Description
Imagine you are the IT manager for a large organization. Several of the organization’s managers have asked you what the policies are when it comes to employees using their personal devices at work.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
UMGC Advanced Data Security and Protection Paper
#1 Discussion: Advanced Data Protection SolutionsContains unread postsNow that you have completed BallotOnline’s Cloud O ...
UMGC Advanced Data Security and Protection Paper
#1 Discussion: Advanced Data Protection SolutionsContains unread postsNow that you have completed BallotOnline’s Cloud Orchestration and Automation Report, you will discuss the advanced data protection solutions in the cloud. You should cover the following areas:What is data protection in the cloud?How would NetApp SaaS Backup help your organization with advanceddata protection in the cloud?How would Symantec Cloud Workloads Protection for Storage help your organization with advanced data protection in the cloud?How would CloudEndure Disaster Recovery help your organization with advanced data protection in the cloud?How would these advanced services compare with one another?#2 Discussion: Advanced Data Security Solutions in the CloudContains unread postsNow that you have discussed and evaluated BallotOnline’s advanced data protection solutions in the cloud, you will discuss the advanced data security solutions in the cloud. You should cover the following areas:What is data security in the cloud?How would you secure your data using data encryption in the cloud?How would AWS Key Management Services help your organization withadvanced data security in the cloud?How would SafeNet Virtual KeySecure help your organization with advanced data security in the cloud?How would these advanced services compare with one another?What are the advantages and disadvantages (if any) of keeping the encryption keys in the cloud?What are the advantages and disadvantages (if any) of keeping the encryption keys outside of the cloud?#3 Discussion: Data Security ModelsNow that you have discussed and evaluated BallotOnline’s advanced data security solutions in the cloud, you will discuss the three data security models. You should cover the following:How do the models compare with each model?What are the pros and cons of reach model?What is your selected model?Why did you select that specific model?
ISOL 634 Cleveland State University Physical Security Discussion
Using proper APA formatting write a 400-word discussion paper describing:
Discuss the theory and concepts Approaches to Ph ...
ISOL 634 Cleveland State University Physical Security Discussion
Using proper APA formatting write a 400-word discussion paper describing:
Discuss the theory and concepts Approaches to Physical Security
Search the Internet for an article for examples of physical security threats
Why is Physical Security so important?
Week 2 Assignment: Identification, Authentication, and Authorization Techniques
The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role ...
Week 2 Assignment: Identification, Authentication, and Authorization Techniques
The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays!
At the Acme Distribution Center, your colleagues are the following employees:
Robert, the lead warehouse receiver
Jennifer, sales and accounts payable
Bradley, the warehouse general manager
LuEllen, the shipper
Buster, the shipper
Lloyd, the purchasing agent
Spare, for temporary help
Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.
Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.
Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.
Using the following legend, provide the users with the appropriate rights and permissions:
A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only
Segregation of Duties Matrix
(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
A
A
A
A
A
A
A
A
Shipping
A
A
A
A
A
A
A
A
Sales
A
A
A
A
A
A
A
A
Accounts Payable
A
A
A
A
A
A
A
A
Segregation of Duties Matrix
(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
Shipping
Sales
Accounts Payable
After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions:
What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
What are the requirements for Buster and LuEllen?
7 pages
Carlson Companies Case Study.edited
How the Carlson SAN Approach would be Implemented in Today’s Environment Carlson SAN approach is an IT solution that suc ...
Carlson Companies Case Study.edited
How the Carlson SAN Approach would be Implemented in Today’s Environment Carlson SAN approach is an IT solution that successfully helped the company ...
Prescriptive analysis using Palisade DecisionTools Excel software
The purpose of this assignment is to use predictive analytics techniques and the graphs and charts associated with these t ...
Prescriptive analysis using Palisade DecisionTools Excel software
The purpose of this assignment is to use predictive analytics techniques and the graphs and charts associated with these techniques to forecast outcomes and make business decisions.Using specified data files and complete Problems 28, 30, 34, 46, 60, 62 (b through e), and 63. Use the Palisade DecisionTools Excel software to complete these problems where requested and applicable. Problem 60 should be completed using only Excel.Problems:28. The file P12_28.xlsx contains annual revenues for a convenience store. If you want to forecast revenue for the next few years with the moving averages method, what span should you use? Will any span work well?.30. The file P12_30.xlsx contains total monthly U.S. retail sales data. While holding out the final six months of observations for validation purposes, use the method of moving averages with one or more spans of your choice to forecast U.S. retail sales for the next 12 months. Comment on the performance of your model. What makes this time series more challenging to forecast?34. Consider the American Express closing price data in the file P12_34.xlsx.a. Create a time series chart of the data. Based on what you see, which of the exponentialsmoothing models do you think should be used for forecasting? Why?b. Use Holt’s exponential smoothing to forecast these data, using no holdout period and requesting 20days of future forecasts. Use the default smoothing constants of 0.1.c. Repeat part b, optimizing the smoothing constants. Does it make much of an improvement?d. Repeat parts a and b, this time using a holdout period of 50 days.e. Write a short report to summarize your results.46. The file P12_46.xlsx contains monthly time series data for total U.S. retail sales of building materials, garden equipment, and supplies dealers.a. Is seasonality present in these data? If so, characterize the seasonality pattern.b. Use the Deseasonalize option in StatTools to forecast the deseasonalized data for each month ofthe next year using the moving average method with an appropriate span.c. Does Holt’s exponential smoothing method, with optimal smoothing constants, outperformthe moving average method employed in part b? Demonstrate why or why not.60. The file P12_60.xlsx lists annual revenues (in millions of dollars) for Nike. Create a time series graph of these data. Then superimpose a trend line with Excel’s Trendline option. Which of the possible Trendline options seems to provide the best fit? Using this option, what are your forecasts for the next two years?62. The file P12_62.xlsx contains data on a motel chain’s revenue and advertising.a. Use these data and multiple regression to make predictions of the motel chain’s revenues during thenext four quarters. Assume that advertising during each of the next four quarters is $50,000. (Hint:Try using advertising, lagged by one quarter, as an explanatory variable.)b. Use simple exponential smoothing to make predictions for the motel chain’s revenues during thenext four quarters.c. Use Holt’s method to make forecasts for the motel chain’s revenues during the next four quarters.d. Use Winters’ method to determine predictions for the motel chain’s revenues during the next four quarters.e. Which of these forecasting methods would you expect to be the most accurate for these data?63. The file P12_63.xlsx contains data on monthly U.S. permits for new housing units (in thousands of houses).a. Using Winters’ method, find values of α (alpha), β (beta) , and γ (gamma) that yield an RMSE as small as possible. Does this method track the housing crash in recent years?b. Although we have not discussed autocorrelation for smoothing methods, good forecasts derived fromsmoothing methods should exhibit no substantial autocorrelation in their forecast errors. Is this truefor the forecasts in part a?c. At the end of the observed period, what is the forecast of housing sales during the next few months?To receive full credit on the assignment, complete the following. Ensure that the Palisade software output is included with your submission. Ensure that Excel files include the associated cell functions and/or formulas if functions and/or formulas are used. Include a written response to all narrative questions presented in the problem by placing it in the associated Excel file. Place each problem in its own Excel file. Ensure that your first and last name are in your Excel file names
Similar Content
Cyber Security Lab Report
LAB EXERCISE 1:
Lab Files that are Needed: For this lab you will need two files (phishing_l.csv and phishing.csv) the last...
Baraton University Python Program Project
We are creating a python program that sorts a set of 10 words according to alphabetical order using arrays. ...
ITS 631 UC Mechanisms to Reduce Chances of a Cyber Threat Discussion
Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of ...
Reflective Response: Charting an International Treaty and International Agreement, computer science homework help
ResearchOne of the best ways to understand the involved process that can go into the initiation, negotiation/formation, an...
Cambridge College Integration of ERM with Strategy Essay
https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdfAfter reading this week's article...
Interface Design, computer science homework help
Task1.Design overview;2.Project scope;3.Business and User requirements;4.Key assumptions;5.Design process to be used;6.Int...
Diffeq
Solve the following problem over the interval from x = 0 to 1 using a step size of 0.25 where y(0)=1. Display all of your ...
E Commerce Chapter 10
A digital market is a marketplace formed by communication technologies linking numerous purchasers to sellers. Differentia...
Lab 3 Assessment
2. In June 2004, an external auditor certified CardSystems Solutions as Payment Card Industry Data Security Standard- (PCI...
Related Tags
Book Guides
The President is Missing
by James Patterson, Bill Clinton
The Eyes Were Watching God
by Zora Neale Hurston
The Goldfinch
by Donna Tartt
Treasure Island
by Robert Louis
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Sense And Sensibility
by Jane Austen
The Prince
by Niccolò Machiavelli
The Color Purple
by Alice Walker
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
UMGC Advanced Data Security and Protection Paper
#1 Discussion: Advanced Data Protection SolutionsContains unread postsNow that you have completed BallotOnline’s Cloud O ...
UMGC Advanced Data Security and Protection Paper
#1 Discussion: Advanced Data Protection SolutionsContains unread postsNow that you have completed BallotOnline’s Cloud Orchestration and Automation Report, you will discuss the advanced data protection solutions in the cloud. You should cover the following areas:What is data protection in the cloud?How would NetApp SaaS Backup help your organization with advanceddata protection in the cloud?How would Symantec Cloud Workloads Protection for Storage help your organization with advanced data protection in the cloud?How would CloudEndure Disaster Recovery help your organization with advanced data protection in the cloud?How would these advanced services compare with one another?#2 Discussion: Advanced Data Security Solutions in the CloudContains unread postsNow that you have discussed and evaluated BallotOnline’s advanced data protection solutions in the cloud, you will discuss the advanced data security solutions in the cloud. You should cover the following areas:What is data security in the cloud?How would you secure your data using data encryption in the cloud?How would AWS Key Management Services help your organization withadvanced data security in the cloud?How would SafeNet Virtual KeySecure help your organization with advanced data security in the cloud?How would these advanced services compare with one another?What are the advantages and disadvantages (if any) of keeping the encryption keys in the cloud?What are the advantages and disadvantages (if any) of keeping the encryption keys outside of the cloud?#3 Discussion: Data Security ModelsNow that you have discussed and evaluated BallotOnline’s advanced data security solutions in the cloud, you will discuss the three data security models. You should cover the following:How do the models compare with each model?What are the pros and cons of reach model?What is your selected model?Why did you select that specific model?
ISOL 634 Cleveland State University Physical Security Discussion
Using proper APA formatting write a 400-word discussion paper describing:
Discuss the theory and concepts Approaches to Ph ...
ISOL 634 Cleveland State University Physical Security Discussion
Using proper APA formatting write a 400-word discussion paper describing:
Discuss the theory and concepts Approaches to Physical Security
Search the Internet for an article for examples of physical security threats
Why is Physical Security so important?
Week 2 Assignment: Identification, Authentication, and Authorization Techniques
The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role ...
Week 2 Assignment: Identification, Authentication, and Authorization Techniques
The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays!
At the Acme Distribution Center, your colleagues are the following employees:
Robert, the lead warehouse receiver
Jennifer, sales and accounts payable
Bradley, the warehouse general manager
LuEllen, the shipper
Buster, the shipper
Lloyd, the purchasing agent
Spare, for temporary help
Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.
Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.
Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.
Using the following legend, provide the users with the appropriate rights and permissions:
A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only
Segregation of Duties Matrix
(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
A
A
A
A
A
A
A
A
Shipping
A
A
A
A
A
A
A
A
Sales
A
A
A
A
A
A
A
A
Accounts Payable
A
A
A
A
A
A
A
A
Segregation of Duties Matrix
(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
Shipping
Sales
Accounts Payable
After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions:
What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
What are the requirements for Buster and LuEllen?
7 pages
Carlson Companies Case Study.edited
How the Carlson SAN Approach would be Implemented in Today’s Environment Carlson SAN approach is an IT solution that suc ...
Carlson Companies Case Study.edited
How the Carlson SAN Approach would be Implemented in Today’s Environment Carlson SAN approach is an IT solution that successfully helped the company ...
Prescriptive analysis using Palisade DecisionTools Excel software
The purpose of this assignment is to use predictive analytics techniques and the graphs and charts associated with these t ...
Prescriptive analysis using Palisade DecisionTools Excel software
The purpose of this assignment is to use predictive analytics techniques and the graphs and charts associated with these techniques to forecast outcomes and make business decisions.Using specified data files and complete Problems 28, 30, 34, 46, 60, 62 (b through e), and 63. Use the Palisade DecisionTools Excel software to complete these problems where requested and applicable. Problem 60 should be completed using only Excel.Problems:28. The file P12_28.xlsx contains annual revenues for a convenience store. If you want to forecast revenue for the next few years with the moving averages method, what span should you use? Will any span work well?.30. The file P12_30.xlsx contains total monthly U.S. retail sales data. While holding out the final six months of observations for validation purposes, use the method of moving averages with one or more spans of your choice to forecast U.S. retail sales for the next 12 months. Comment on the performance of your model. What makes this time series more challenging to forecast?34. Consider the American Express closing price data in the file P12_34.xlsx.a. Create a time series chart of the data. Based on what you see, which of the exponentialsmoothing models do you think should be used for forecasting? Why?b. Use Holt’s exponential smoothing to forecast these data, using no holdout period and requesting 20days of future forecasts. Use the default smoothing constants of 0.1.c. Repeat part b, optimizing the smoothing constants. Does it make much of an improvement?d. Repeat parts a and b, this time using a holdout period of 50 days.e. Write a short report to summarize your results.46. The file P12_46.xlsx contains monthly time series data for total U.S. retail sales of building materials, garden equipment, and supplies dealers.a. Is seasonality present in these data? If so, characterize the seasonality pattern.b. Use the Deseasonalize option in StatTools to forecast the deseasonalized data for each month ofthe next year using the moving average method with an appropriate span.c. Does Holt’s exponential smoothing method, with optimal smoothing constants, outperformthe moving average method employed in part b? Demonstrate why or why not.60. The file P12_60.xlsx lists annual revenues (in millions of dollars) for Nike. Create a time series graph of these data. Then superimpose a trend line with Excel’s Trendline option. Which of the possible Trendline options seems to provide the best fit? Using this option, what are your forecasts for the next two years?62. The file P12_62.xlsx contains data on a motel chain’s revenue and advertising.a. Use these data and multiple regression to make predictions of the motel chain’s revenues during thenext four quarters. Assume that advertising during each of the next four quarters is $50,000. (Hint:Try using advertising, lagged by one quarter, as an explanatory variable.)b. Use simple exponential smoothing to make predictions for the motel chain’s revenues during thenext four quarters.c. Use Holt’s method to make forecasts for the motel chain’s revenues during the next four quarters.d. Use Winters’ method to determine predictions for the motel chain’s revenues during the next four quarters.e. Which of these forecasting methods would you expect to be the most accurate for these data?63. The file P12_63.xlsx contains data on monthly U.S. permits for new housing units (in thousands of houses).a. Using Winters’ method, find values of α (alpha), β (beta) , and γ (gamma) that yield an RMSE as small as possible. Does this method track the housing crash in recent years?b. Although we have not discussed autocorrelation for smoothing methods, good forecasts derived fromsmoothing methods should exhibit no substantial autocorrelation in their forecast errors. Is this truefor the forecasts in part a?c. At the end of the observed period, what is the forecast of housing sales during the next few months?To receive full credit on the assignment, complete the following. Ensure that the Palisade software output is included with your submission. Ensure that Excel files include the associated cell functions and/or formulas if functions and/or formulas are used. Include a written response to all narrative questions presented in the problem by placing it in the associated Excel file. Place each problem in its own Excel file. Ensure that your first and last name are in your Excel file names
Earn money selling
your Study Documents