BUSI 411 WEEK 7 Group Case Study (only #5 is what I am paying for-not the entire case)

5.    Provide a detailed description of how 2 of the items found above could be resolved. This must include (1) operations management technique from the text to be applied, (2) method of application, and (3) method of evaluating success of the plan. Support your discussion with outside sources. This section must be 34 pages.

Check It

 

Building on your case project, for week 6 you will research best practices in IT governance and methods for building an IT security culture within the organization. Follow the video links provided and research ITIL and COBIT systems, and determine which may best work for your organization. If your organization already utilizes one of these systems, describe how it has been deployed and what the impacts have been on the organization overall. In addition, following the required reading for this week, evaluate the importance of establishing an IT security culture within your organization and describe your basic plan for getting started. If your organization already employs best practices in security culture, describe what they do and how it works.

Your paper should be 2-3 pages (not including the cover page or final references page), including in-text headings for the topics addressed, and in-text citations matching the references given at the end of the paper.

Central Tendency

discuss the different measures of central tendency and when each of them is most appropriate.

Remember that you need to respond/comment  to this 3 students as well.

1. the chapter mentions several types of numerical measures used in descriptive statistics. Some of the ways mentioned are median, mean, and mode. Mean, median, mode are used to describe a set with a single value. Mean is an average set of numbers. It is also the most common measure of central tendency. You can calculate the mean by adding all the numbers in a data set and dividing that amount by the total number  in the set. For example, you may use mean to calculate your grades in a class. Mean is most appropriate when you want to get an overall idea of a data set. The next numerical measure used in the chapter is median. Median is first calculated by arranging the numbers from lowest to highest. The number that falls in the middle of the set of the numbers is the median. It is typically the middle value. The benefit of median is that it is not influenced by outliers. Median is used mostly for skewed distributions. Lastly, the mode is also a numerical measure used in descriptive statistics. Mode is calculated by finding the value most commonly used in a data set. According to the chapter, mode is a great way to categorize data. Unfortunately it is not really unique when it comes to describing data.

2.  the measures of central tendency are the mean, median, and the mode. The mean is the most used central tendency. It is the average measure that is used to find discrete and continuous data. It is the sum of all values in a data set divided by the number of values in the data set. The importance of this central tendency is to produce the lowest amount of error from all values in a data set. The median is used when the data is measured on an ordinal scale. The importance of median is to determine the missing or undetermined values in your data. The mode shows the categorical data. It is used when measuring the data on a nominal scale.

3.    There are 3 main measures of central tendency are  the mean , median , and the mode. The mean is considered the average, its most useful to use the mean when the data set is has no extreme values,  meaning there are no values that are much higher or much lower than the rest of the data set.  The median is the middle value , its best to use it when the data set has extreme  values because it will be easier to find the middle number.  The mode is the most common number in the data set, its best to use the mode when the data has repeating values. 

Sunny Bid Purposal

 

The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):

1) Equipment is disappearing

2) No building or computer room security.

3) No policies (AUP)

4) No virus protection and experiencing viruses daily

5) No intrusion detection and experiencing intrusions daily 

6) Passwords compromised 

7) There is an Internet connection but no protection and content filtering

8) Sensitive information is being copied from systems

9) If a disaster should happen to the building there are no plans to recover

Minimum topics to be included in your Bid Response Proposal are the following:

  1. Deliver      a Bid Response Proposal to provide a business security solution to      prevent malicious or unauthorized use of digital assets
  2. Create      and implement effective policies to mitigate risks
  3. Deliver      a detailed list of security products and pricing
  4. Provide      safeguards for the information assets

Format:

Format for the project should be a 15-20 slide PowerPoint presentation with a budget sheet.

Resources:

www.cisco.com

www.dell.com

Security Handout

(68 security products)

www.hp.com

www.veritas.com

www.sungard.com