Course Name: InfoTech in Global Economy  

Course Name: InfoTech in Global Economy

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.Assignment: 
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Course Name: InfoTech in Global Economy

Cybersecurity Survey.

ead the following article:  SANS 2019 State of OT/ICS Cybersecurity Survey  Download SANS 2019 State of OT/ICS Cybersecurity Survey.

Research and write a 1-3 page paper (title page not included) on one of the following topics:

  1. ICS Security Best Practices
  2. Impact of Cloud on ICS/SCADA Security
  3. ICS/SCADA/OT Standards and Regulations
  4. ICS/SCADA/OT Security Programs
  5. Improving ICS/SCADA Security: People and Processes

You must have at a minimum three (3) peer review articles to support your topic.

Please use APA citations liberally to show your research.

Make sure your references are APA as well.

In this case study assignment, you will perform a quantitative risk analysis for a company’s network. Please use your imagination and feel free to specify any vulnerabilities and threats while completing the steps of this case study.

Overview

In this case study assignment, you will perform a quantitative risk analysis for a company’s network. Please use your imagination and feel free to specify any vulnerabilities and threats while completing the steps of this case study.

Action Items

  1. Download and read the Case Study: Information Security Risk Assessment Word document.
  2. Download the Case Study Information Security Risk Assessment Answer Sheet.
  3. Type all of your answers into the answer sheet.

Word_Intro_Cap1_National_Sales_Meeting

Grader – Instructions Word 2019 Project

Word_Intro_Cap1_National_Sales_Meeting

 

Project Description:

In this project, you will apply skills you practiced from the Objectives in Word Chapters 1-3. You will assist Irene Shviktar, the Vice President of Marketing, to edit and create documents for a National Sales Meeting that will precede a Winter Sports Expo sponsored by Front Range Action Sports. The documents include a cover letter from the vice president to the company president. The letter will accompany a packet of materials for the meeting and the expo, which includes a brief resume for the guest speaker, a flyer that will announce the expo, a newsletter for employees, and a research paper on the history and development of skis.

 

Steps to Perform:

StepInstructionsPoints Possible
1Open the Word document Student_Word_Cap1_National_Sales_Meeting.docx downloaded with this Project. Be sure that the rulers and formatting marks display.0
2On the letter on Page 1, select the first paragraph—Front Range Action Sports—and increase the Font Size to 28 pt. Change the Font Size of the next four paragraphs—the address lines and website—to 12 pt.2
3Select the first five paragraph lines that you just formatted, change the Font to Arial, and then with the text selected, display the Borders and Shading dialog box. Create a 6 pt, Automatic-colored border on the left side of the selected text. In the paragraph that begins If you have any, select the second sentence and move it to the beginning of the paragraph. Adjust spacing as necessary so that there are no extra blank spaces at the end of the paragraph.3
4On Page 2, in the newsletter, select the second paragraph of text, which begins with Employee Newsletter. Display the Borders and Shading dialog box, and then add an Automatic-colored, 3 pt line below the paragraph.3
5Starting with the paragraph that begins National Sales Meeting, select all of the text from that point to the end of the page, including the paragraph mark after the word event. Do not select the Page Break. Change the Spacing After to 6 pt, format the text in two columns, and apply the Justify alignment.3
6At the top of the first column, select the paragraph National Sales Meeting. From the Font dialog box, change the Font Size to 20, apply Bold, and add the Small caps effect. Then Center the paragraph. Apply the same formatting to the paragraph Winter Sports Expo.5
7On the same page, in the blank line above the last paragraph of the newsletter, insert the picture from your downloaded files wCap1_Powder_Skiing.jpg. If necessary, set the Width of the picture to 3″ and apply a 10 pt Soft Edges effect.4
8In the blank paragraph at the top of Page 3, insert a 2×3 table. In the first cell of the table, type the following four lines, pressing ENTER after each line: Robert Lewis 1227 Aspen Lake Trail Vail, CO 81657 www.boblewisskis.com4
9In the second row of the table, in the first cell, type CAREER HIGHLIGHTS and then press TAB. In the second cell of the second row, insert the text from the downloaded file wCap1_Career_Text.docx and then press BACKSPACE to remove the blank line at the bottom of the inserted text.2
10In the third row of the table, in the first cell, type EDUCATION and then in the cell to the right, type Mr. Lewis’ educational information as follows, pressing ENTER after each line: University of Colorado Ph.D. in Psychology University of Colorado M.S. in Psychology University of Minnesota B.S. in Psychology4
11Insert a new row at the bottom of the table. In the first cell of the new row, type CONSULTANT and then in the cell to the right, type the following, pressing ENTER after each line: U.S. Junior Ski Team U.S. National Ski Team Special Olympics4
12Apply Bold to the headings CAREER HIGHLIGHTSEDUCATION, and CONSULTANT. Drag the vertical border between the two columns to the 1.5-inch mark on the horizontal ruler.4
13In the first row, merge the two cells, and then Center the text. Select Robert Lewis, increase the Font Size to 24 pt, apply Bold, and then add 24 pt space Before the text. Select the web address and add 18 pt space after the text.6
14Create a bulleted list, using solid round black bullets, for the items below SKIING and below COACHING. Apply Bold to the name of each university, and then apply 12 pt spacing after to the name of each college degree.4
15Select the table, and then remove all borders. From the Borders and Shading dialog box, add a 3 pt solid border to the top of the table.3
16Near the top of Page 4, in the paragraph that begins The use of skis, in the third line, position the insertion point to the right of the period following wood, and then insert the following footnote: The oldest known ski and pole is more than 4,000 years old.4
17Modify the footnote style by changing the Font Size to 11 pt, add a First Line Indent of 0.5″, and set Line spacing to 2.0 (double).8
18In the paragraph that begins The use of skis, position the insertion point to the left of the period at the end of the paragraph. Using the MLA format, add the following Book citation: Author: Huntford, Roland Title: Two Planks and a Passion: The Dramatic History of Skiing Year: 2008 City: New York Publisher: Continuum Press In the text, select the Huntford citation and add the page numbers 4-66
19On Page 6, in the blank line below the Works Cited title, insert the built-in Bibliography. Select the two references, change the line spacing to 2.0 and change the Spacing After to 0 pt. Center the Bibliography title. After the bibliography is entered and formatted, delete the Works Cited paragraph.10
20On Page 7, select the two paragraphs below the title that begin Friday and Saturday, and then change the Spacing After to 0.3
21Select the three paragraphs below the title—the dates—and then from the Borders and Shading dialog box, apply a Box border using theme color Blue, Accent 1 (fifth column, first color) and a 3 pt border. Click the Shading tab, and add Shading using theme color Blue, Accent 1, Lighter 80% (fifth column, second color).5
22Click after the colon at the end of the line that precedes the bulleted list. Insert the downloaded picture wCap1_Downhill_Skiing.jpg. Change the Height of the picture to 3.5″, and then set the wrapping to Square.5
23Position the picture so that the Horizontal Alignment is set to Right relative to Column and the Vertical Alignment is set to Top relative to Line. Apply a Picture Style using the Soft Edge Rectangle.5
24At the bottom of the flyer, click in the second blank paragraph below the last paragraph of text. Insert a Basic Process SmartArt (first style under Process). Click the outer rectangle surrounding the SmartArt to select it, and if necessary, change the wrapping style to In Line with Text. On the Format tab, set the Height of the SmartArt graphic to 1″ and the Width to 6.5″. Add the following text, in order, to the three shapes: Exhibits Speakers Workshops To the SmartArt graphic, apply the 3-D Polished style.3
25Save and close the file, and then submit for grading.0
Total Points100

 

Created On: 09/30/2019 1 GO19_WD_INTRO_GRADER_CAP1 – National Sales Meeting 1.1

Case Study: Information Security Risk Assessment – Answer Sheet

Case Study: Information Security Risk Assessment – Answer Sheet

 

 

Table-1

AssetsVulnerabilitiesThreatsProbability (the numerical value)Impact

(the numerical value)

Risk

(the numerical value)

Risk = Probability x Impact

 

 

 

     
 

 

 

     
 

 

 

     

 

 

Probability (the numerical value)Your Justification (Why you assigned that value for the probability)
  
  
  

 

 

Impact (the numerical value)Your Justification (Why you assigned that value for the impact)
  
  
  

 

 

 

Table-2

Definition of RiskPriorityRisk Response (Risk Acceptance, Risk Mitigation, Risk Avoidance, Risk Transfer, etc.)
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat>  
The exploitation of the <vulnerability> of <asset> by <threat> 

Match policies, standards, procedures, and guidelines described in Chapter-5 with the security roles described in Chapter-6. There are two sample rows. Fill out five extra rows similarly.

NAME:

TODAY’S DATE:

ISEC 610 Homework 2

Question 1

Match policies, standards, procedures, and guidelines described in Chapter-5 with the security roles described in Chapter-6. There are two sample rows. Fill out five extra rows similarly.

Document exampleSecurity roleDescription of the relationship
IDS/IPS maintenance/monitoring procedureSecurity Engineer (SE)SE develops this procedure. SE performs IDS/IPS maintenance and monitoring according to this procedure. SE is responsible for updating this procedure.
Organization-wide security policiesSecurity Director (SD)SD manages the development and implementation of global security policies
   
   
   
   
   

 

Question 2 – Weekly learning and reflection

In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically not just about what was presented but also what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities,

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

This is a required assignment, worth 100 points, and must be submitted by the due date. Late assignments will not be accepted.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Submit your Practical Connection Assignment here.

Research Paper: Microsoft Software Development Security

Research Paper: Microsoft Software Development Security

Overview

The purposes of this assignment is:

1) To analyze and inspect main components of Microsoft SDLC (Secure Development Lifecycle Process).

2) To describe and explain security features and essential security configuration of Microsoft .NET framework and ASP.NET.

Research

Please refer to following resources to complete this project:

· Textbook Chapter 26 and Chapter 29

· SDLC: https://www.microsoft.com/en-us/securityengineering/sdl/practices

· .NET: https://docs.microsoft.com/en-us/dotnet/standard/security/

· .NET:https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/DotNet_Security_Cheat_Sheet.md

· ASP.NET: https://support.microsoft.com/en-us/help/891028/asp-net-security-overview

· Other resources you find

Write

Part 1: Microsoft SDLC Practices

· Carefully review the Microsoft SDLC page.

· Prepare a 250-300 word overview of the Microsoft SDLC practices. Summarize all 12 of the practices in SDLC.

· Select one of the following practices. In one paragraph, research and summarize available tools in the market:

· Practice #4 – Threat modeling

· Practice #9 – Perform Static Analysis Security Testing (SAST)

· Practice #10 – Perform Dynamic Analysis Security Testing (DAST)

· Practice #11 – Perform Penetration Testing

Part 2: .NET Security Guidelines

Describe essential items in a.NET security guidelines in 150-200 words. Use the textbook, Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.

 

Part 3: ASP.NET Security Guidelines

Describe essential items in a ASP.NET security guidelines in 150-200 words. Use the textbook, Microsoft .NET security page, OWASP GitHub page, and any other authoritative resources you find.

write a 1.5 page research hypothesis based on the proposed project attached. Include several references. 

write a 1.5 page research hypothesis based on the proposed project attached. Include several references.

this is the data i will be using for machine learning.

https://www.kaggle.com/datasets/saurabhbagchi/credit-card-fraud-detection

Theoretical Project

Theoretical Project

 

 

 

Name of Student

Instructor

Institution

Course

Date

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Theoretical Project

Fraud Detection System Using Machine Learning

Fraud Detection through Machine Learning enables the system users to run an automated transaction processing on the dataset. The involved Machine Learning model detects all potential fraudulent activities and flags. The fraud detection system using Machine learning remains the future for fraud detection in every financial institution since the ancient rules-based fraud detection systems have failed in their detection role since they cannot align with current technological advancements.

The Project Idea

The primary idea of this project is to facilitate self-learning to enable the system to adapt to new, unknown fraud patterns for detection. Unlike rules-based systems, this idea is based on machine learning, noting the fraudulent transactions that portray strange trends that are different from genuine ones. Machine learning algorithms detect the trends and can differentiate those between scammers and authentic customers (Akinbohun & Atanlogun, 2018). In the banking industry, this idea has successfully helped banks eliminate fraudulent transactions by fraudsters.

Furthermore, the implementation will immediately replace inconsistent and ineffective traditional fraud detection techniques. Over the past decades, banks, and other financial institutions have used rules-based systems associated with manual evaluation to detect fraud (Zhou et al., 2018). However, this project aligns with the current technology that has led fraudsters to increase in sophistication, such that the traditional systems cannot help anymore. The technology can assist machines in predicting and responding to suspicious activities in the system by fraudsters.

Work To Be Performed

This project’s primary task is collecting and clustering the previously recorded data for fraud prevention and risk management programs. The gathered data will include information regarding legitimate and fraudulent transactions (Mallidi & Zagabathuni, 2021). After collection, the data will have a ‘legitimate or fraudulent transactions or clients’ label.

After collection, the data will be used to “teach” the machine learning software to detect whether a specific client or transaction is fraudulent or legitimate. A successful fraud detection system will need to gather more data on fraud trends. This maximum data collection will have many examples that algorithms can learn for accurate detection (Mallidi & Zagabathuni, 2021). After training the machine learning algorithm, the software becomes specific to the transactions and is said to be ready for use in the fraud management model. Therefore, the work will primarily train the algorithm by subjecting it to as huge data as possible to learn the patterns and update it from time to time since it is not infallible.

The project manager, the bank director (project sponsor), bank employees, and the software developers are involved.

Literature Review Behind the Motivation for Doing Project

According to Yee et al. (2018), the dominance of online-related transactional activities has raised fraudulent incidences worldwide. These activities have contributed to considerable losses to individuals and the banking sector. Despite the presence of multiple cybercrime practices within the banking sector, credit card fraudulent activities dominate, making online customers vulnerable to losing their money. Therefore, Yee et al. (2018) demonstrate that preventing fraud activities via a machine learning and data mining is a crucial strategy for eliminating illegal monetary acts. Initially, data mining approaches played a critical role in studying the trends and characteristics of legitimate and fraudulent transactions based on anomalies and normalized data.

 

 

References

Akinbohun, F., & Atanlogun, S. K. (2018). Credit Card Fraud Detection System in Commercial Sites. European Journal of Engineering and Technology Research, 3(11), 1-5.

Mallidi, M. K. R., & Zagabathuni, Y. (2021). Analysis of Credit Card Fraud Detection using Machine Learning models on balanced and imbalanced datasets. International Journal of Emerging Trends in Engineering Research, 9(7).

Yee, O. S., Sagadevan, S., & Malim, N. H. A. H. (2018). Credit card fraud detection using machine learning as data mining technique. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-4), 23-27.

Zhou, H., Chai, H. F., & Qiu, M. L. (2018). Fraud detection within bankcard enrollment on mobile device based payment using machine learning. Frontiers of Information Technology & Electronic Engineering, 19(12), 1537-1545.