Develop policies that document the minimum security requirements for Regional Bank covering its financial system and customer-facing online web service.

Creating Policies for Systems and Web Services

You have been hired as a security consultant to develop policies that document the minimum security requirements for Regional Bank covering its financial system and customer-facing online web service.

 

Part 1: Regional Bank Financial Software System (RBFSS)

Regional Bank has an accounting system that tracks its revenue, accounts receivable, accounts payable, and employee payroll.

Write a 2- to 3-page security policy for RBFSS in which you describe:

  • Access control-based user roles for each component (accounts receivable, accounts payable, employee payroll)
  • Password requirements and protection
  • Password protected screen savers
  • Data encryption at rest

Annotate each security control with at least one Critical Security Control (CSC) from the Center for Internet Security (CIS).

 

Part 2: Regional Bank Financial Software System (RBFSS)

Regional Bank has an online web-based service for its customers that allows for online banking.

Write a 1- to 2-page security policy for the RBFSS web-based online banking system that includes a brief description of the following security controls:

  • Authentication method for customers to log in
  • Encryption of data in transit
  • Web browser security
  • Deployment of anti-malware software

Annotate each security control with at least one Critical Security Control (CSC) from the Center for Internet Security (CIS).

Annotate at least one OWASP Top 10 security risk that could be associated with each of the security controls above.

Select two articles with different positions from your search(max 50 words) Provide the reason for your choice. Analyze two different articles relating to your ethical theory.

SOCIAL FACTORS IN DRUG DEV- APA STYLE ESSAY

Three Rs – Animals testing
To carry out an analysis of the topic chosen, To make and justify an evaluative, comparative or explicatory judgment. To develop critical thinking ability and analytic skills, and written communication skills. To conclude with the approach that exemplifies a student’s learning attitude.

Find at least 5-10 articles on the topic selected. After selecting the articles, summarise your research to include the following( 150- 250 words):

  • Search engines used(e.g. Pubmed, Google scholar, Ryerson library etc.)
  • Keywords used for your search

Summary of the findings.

Select two articles with different positions from your search(max 50 words) Provide the reason for your choice. Analyze two different articles relating to your ethical theory. (max 1200 words)

Consider, Whether each article provides sufficient research and evidence to support its claims. Whether the articles make connections or references to the students learning about the topic in the lectures/class discussions. Whether there are gaps or questions, the author leaves unanswered. Whether the articles consider alternative points of view and exceptions.

Conclusion- Draft a list of similarities and differences between the rhetorical strategies and conclusions of the two articles.

Discuss/define the data independence concept provided by the three-schema database systems architecture. What are the two types of data independence? Which type is much harder to achieve and why?

Discussion Board

Purpose
In this discussion board, you will post your answer to the question. You will also read and respond to other classmate’s postings. This is an excellent way for you to interact with your colleagues and to share your thoughts about the question answer in a critical way.

Action Items
Access the discussion forum for this assignment by clicking on the discussion forum title.

Click on “Create Thread.”

Enter a title for your question in the “Subject” line.

Type your response into the message field to the following discussion prompt:

1. Discuss/define the data independence concept provided by the threeschema database systems architecture. What are the two types of data independence? Which type is much harder to achieve and why?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer and stating which points you agree or disagree with.

Which programming languages or paradigms are expected to become more popular in the next decade? How will the rise of low-code and no-code development platforms affect the job market for traditional software developers?

The Future of Programming: Trends and Predictions for the Next Decade

  1. Which programming languages or paradigms are expected to become more popular in the next decade?
  2. How will the rise of low-code and no-code development platforms affect the job market for traditional software developers?
  3. What are some potential challenges or risks associated with the widespread adoption of artificial intelligence and machine learning in programming?
  4. Are there any new programming languages or frameworks on the horizon that could disrupt the current landscape?
  5. How will the increasing focus on security impact the way programmers approach their work?
  6. Will the demand for programming skills continue to increase in the next decade, and if so, what areas are expected to see the most growth?
  7. How will the evolving technology landscape impact the way programmers collaborate and work together in teams?

Create a conditional distribution for each of the input variables with respect to output. Comparing the plots for Sulphates and Alcohol, which one do you think is more predictive of the wine quality, and why?

Wine-Tasting Machine

In this assignment, we will practice building supervised machine learning with Logistic Regression (LR), Naïve Bayes (NB), Support Vector Machine (SVM), and Decision tree (DT), Random Forest (RF) classifiers, as compared with simple/baseline methods such as OneR and ZeroR. The data for this exercise comes from the wine industry. Each record represents a sample of a specific wine product, the input attributes include its organoleptic characteristics, and the output denotes the quality class of each wine: {high, low}. The labels have been assigned by human wine-tasting experts, and we can treat that information as “ground truth” in this exercise.  Your job is to build the best model to predict wine quality from its characteristics, so that the winery could replace the costly services of professional sommeliers with your automated alternative, to enable quick and effective quality tracking of their wines at production facilities. They need to know whether such change is feasible, and what extent of inaccuracies may be involved in using your tool.

 

You will be asked to run experiments in both WEKA and Python.

You are given two datasets red-wine.csv and white-wine.csv: Dataset folder

 

Deliverable:

  • A word doc with answers (including screenshots) to blackboard
  • Python Notebook to be uploaded to GitHub and shared the link in the above Google doc

 

WEKA Tasks (50 points)

 

  1. Load red-wine.csv into WEKA (15 points)
    1. Create a conditional distribution for each of the input variables with respect to output (click the “visualizing all” button, making sure you set the output correctly)
    2. Comparing the plots for Sulphates and Alcohol, which one do you think is more predictive of the wine quality, and why?
    3. Verify your answer by using a logistic regression model, is it consistent with your speculation in (b)? (hint: here you may use univariate logistic regression, the better performance, the more predictive a feature is. AUC is a good score for this purpose)

 

  1. Fit a model using each of the following methods and report the performance metrics of 10-fold cross-validation using red-wine.csv as the training set (25 points)
Model ZeroR OneR LR NB DT SVM RF

 

AUC N/A N/A          
Accuracy              

 

  1. Obtain the ROC curve for the best-performing model in terms of AUC score from the experiment above, paste a screenshot here and comment on its performance (5 points)
  2. Using the best model obtained above in WEKA and run the model on white-wine.csv and report the AUC score, comment on the performance.  (hint: see WEKA reference section on how to get performance on an external independent test set) ( 5 points)

 

 

Python Tasks (50 points)

Submission:  Upload Python Notebook to GitHub links as homework 1

  1. Read  red-wine.csv into Python as a data frame, use a pandas profiling tool (https://github.com/pandas-profiling/pandas-profiling) to create an HTML file, and paste a screenshot of the HTML file here (10 points)
  2. Repeat the same experiments in WEKA Question 2,  and report the same metrics as in Question 2. To receive full credit, you will need to write a script to assemble the result as above in the form of Pandas data frame. Paste a screenshot of your result from your Python notebook here. Please make sure that there is a reasonable number of significant digits in reporting your output. (20 points)
  3. Plot the ROC curve of the Random Forest classifier from the Python package, and paste a screenshot of your ROC curve here (10 points)
  4. Using the best model obtained above in Q2 (python)  and running the model on white-wine.csv and reporting the AUC score, comment on the performance. (5 points)
  5. Suppose all the models have comparable performance, which model would you prefer if the wine-tasting experts would like to gain some insights into the model? Note: there could be multiple model types fitting this criterion. (5 points)

Write a short paper on your opinion of what the occupancy of The Station should have been.

CASE STUDY

Write a short paper on your opinion of what the occupancy of The Station should have been given the following:

In the NFPA Life Safety Code power point:

  • Slides 82 and 83 list the minimum square footage per person given what the building is utilized for.
  • Slide 119 shows the floorplan of the Station and gives the usable square footage as 2300 square feet. ( space able to be occupied by the public)

The occupancy set by the Fire Marshal was 404 people ( a little more than 5 square feet per person )

  • Slide 124 shows that for Concentrated Use ( 7 sq ft per person) , the occupancy would be 329
  • it also shows that for Less Concentrated Use ( 15 sq ft per person), the occupancy would be 153

You are the Fire Marshal for West Warwick, Rhode Island prior to the fire. Submit a short paper on what number you would set as the occupancy of the building and give a reasoning why.

Identify one example of an organization that created value for itself through outsourcing part of its supply chain. Provide a link to one resource.

Benefits and Risks of Outsourcing the Global Supply Chain

Globalization has created many opportunities for organizations. There are many advantages and ways to create value through outsourcing portions of one’s global supply chain. For each opportunity, there are also many ways for the project to run into problems.

In your initial post, address the following:

  • Identify one example of an organization that created value for itself through outsourcing part of its supply chain. Provide a link to one resource.
    • Identify the benefit that occurred.
    • How did this benefit help the organization create value? Who was the value created for—the organization, or the customer?

In your replies to at least two peers, discuss potential risks of outsourcing for the examples they provided—for example, risks to supplier quality or stability, intellectual property, or reputation. The following questions may help develop your responses:

  • Can you provide an example of an organization that started outsourcing the supply chain and then stopped? What risks did the organization face that caused them to stop the project?
  • Can you provide an example of an organization that outsourced similarly and faced reputational damage due to the project?

 

Discuss/define the data independence concept provided by the three-schema database systems architecture. What are the two types of data independence? Which type is much harder to achieve and why?

Discussion Board

Purpose

In this discussion board, you will post your answer to the question. You will also read and respond to other classmate’s postings. This is an excellent way for you to interact with your colleagues and to share your thoughts about the question answer in a critical way.

Action Items

  1. Discuss/define the data independence concept provided by the three-schema database systems architecture. What are the two types of data independence? Which type is much harder to achieve and why?
  2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer and stating which points you agree or disagree with.

Explain how to manage digital evidence throughout the lifecycle of a case so that it is admissible in court or for use in legal action. List two reasons why digital evidence might be inadmissible. Identify the requirements for acquiring and authenticating evidence.

CYS 663 Digital forensics and investigating

During this module, you explored the topics of forensic methods and labs. Different kinds of cases go through different processes. It is important that the investigator manages digital evidence throughout this process and follows guidelines. Consider the do’s and don’ts of managing digital evidence and respond to the following:

  • Explain how to manage digital evidence throughout the lifecycle of a case so that it is admissible in court or for use in legal action. List two reasons why digital evidence might be inadmissible.
  • Identify the requirements for acquiring and authenticating evidence.
  • Support your viewpoint using sources from the Internet, your textbook, or the Saudi Digital Library.

In preparing your response, include at least one source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference. Also, proofread and spell check your responses. All sources should be formatted using APA guidelines.

You are required to reply to at least two peer discussion question post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post’s answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.

Can you happy with all of your complicated problems and challenges with out any regret?

Can you happy with all of your complicated problems and challenges with out any regret?

  • What is your opinion about your life is it like this?
  • what does it mean complicated problem/challenge?
  • How much did you think about you?
  • Does you afraid risk taking?