Exercise – Prepare a Memo on Topics of Privacy and Data Protection You have land

Exercise – Prepare a Memo on Topics of Privacy and Data Protection
You have land

Exercise – Prepare a Memo on Topics of Privacy and Data Protection
You have landed a position as an intern (paid) for the governor of Virginia.
Assume that Virginia has not enacted any privacy laws to protect the personal information/data of its citizens.
Hearing about recent incidents of thefts and misuse of personal information/data, Virginians have been calling the Governor’s office to angrily complain about the lack of protection of their personal information/data. A large number of the callers believe that their privacy is being violated. As it now stands, their personal information/data is being collected and used by people and organizations – sometimes with and sometimes without their consent. Some citizens express concern about the collection and use of their “biometric data”; others mention something about “PII”; and others call for Virginia to enact a law like the “GDPR”. The Governor wants to understand the problem better and perhaps propose legislation (the Governor is up for re-election in November). The Governor learned that you are taking a Cyber Law course and has turned to you for help understanding the issues.
Prepare a memorandum that addresses the questions below. Be sure to first review chapter 12 of the textbook, related course materials, and conduct some of your own additional research.
Provide a one paragraph overview for the governor that discusses: (1) what is privacy; (2) what are personal information/data protection concerns all about; (3) why protection of personal information/data protection is important to citizens (i.e., what bad things can happen without protection?). Also provide her with examples of biometric data and PII. (Max 10 points)
Provide a paragraph that describes the GDPR: who is covered; what areas does it encompass (broadly speaking) – for instance, the data protection principles it sets forth. (Max 5 points)
Provide a paragraph on what other states are doing to protect privacy. Give a specific example of a law enacted by another state. (Max 5 points)
Provide a paragraph giving your opinion whether Governor Tar-Míriel should push to have Númenor enact a personal information/data protection law or whether she should focus on trying to get the Federal government to pass such a law. Identify and discuss the pros and cons of each course of action. (Max 5 points)
USE COMMON MEMO FORMAT:
To: Governor Commonwealth of Virginia
From: Your name
Subject:
Date:
EVALUATION
The paper is worth 25 points. I will evaluate your paper based on these criteria:
You fully answered all four questions.
The quality, clarity, and thoroughness of your analysis.
The quality and clarity of your writing (including grammar and punctuation, so please proofread.) **I’ve been lenient as to grammar, syntax, spelling, etc., on discussion boards, but I expect this written product be of the quality you would submit to a (demanding) supervisor at work.
OTHER REQUIREMENTS
Be sure to include a cover page with your title, name, class, date, and a reference page (if other references are used).
The paper should be a minimum of 700 words – not including the to/from/subject/date information.
Submit your paper via Canvas SafeAssign by 11:59 p.m., Saturday, March 16th. Do not plagiarize. Note that you will be able to view your turnitin Originality Report, just as I will. Cite sources that you use.
Each day late will result in up to a 2- point deduction from your raw score.
PROFESSOR K’S FRIENDLY ADVICE
Be familiar with all material in Module’s 5 and 6. Feel free to conduct external research and cite those materials if you’re inclined. Advocate by explanation, not just assertion. What do I mean by that? This is advocating by assertion: “I believe that a data privacy law is a good idea.” That’s not really helpful. This is advocating by example: “A data privacy law that covers A, B, & C is a good idea because it would accomplish the following things. For instance … ”
Do not just regurgitate/cut-and-paste from the Module materials, but rather use that material as a springboard for your own writing and ideas.

Using the attached word document (Group4-Project6.docx) develop a narrated prese

Using the attached word document (Group4-Project6.docx) develop a narrated prese

Using the attached word document (Group4-Project6.docx) develop a narrated presentation for the members of your organization’s board as well as the CIO and other managers. Your technical report will provide an analysis of the infrastructure and the threats, based on the incident that first brought the organization’s security issues to your team’s attention. You will use your team’s finding from both reports as the basis for this presentation.
The board will decide what actions are taken and how much money will be allocated for cybersecurity. Therefore, your slide deck must capture the salient points of your research, the results of the lab tests of the password-cracking tools, and the team’s proposals to tighten information security practices. Consider the suggestions in the table below to focus your efforts for this presentation.
Topics to Address in the Narrated Presentation
Keep the primary goals of your presentation in mind as you build your presentation to the board: Be credible, be clear, and provide reasoned, actionable recommendations.
Present your technical findings succinctly for a non-technical audience.
Avoid acronyms, slang, or jargon; opt for clear language and clear explanations.
Provide a high-level summary of the infrastructure, the vulnerabilities that may have enabled the breach, and recommended actions.
Explain what happened, the impact on the organization, and your proposed actions with rationales and estimated costs.
You are limited to 12 slides, excluding the cover slide and references.
DO NOT USE CONTENT FROM THE PDF ATTACHMENT (only utilize as an example and reference)

The purpose of the individual system analysis and design project is to demonstra

The purpose of the individual system analysis and design project is to demonstra

The purpose of the individual system analysis and design project is to demonstrate student’s ability to apply the knowledge learned in this course to a real-world project.
Project Deliverables
The project requires students to perform three phases: (a) requirements analysis, (b) system and database design, and (c) a project plan.
Title page (project name, author, and date)
Phase 1: Requirement analysis
A. Problem definition
B. Issues
C. Objectives
D. Requirements
E. Constraints
F. Descriiption of the proposed system
G. Logical model design
1. Data flow diagrams
• Context diagram
• Diagram 0
o Diagram 1 (Diagram 1 is optional)
• Descriiptions of processes in each diagram
2. Descriiptions of outputs/inputs/performance/security or controls
H. Specific requirements, if any (interface, operational, resource, performance, etc.)
Phase 2: System and database design
A. User interface
Design an overall user interface consisting of screens, commands, controls, and features to enable users to use the system.
1. How data will be input to the system?
• The physical layout for each input
• The input design and procedures
2. How data will be output from the system?
• The physical layout for each output
• The output design and procedures

B. Data design
Develop a plan for data organization, storage, updating, and retrieval.
1. Database design
• Database tables with their attributes should be presented
• Primary key(s) should be identified in each table, if any
• Three steps of normalization should be included.
2. Entity-relationship diagrams
3. Data file storage and access
C. System architecture
Determine the architecture of the system as Web-based interface, client/server architecture, Internet/Intranet interface, network configuration, etc.
Phase 3: Project plan
A list of tasks or activities needed for implementing the proposed system
Estimating completion time and costs
A project schedule for performing those activities (Gantt charts or PERT charts)

1. Use Heron’’s formula for finding the area of a triangle (see below). Consider

1. Use Heron’’s formula for finding the area of a triangle (see below). Consider

1. Use Heron’’s formula for finding the area of a triangle (see below). Consider writing out your variables and functions on a scratch piece of paper before you start coding. You will have five variables – three for the sides, one for the semi-perimeter (s), and one for the final result (area). Use the variable names side1, side2, and side3 to represent the three sides. Use the variable name s to represent the semi-perimeter. Finally, use the variable name area to represent the area. HINT: Use the Math.sqrt function to calculate the area. 2. To round the area to the nearest tenth, create a new variable to represent the new rounded calculation, and use the toFixed( ) method. Use the variable name round to represent the final result

What are few prevalent methodologies used in social engineering attacks?

What are few prevalent methodologies used in social engineering attacks?

In this week discussion provide an overview of the topic at hand and provide the context for the subsequent discussion. Discuss following questions in your post and provide APA formatted references.
What are few prevalent methodologies used in social engineering attacks?
How has social engineering evolved over time?
What are the prevention techniques, and how effective are they?
What are many techniques that people and organizations may use to mitigate the risk of social engineering attacks?
To what extent may the promotion of awareness and education contribute to the prevention of a given issue?
What are the repercussions or outcomes that arise as a result of certain actions or events in both social engineering and counter-social engineering
Do social engineering assaults possess the potential to generate societal ramifications? If affirmative, in what manner may this be accomplished?

Discuss why it is important to write code with future maintainability in mind.

Discuss why it is important to write code with future maintainability in mind.

A program without any iteration statement is executed sequentially, in the order in which the sentences are written in the source code or algorithm. These sentences are called sequential.
Discuss why it is important to write code with future maintainability in mind. What kinds of maintenance might be done on an existing program? Tip: Your answers might include fixing bugs, adding new features, improving efficiency, improving the user interface, and making the program interface with another program.
Also, discuss the importance of planning out a program on paper before writing the actual code. What are some advantages of doing this?

Instructions Customer Care professionals capture customer feedback and comments

Instructions
Customer Care professionals capture customer feedback and comments

Instructions
Customer Care professionals capture customer feedback and comments during their interaction with various customers everyday. This comments data in the form of text is referred to as unstructured data. There has been an exponential growth in unstructured data, and analyzing this data is critical for forming business strategies.
You have access to this Comments data. You need to build a text mining system to mine this textual data and (eventually) categorize each comment as Positive or Negative so that the business can effectively track customer sentiment and make appropriate corrective strategies.
For example, the first comment mentioned below should be categorized as Positive, and second one as Negative: –
The kind of offers and the kind of treatment you get of being card holder and kind of service and support you receive is great.
The card service is neither widely available nor acceptable compared to other card.
Download the attached dataset or use link.
Perform the following text cleaning techniques in R, and show your work:
Read through the following tutorial regarding some of the simplest ways of cleaning text data.
Analyze the data file and come up with what you might consider to be “stop words”. Are there any additional words you might want to exclude beside the standard ones? Discuss your findings.
Read the data into R, and provide the first few rows of data (hint: use the head function)
Do standard transformations (e.g., converting to plain text document, removing punctuation, and so on). Detail what you do with screenshots.
Stem the document for future use (we will use this data in future weeks)
Please copy/paste screen images of your work in R, and put into a Word document for submission. Be sure to provide narrative of your answers (i.e., do not just copy/paste your answers without providing some explanation of what you did or your findings).

As the new office manager for ABC Realty, a busy real estate firm in Los Angeles

As the new office manager for ABC Realty, a busy real estate firm in Los Angeles

As the new office manager for ABC Realty, a busy real estate firm in Los Angeles, California, you need to know your way around Microsoft Office 2016 Suites in order to quickly finish the variety of tasks that cross your desk. Another reason that it’s important for you to be expert with the Office 2016 Suites is that you are relied upon by the agents in your firm to answer their questions and assist them with their projects and services using Microsoft Office 2016 Suites.
For this challenge, identify five tasks for your job as an office manager and the applications in Microsoft Office 2016 Suites that can be used to accomplish the five tasks. You also need to discuss the benefits of using the right application(s) for each task in relation to your work.
The report should be word-processed in Times New Roman 12-point font, at least FIVE pages with 250 words per page, excluding figures, tables, or illustrations
Body of the short report:
– Identification of the five tasks that can use the related applications in Microsoft Office 2016 Suites.
– Discussion on the applications and the benefits in relation to the five tasks.
– References (correct citations in APA format and not counted for the length requirement).

Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager.

Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager.

Answer the following questions:

1. Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components of security management can be adapted for use in the security management model?
2. Using the components of risk assessment documentation presented in the Security Maintenance presentation, draft a tentative risk assessment of either the computer lab that we use for our class in MDC or your home computer set up.Outline the critical risks you found and provide a summary of your findings.

Learning about a virus.Find a virus that has been released in the last 6 months.

Learning about a virus.Find a virus that has been released in the last 6 months.

page 1 assignment is as follows: Learning about a virus.
1. Searching with your preferred search engine, find a virus that has been released in the last 6 months.
2. Describe how the virus you chose worked, including the method it used to spread.
3. Describe the amount of damage caused by the virus.
4. Were any specific targets identified?
5. Were the perpetrators of the virus attack caught and/or prosecuted?
6. What types of security warnings were issued about the virus attack?
7. What measures were prescribed to defend against it?
8. Would the virus most properly be described as a virus or a worm?
Page 2 assignment as follows: Selecting the Proper Firewall
Analyze the environment of Saint Leo University. Is it a medium-sized network or enterprise? What types of users utilize the network? Are there multiple operating systems? Is there sensitive data that requires additional security? Based on the factors you analyze, write a brief essay describing the environment and recommending a firewall solution. Explain your recommendation.

List 2 references