Reference no: EM132579560 , Length: 2100 Words
1. Bus ContPlan&DisasRecov Plan -250 words
The discussion posts for this course are in two parts, the Initial Post and the Reply Post.
Initial Post: Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following:
Work Area Recovery Plan is a vital plan that establishes an adequate environment for people towork in the event of a disruptive incident. Discuss the challenges that organizations without proper Work Area Recovery Plan may face when disruptive events arise.
What are the benefits of performing Pandemic risk assessment in an organization?---1 reply 100 words be specific.
2. InfoTech in a Global Economy -250 words
Chapter 17 introduced some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational and Analytical Center, explain how you would use data available to you to prepare a report for the Governor for the State Program "Combating Proliferation of Drugs." Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts.
To complete this assignment, you must do the following:
A) Create a new thread. As indicated above, assume you are an analyst working for the St. Petersburg Informational and Analytical Center. Explain how you would use data available to you to prepare a report for the Governor for the State Program "Combating Proliferation of Drugs." Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts.-- 3 replies 100 words each
3. Emerging Threats &Countermeas - 250 words
Chapter 7 discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.
To complete this assignment, you must do the following:
A) Create a new thread. As indicated above, describe how situational awareness is a driver for detection and response controls. --- 3 replies 100 words each.
4. Information Governance 150 words to Q1 and 150 words to Q2.
Chapter 10 - From this chapter, in addition to the previous Chapters, we continue to enhance our knowledge and understanding about IG best business practices, and how good data governance can ensure that downstream negative effects of poor data can be avoided and subsequent reports, analyses, and conclusions based on reliable, and trusted data could be achieved.
From a risk management perspective, data governance is a critical activity that supports decision-makers and can mean the difference between retaining a customer and losing one. Likewise, protecting business data is protecting the lifeblood of a business. Improving the quality of the data will improve decision making, foster compliance efforts, and yield competitive advantages; thence business profits would be earned. To provide meaningful support to business owners, the Data Governance Institute has created a data governance framework, a visual model to help guide planning efforts and a logical structure for classifying, organizing, and communicating complex activities involved in making decisions about and taking action on enterprise data.
Q1: With this framework in mind that allows for a conceptual look at data governance processes, rules, and people requirements -- identify and name the 10 levels of the DGI Data Governance framework from the Data Governance Institute.-need 2 replies 100 words each
Chapter 11 - According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q2: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?-need 2 replies 100 words each
5. Business Intelligence -250 words
Weekly Post, pick one item and explore - follow APA format writing style.
See Chapter 9. Briefly describe what these "analysis" are and offer 2 benefits examples of each:
"what- if analysis", "sensitivity analysis", and "goal- seeking analysis"
If the manager said, "How many servers will be needed to reduce the waiting time of customers to less than 5 minutes?" What is the best analysis to use? and Why?
or
See chapter 10. Briefly describe the major characteristic of Simulation and list at least 5 advantages of using simulation. (Expound)
or
Go to palisade and examine the capabilities of Evolver. Write a 2-3 para, summary about your findings.
p.s. And Yes, Evolver is available by itself or as part of the Decision Tools Suite, Palisade's complete risk and decision analysis toolkit. Free to explore the software.------need 2 replies 150 words each.
Attachment:- Emerging Threats.rar