Mis-790 Comprehensive Exam

Superior Essays
MIS 790 Comprehensive Exam

Q1. To be able to build prediction models of botnet attacks, we had to decide information requirements. (a) What process did you use for identifying predictor variables for modelling botnet traffic flows? (b) What additional measures can be taken in terms of information (or data) gathering to further improve the accuracy of the prediction models?

(a) I started with a literature survey and read articles to understand the problem and technical terms. To understand the cause-effect relationships, each variable was individually explored. Ricardo and Raihan did a good job in preparing the data flows and explain the dataset and the derivation process from the Wireshark data. For the purpose of the analytical modelling,
…show more content…
Each team was provided with credentials to access the VM. What happens in case the credentials are compromised? What will be the impact and what steps can we take to ensure that the confidential information is not leaked? There should to be more than a single level of security in this case. For example, R code/data should be encrypted. Next step will be to interview the information owners. The information assets will be grouped depending on the business needs and not on their technology requirements because each asset may contain items that need multiple technology solutions to address the same business need. In the botnet project, it may be possible that the data could be present within two different assets like the virtual machine and the cloud based server. However this can lead to conflicts of ownership and control. I will define clear rules about the retention schedules of these assets and how they operate at these different levels like location of asset, its owner, the volume of data to be stored, whether the data contains personal information like SSN, medical history etc. and how is it

Related Documents

  • Decent Essays

    Hrm/531 Final Exam

    • 540 Words
    • 3 Pages

    1. Write 0.27 as a percentage. Answer is _____ %. Do not put the percent symbol in your answer. Correct Answer: 27 2.…

    • 540 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Hsc300 Unit 4 Study Guide

    • 390 Words
    • 2 Pages

    Anil Pothula 1004664. Given info Process Arrival Time Burst Time Priority P1 0 15 1 P2 3 2 5 P3 4 6 2 P4 8 2 3 P5 12 10 4 Q1. First Come First Serve: Here in this process our priority is arrival time, as the name suggests first priority is given to the process that arrived first. Process1…

    • 390 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Final Exam

    • 205 Words
    • 1 Pages

    1. A provider is assessing a 35-year-old patient woman who complains of having tremors in bilateral hands and has been having difficulty writing. She states, “it is like I can’t get my hands to do what I want”. She states her mother had Parkinson disease and is worried she may have as well.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    DD Form 2958 Case Study

    • 133 Words
    • 1 Pages

    Good afternoon I have reviewed your record and we still missing some important information in order to finalize your DD form 2958. Our records show that you have not yet applied for the minimum of two job. The only information you need to provide is the name of the company, the position for you applied for, and the date you applied.…

    • 133 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Qlt1 Task 4

    • 394 Words
    • 2 Pages

    3.8) Data Analysis After collect the data from the respondents through questionnaire, the data will analyzed by using Statistical Software (SPSS) to ensure the relevant issues was examined in a comprehensive manner. Statistical tools and methods used where appropriate for analyzing the relationship among the variables and the model. 3.8.1) Descriptive statistics analysis The data that had collected will analyze based on the descriptive statistics analysis.…

    • 394 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    There are ways of handling this case differently from employer and employee. Let's start with the hiring phase: 1. The employer did not ask the candidate any questions about his ability to perform the job (asking questions can help you decide if the candidate is fit for the job). 2. The employer failed to ask if there are any issues with the availability to attend these days/hours and mandatory meetings (Addressing the issues of hours and days during interviews will cause fewer problems during their time at the company).…

    • 321 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Message from Leadership: Acting Secretary of Army made emphasis on engaged leaders and proactive risk management provide the foundation to support safety and capability wherever the mission dictates. 2. Previous Safety Council Minutes: RTI Elevator…

    • 453 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hrm/531 Final Exam

    • 263 Words
    • 2 Pages

    1. One of the goals of the Obama administration is to ensure all Americans have health insurance. A survey to determine how many Americans have health insurance is an example of (____). -(Binomial) 2. Use the binomial coefficient to determine the number of ways out of a hospital staff of 5 nurses, 2 nurses can be chosen to service the maternity ward.…

    • 263 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    SOSC 2330: Political Economy of Law, Policy and Organization Take Home Mid Term Exam Fall 2014 Name: Jonah Goldrich Student ID: 212866380 T.A: Jan Krouzil Professor: Sonya Scott Date: November 3rd, 2014 Part A: 1) Homo economicus is a theoretical concept that frames humans as rational and self-interested individuals. A homo economicus must have the ability to recognize its own self-interest, and in turn act upon that self-interest. Economists have traditionally used the concept to describe a rational individual who quantifies their self-interest while enjoying true economic freedom. These concepts were central to Adam Smith’s notion of the invisible hand and economic efficiency.…

    • 2014 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Assessment

    • 560 Words
    • 3 Pages

    As a whole, the class average was around 60% percent, meaning the class is on the developing or adequate level of understanding the learning objective. A quarter of the class passed the assessment with 85 or better, which is considered a mastery under the math curriculum followed. Half the class scored a 65 or less. This shows that these students have a minimal to no understanding of the concept being taught. 8 out of the sixteen students understood procedurally and conceptually how to compare to objects with a third object.…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    P1 Unit 4 Assessment

    • 625 Words
    • 3 Pages

    Unit 4 Assessment A greedy person desires things he is not prepared to work for. When our greed exceeds our needs, we lose sight of what is important. This can lead to negative consequences in life. There are several examples how someones greed has lead to unfavorable outcomes in the end. These stories are “The Necklace”, “The Golden Touch”, and “La Riconda.”…

    • 625 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Hlt 208 Syllabus

    • 590 Words
    • 3 Pages

    COURSE OUTLINE Department of Psychology HLT 208 MEDIA AND EDUCATION Winter 2016 Instructor Instructor: Melissa Morgan Office Phone: N/A Office Hours: Thursday 5:00pm-6:00pm.…

    • 590 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    AITSL Standard 1

    • 738 Words
    • 3 Pages

    Part A The focus of this response paper is The Australian Institute for Teaching and School Leadership (AITSL) Professional Standard 1: “Know your students and how they learn” with specific focus on elaboration 1.5 “Differentiate teaching to meet the specific learning needs of students across the full range of abilities” (AITSL, 2014). As Locke’s philosophy (cited in Encyclopedia Britannica, 2016) suggests ‘children are not ‘Tabula rasa’ they bring family and community ways of being, belonging and becoming to their early childhood settings’ (DEEWR, 2009). Educational Services Australia (ESA) 2015) states “Differentiating teaching and learning requires knowledge of each student’s background , experiences, and interests, readiness and learning…

    • 738 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The task As an assistant manager of an insurance company my task is the prediction of which customers are potentially interested in a caravan insurance policy based on both socio-geographic and personalized data. For model building, data of 4000 customers and 86 variables, including the target variable was available. Also, give an explanation why these customers would buy the caravan insurance company. Make my insights useful and action in order to report it to my boss with no prior knowledge of computational learning technology.…

    • 942 Words
    • 4 Pages
    Great Essays