Online Learning
CLICK HERE TO ORDER YOUR ASSIGNMENT

WK2

Subject: Emerging Threats and Countermeasures (need 2 copies of answers)Question 1: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)Our society, economy, and critical infrastructures have become largely dependent on computer networks and information technology solutions. Cyberattacks become more attractive and potentially more disastrous as our dependence on information technology increases. According to the Symantec cybercrime report published in April 2012, cyber-attacks cost US$114 billion each year. If the time lost by companies trying to recover from cyber attacks is counted, the total cost of cyber attacks would reach staggering US $385 billion. Cyber attacks are flourishing. It is because cyberattacks are cheaper, convenient and less risky than physical attacks Cybercriminals only require a few expenses beyond a computer and an Internet connection. They are unconstrained by geography and distance. They are difficult to identify and prosecute due to the anonymous nature of the Internet. Given that attacks against information technology systems are very attractive, it is expected that the number and sophistication of cyber attacks will keep growing. Many cybersecurity experts believe that Deception is the key choice of weapon to carry out malicious intends to breach cybersecurity efforts in the cyberspaceANSWER IN SHORT ESSAY: Select and research one of the many types of DECEPTIONS and briefly provide a description, deployment (methods) and countermeasures.*Denial-of-service attacks*Trojan horses*Phishing Etc.For reference use attached Deception.pdfSubject: Information Governance (need 2 copies of answers)Question 2: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results.From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.REFER attached IG_Chapter4.pdf , IG_Chapter5.pdf FOR DETAILSSubject: Analyzing and Visualizing DataQuestion 3: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?textbook details for reference: Kirk, A. (2016). Data visualization a handbook for data driven design. Los Angeles, CA: Sage. ISBN: 978-1473912144Subject: Information Governance Question 4: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”Identified a company (this company will be part of your final project paper) and discuss1) the data that matters to the executives in that industry,2) who, within that industry, needs that data, and3) some methods for ensuring that the critical data gets into the users’ hands.Subject: Emerging Threats and CountermeasuresQuestion5: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.Subject: Physical SecurityQuestion6: Write a 400 word essay (APA format & 2 latest scholarly journal article references 2016 on words)Crime Prevention Through Environmental Design (CPTED) is a major concept in physical security. Find at least one scholarly article on CPTED and discuss it’s implications for physical security.13/05/202040informationsystems

WK2