that making the loan is a good risk for the lender; ‘0’ indicates that making the loan is a bad risk. Make sure that you do not use the Applicant ID as an independent variable! You will need to load the MASS package in R by issuing library(MASS), before using the glm function to build your model. Show the creation of the model in your Word document.
In your Word document, document your logistic model’s output, and specifically explain which independent variables have the most predictive power and which have the least. Make sure you identify how you know, and explain why it matters.
Apply your logistic regression model to the data in Applicants.csv to generate predictions of “Good Risk” for each loan applicant. If your glm model is stored in an R object called ‘LoanModel’, for example, and your Applicants.csv data is in a frame called ‘Appl’, then you would issue a command that looks like this: LoanPredictions <- predict(LoanModel, Appl, type=“response”). Document the application of your model to the Applications data in your Word document.
In your Word document, interpret your predictions for the Applicants.csv data. Specifically address the following:
How many loans do you predict to be a good risk for the lender?
How many are predicted to be a bad risk?
What are your highest and lowest post-probability percentages for predictions?
How many loans have at least a 75% post-probability percentage and what does that mean for the lender?
How many loans have less than a 25% post-probability percentage and what does that mean for the lender?
Suppose that the lender is willing to accept a little higher risk and has decided they will make loans to applicants who have post-probability percentages between 40% and 65%. List two things the lender could do to mitigate risk when lending to this group, and explain how these will help.
Make sure that you cite at least five supporting sources beyond the textbook in support of your writing and explanations. Cite correctly in APA format.
Assignment Requirements
Prepare your Assignment submission in Microsoft Word following standard APA formatting guidelines: Double spaced, Times New Roman 12-point font, one inch margins on all sides. Include a title page, table of contents and references page. You do not need to write an abstract. Label all tables and figures. Cite sources appropriately both in the text of your writing (parenthetical citations) and on your references page (full APA citation format).
For more information on APA style formatting, refer to the resources in the Academic Tools section of this course.
Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.
Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.
Why is generative adversarial network a key turning point in the history of generative modeling?
Why is the field of image generation important?
Purpose In this assignment, you will analyze recent legislation related to pr
Purpose
In this assignment, you will analyze recent legislation related to privacy and evaluate the impact of that legislation on an organization.
Assignment Instructions
Assume you are an IT security specialist for a large U.S. online retail organization that does business internationally. Your CIO has asked you to thoroughly review the General Data Protection Regulation (GDPR) in the European Union. He wants to understand exactly what the organization must do to comply with this regulation when doing business with EU customers.
Provide a detailed discussion about the rules for businesses and the rights of EU citizens.
Include a discussion of the following:
What does the GDPR govern?
What rights do EU citizens have with regard to their data?
What is considered personal data under this regulation?
What is considered data processing under this regulation?
Describe the role of the data protection authorities (DPAs).
Discuss, in detail, how the GDPR will change business and security operations for your organization. Provide the CIO with a recommended checklist for GDPR compliance, and discuss processes and policies that may need to be changed in order to comply with GDPR.
In your conclusion, address what you think will be the financial impact to the organization, both in terms of compliance and any lack of compliance.
Assignment Requirements
The paper should be 3–4 pages.
Use Times New Roman 12 pt font.
Use APA formatting for paper, citations, and references.
Be sure to cite your sources and provide the appropriate references.
Purpose Regulations, standards, and frameworks are complex. Doing a deep dive
Purpose
Regulations, standards, and frameworks are complex. Doing a deep dive into one of those standards, Zero Trust will allow you to learn how to read a standard thoroughly and what elements of the standard are essential, as well as how to locate those elements within the written standard. You will also evaluate the effectiveness of a standard, providing supporting examples.
Assignment Instructions
Use the materials from your reading, particularly the material specific to CISA’s Zero Trust Model and NIST 80-207 Zero Trust Architecture. In addition, research the Internet to provide the required responses.
Provide an in-depth explanation of the following about the Zero Trust model and framework:
Explain the events that led to the development of the Zero Trust Model.
Explain the goals that the model seeks to achieve.
Provide an overview of the IT and Cybersecurity departments’ role in achieving Zero Trust.
Explain how audits and assessments help achieve or measure compliance.
What is required to comply with NIST 800-207?
What challenges exist when moving to the Zero Trust Model?
Assess the value of the Zero Trust Model as organizations move to cloud-based assets, remote workers, and Bring Your Own Device (BYOD) environments.
Conclusion
Assignment Requirements
4–5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s)
At least 1 credible source cited and referenced
No more than 1 table or figure
No spelling errors
No grammar errors
No APA errors
1. A medical device dealer in the local area wants to make an accurate forecas
1. A medical device dealer in the local area wants to make an accurate forecast of demand for Super Sonic II Wheelchairs during the next month. Because the manufacturer is in Japan, it is difficult to send wheelchairs back or reorder if the proper number is not ordered a month in advance. From past sales records, the dealer has accumulated the following data on the Super Sonic II Wheelchairs over the past year:
MonthWheelchair SalesJanuary9February7March10April8May7June12July10August11September12October10November14December16
Compute a 3-month moving average forecast of demand for April through January (of the next year).
Compute a 5-month moving average forecast of demand for June through January.
Compare the two forecasts of the 3-month and 5-month using MAD. Which forecast method should the dealer use?
2. The Big City Hospital has experienced the following occupancy rates during the past 9 months:
MonthOccupancy Rate (%)183278375481586685789890986
Compute the exponential smoothing forecast with alpha=.2
Compute the exponential smoothing forecast with alpha=.2 and beta=.3 (you can use the results of first part and just add beta calculation)
Computer linear trend line forecast
Compare three forecasts using MAD and indicate which appears more accurate
In this module, you learned about how an OS can exist on a virtual machine. For
In this module, you learned about how an OS can exist on a virtual machine. For example, you might use a MacBook and have macOS Catalina as the operating system installed on it. Then you might use Windows 10 as a virtual desktop on a virtual machine. This capability allows you to utilize both OSes on one computer. As you complete this module’s discussion, you and your peers will reflect on the value of virtualization, specifically in relation to operating systems.
In your initial post, address the following:
Provide an example of when an organization or an IT professional might choose to implement an operating system via virtualization, and explain how that example meets organizational needs.
In response to two of your peers, address the following:
If you agree, build upon the original poster’s claims and further the discussion. If you disagree, state your own argument in a constructive way.
Then answer the following questions:
Why is virtualization important, especially in relation to OSes? What makes virtualization important?
How is virtualization being used in the workplace today?
FOR OTHER FRIENDS REPLIES
1. There are many instances, within organizations, that call for using virtualization. One example would be two organizations collaborating, however, one organization (we’ll call them organization B) still uses legacy software that is specific to their older OS. Organization A could revert all their systems back to that version but the expense and practicality of it would be a nightmare to execute. Instead, organization A can simply use a virtualization machine that is based in a main computer or server and has instances set up across the organization where it is needed. The reason for having a VM set up on main server or computer is so that you only need one firewall to regulate all the packets to and from the VM. Then you set up a internal VM network on all company computers and run those instances through the firewall VM which is external (allows for internet connection).
This solution will allow organization A to use organization B’s legacy software without great expense or technical headaches. Ultimately leading to a successful, and ideally profitable, collaboration.
2. Imagine a situation where a company needs to run multiple operating systems on the same physical server for different purposes. By using virtualization, they can create multiple virtual machines (VMs) on a single physical server, each running its operating system.
This fulfills organizational needs in several ways:
1. **Resource Efficiency**: Virtualization allows better use of hardware resources by consolidating resources and reducing hardware costs and energy consumption.
2. **Isolation**: Each VM operates independently, enhancing system reliability and stability.
3. **Flexibility**: Virtualization offers the flexibility to quickly deploy and scale environments as needed.
4. **Security**: Virtualization can enhance security by isolating sensitive applications or environments.
Overall, implementing operating systems via virtualization allows organizations to optimize resource usage, increase flexibility, improve security, and streamline IT management processes, effectively meeting various organizational needs.