Excel Data Reporting: Assignment 3 Data Analysis (Feasibility Study Data
Reporting)
Assignment Checklist:
☐ Am I submitting my Excel workbook AND delivery of strategy (delivery can be
a paper or a podcast)?
☐ Did I place all of my files into a folder and then compress that folder to upload
to the FSO platform?
☐ Did I include messages in my chart titles to persuade my audience?
☐ Did I use projection formulas as well as percent change formulas to analyze
the company's financials?
☐ Did I review the Worksheet Design Guidelines before submitting my Excel
workbook?
☐ Did I use the correct chart types for my data?
☐ Did I properly format my axes so my audience will know how the data is being
measured? (For example: dollar figures include dollar signs, percentages show
the percent symbol)
☐ Do the Excel Data file and delivery form I'm presenting tell a persuasive
story?
☐ Did I include citations and references for all of the sources I used for my
data?
Your introduction to the topic provides background information and prepares the reader for what follows. After discussing the OS vulnerabilities, you describe the threats to your environment. As you say, you can prevent weak password by setting up the security policies to enforce strong policies and this is so easy to implement that you can remove the threat right away. Instead of 'Week', try 'Weak'. You have very good material. The only item missed was the prioritization of the threats to decide which ones to mitigate. Good references and citations. Grade: 05/05 – Document Organization 15/15 – OS for Security 35/35 – OS Security Risks 34/35 – Mitigation Strategy 10/10 – Mechanics 99%
Operating System Security
Operating system security can be defined as the various sets of protection mechanisms or techniques employed by system administrators to prevent information theft and unauthorized resource access. All systems and especially in distributed systems require some measure of security that only allows authorized data manipulation and availability to employees of a company. Jinx will also need to secure its system to prevent both external and internal threats.
Services that are mostly focus on in system security include;
· Authentication: This is the validation of system servers or the identity of users or information/data senders within an organization.
· Availability: Authorized users of a system should be able to access information freely in addition to withholding it from unauthorized access. This also includes shared resources in the system.
· Authorization: This can also be referred to as Access Control. Organizations can limit the number of people access the network resources by simply verifying users when logging into the system. Using passwords and usernames is one way of controlling unauthorized access to computers and the system. However, authentication does not always guarantee a user full access to network resources or da ...
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
1. Excel Data Reporting: Assignment 3 Data Analysis (Feasibility
Study Data
Reporting)
Assignment Checklist:
☐ Am I submitting my Excel workbook AND delivery of
strategy (delivery can be
a paper or a podcast)?
☐ Did I place all of my files into a folder and then compress
that folder to upload
to the FSO platform?
☐ Did I include messages in my chart titles to persuade my
audience?
☐ Did I use projection formulas as well as percent change
formulas to analyze
the company's financials?
☐ Did I review the Worksheet Design Guidelines before
submitting my Excel
workbook?
☐ Did I use the correct chart types for my data?
☐ Did I properly format my axes so my audience will know how
the data is being
measured? (For example: dollar figures include dollar signs,
percentages show
the percent symbol)
2. ☐ Do the Excel Data file and delivery form I'm presenting tell a
persuasive
story?
☐ Did I include citations and references for all of the sources I
used for my
data?
Your introduction to the topic provides background information
and prepares the reader for what follows. After discussing the
OS vulnerabilities, you describe the threats to your
environment. As you say, you can prevent weak password by
setting up the security policies to enforce strong policies and
this is so easy to implement that you can remove the threat right
away. Instead of 'Week', try 'Weak'. You have very good
material. The only item missed was the prioritization of the
threats to decide which ones to mitigate. Good references and
citations. Grade: 05/05 – Document Organization 15/15 – OS
for Security 35/35 – OS Security Risks 34/35 – Mitigation
Strategy 10/10 – Mechanics 99%
Operating System Security
Operating system security can be defined as the various sets of
protection mechanisms or techniques employed by system
administrators to prevent information theft and unauthorized
resource access. All systems and especially in distributed
systems require some measure of security that only allows
authorized data manipulation and availability to employees of a
company. Jinx will also need to secure its system to prevent
3. both external and internal threats.
Services that are mostly focus on in system security include;
· Authentication: This is the validation of system servers or the
identity of users or information/data senders within an
organization.
· Availability: Authorized users of a system should be able to
access information freely in addition to withholding it from
unauthorized access. This also includes shared resources in the
system.
· Authorization: This can also be referred to as Access Control.
Organizations can limit the number of people access the
network resources by simply verifying users when logging into
the system. Using passwords and usernames is one way of
controlling unauthorized access to computers and the system.
However, authentication does not always guarantee a user full
access to network resources or data. This is only achieved
through the process of authorization.
· Confidentiality: When the personnel is involved in leaking
information or if the system has poor measures in their security
protocols then information can be disclosed to unauthorized
people. Allowing access to delicate information anonymously is
a good example of poor security.
· Integrity: It involves preventing of fraudulent access and
altering of a company’s sensitive information. Authorized users
can also cause errors or omissions hence alteration of important
business data (Heidari, 2011).
System security is classified into three main protective
measures. The system administrator needs knowledge of the
information’s value so that they are able to develop the right
security measures. They include;
· Prevention: This can be done in a number of ways ranging
4. from setting up high security protocols to locking servers in
strong rooms. All these policies are put in place to prevent data
theft, damage or alteration.
· Detection: Tools have been developed to aid in detecting
unauthorized intrusion, alterations, viruses and damages. A
system administrator is required to take steps that ensure
information is protected from loss, being illegally altered or
being damaged to enable a company function at maximum
output. Detection also may include finding out information
about extent of damages, how data has been altered or which
data has been stolen.
· Reaction: This includes setting up corrective measure to
effectively recover damaged or lost information.
Security Threats
We have various security threats and attacks that have been
discussed worldwide. These threats can be divided into two
categories; natural disasters and human threats. Natural
disasters are unforeseen and in most cases very hard to predict.
Hurricanes, fire, lightning or floods are some of the natural
disasters that can occur and cause damage to physical
components of a system. Other security threats that are human
caused but categorized as natural disasters include terrorist
attacks, riots or in the event of a war.
Human caused threats are many and consist of internal attacks
by unsatisfied or malicious employees or external threats by
hackers who look to disrupt and harm the smooth running of an
organization. Employees and former employees however pose
the greatest security threat because they have knowledge of
security passwords and protocols of a company. Insiders can
5. delete vital information either maliciously or accidentally and
they can also damage information by planting viruses and other
malware. Crackers or hacker also pose considerable threats to
vulnerable systems. The goal of a hacker could be to steal
information, damage the information to disrupt the effective
running of an organization or to simply alter important data.
Main areas of the operating system that are evaluated for
performing risk assessment at Jinx are:
· The biggest threat to data
· Unprotected network access
· weak or compromised passwords
· Physical Security
· Malware
Threat to the data: The biggest threat to the Operating system is
the threat to the data stored in databases. The data of the
company is highly confidential and the organization needs to
secure that data and the organization has to make it
confidential. To make the data more secure the Jinx may have to
add some high-level data security permissions to the database
(Watson M, 2012). Also controlling the availability of sensitive
data to unauthorized employees is a threat to the integrity of a
company’s information. Data threats sometimes can be caused
by viruses, worms or Trojans planted by disgruntled employees
or malicious hacker
Unprotected network access: The network of the enterprise
should be protected from external access. External users may
cause damage to confidential data or steal data for purposes of
selling it to competitors. Most companies rely on the menu
security because it is easy to build. Menu security ensures that
different categories of employees have access to the data
authorized for manipulation in their area of operation. Access is
limited while other menu items remain deactivated and
unavailable to the entire security group. Creating user accounts
in separate security groups and creating passwords reduces the
risk of compromising data integrity.
Weak or compromised cryptographic algorithms: Another
6. security threat to the enterprise is weak and easily compromised
passwords. The password of a user can be sniffed in the network
traffic so there are more chances of security breach using stolen
passwords. Passwords should be encrypted using strong
cryptographic algorithms. Malicious attackers may sometimes
manage to develop plaintext access codes from encrypted
passwords.
Physical security: Physical security is one of the most important
methods of guaranteeing operating system security. Since
operating system code and configuration files are installed on a
system's internal hard drive, an attacker with physical right of
entry to the system can easily modify, delete or steal critical
files on a system. For this motive, most commercial servers are
stored in protected rooms and watched by armed security guards
Malware: Malware, short for malicious software, hijacks an
operating system to perform some sort of destructive task for an
attacker. Viruses, Trojans, Worms and spyware are the most
common form of malware, and each work to destabilize
operating system security controls (Shawgo, Faber & Whitney,
2005).
Prioritization risks in the operating system:
(== missing this part =======??????
Risk mitigations for the risks in the operating systems:
Database security:
1) The first thing we have to implement in the company’s
system is separate the web server and database server of the
enterprise.
2) Encryption of stored files so that if anyone has unauthorized
access they cannot steal and decrypt it.
3) Encrypt your backup files.
4) Use web application firewalls. It protects the database of the
enterprise from unwanted users otherwise known as crackers.
Unprotected network access:
1) Apply proper security protocols to the company’s network.
Setting up of proper and complex passwords to the network is
one way of ensuring less to no unauthorized network breach.
7. 2) Use firewalls in the network to restrict unwanted users from
gaining access to the enterprise network (Bassil, 2012).
3) Reduce the use of Telnet protocols that allow user to log into
a system connected to the network remotely and operate it as if
they were sitted there.
4) Avoid using commands that reveal a user’s confidential
information as well as sensitive system information. These
commands can cause system vulnerability and allow hackers to
infiltrate the system. They include Rexec and Finger.
Weak or compromised passwords:
1) Use Single Sign-On to reduce the number of stored
passwords in your organisation’s database.
2) Don’t send passwords via email, or over un-secured
networks.
3) Require that passwords be changed at regular intervals.
4) Don’t use default passwords (Watson M, 2012).
Physical security:
1) Keeping all important company resources like servers behind
a locked door and protected from natural and human-made
disasters.
Malware:
1) Run Windows Firewall to protect individual computers while
on the Internet.
2) Run a secondary system protection firewall program
whenever you use the Internet. (Wepman, 2007)
References
Bassil, Y. (2012). Windows and linux operating systems from a
security perspective. Journal of Global Research in Computer
Science, 3(2), Retrieved from
http://www.jgrcs.info/index.php/jgrcs/article/download/305/259
Heidari, M. (2011, July 11). Operating systems security
considerations. Retrieved from
http://www.packetsource.com/article/operating-
8. system/40069/operating-systems-security-considerations
Shawgo, J., Faber, S., & Whitney, N. (2005). Operating system
legacy, enterprise, and
specialized security benchmark consensus baseline security
settings. The Center for
Internet Security, 2(1),
Watson M, R. N. (2012). New approaches to operating system
security extensibility. (Doctoral dissertation), Available from
Technical Report. (UCAM-CL-TR-818)Retrieved from
http://www.cl.cam.ac.uk/techreports/
Week
Three
–
Online
Excel Data Reporting: Assignment 3 Data Analysis (Feasibility
Study Data
Reporting)
The objectives of this assignment are to help you:
1. Analyze and interpret financial data
2. Chart data in Excel using the MCCD Model
9. 3. Create a persuasive argument to influence the audience
Assignment Requirements:
4. Your assignment must include the following:
o Excel Data Analysis:
o Presentation:
Part 1 – Identify and submit publicly traded company choice,
proposal idea
and financial statements.
Due by Wednesday of Week 3 on the Assignment 3 Part 1
discussion board
Use LexisNexis in the library research tools to choose a public
company of
your choice that you will develop a new strategy for. Submit
your choice
of a public company, proposal idea as well as the reference for
the raw
financial data from the LexisNexis database to the Assignment 3
Part 1
discussion board.
10. Your proposal idea should be a new strategy for the company to
improve
overall financial performance. This may include proposing a
new product,
halting production of an existing product, improving
distribution, targeting
new markets, etc.
While this information will be posted on a discussion board,
only one post
is required. If you would like to provide feedback to a fellow
classmate,
you are more than welcome to, but it is not a requirement.
If you have any difficulties choosing a company, developing a
strategy or
finding financial statements, be sure to attend our live
GoToTraining
session or contact your instructor.
Part 2 – Excel Data Analysis
Excel Data Analysis Requirements:
5. Your analysis must include all of the following:
o Historic performance (calculate percent change)
o Calculated projections
o Four or more charts
Examples of company figures to calculate percent change and
projections may
11. include (but are not limited to):
6. Revenue
7. COGS (Might be Cost of Sales if no product)
8. Gross Profit
9. Operating Expenses
10. Net Profit
Remember: Use the data to tell your story: Whichever
information will
support and defend your proposal is what should be presented.
At least
one chart should display your projections but feel free to
encompass other
impacts of your proposal such as:
11. Demographic Data (current or potential customers, new
markets, etc.)
12. Competitive Analysis (market share, competitor’s financial
performance, etc.)
13. Market Trends (product usage or popularity, prices, etc.)
Using this calculated data, create Excel charts to display the
need for your
proposed strategy. Design the charts according to the lessons
learned from Say
It With Charts.
Part 3 – Delivery
Due by Sunday of Week Four
In addition to the Excel document being submitted, select one of
12. the following
two options to deliver your pitch:
14. Write a paper. Must be two-to-three pages and follow APA
format. Be sure to
write in a professional business style and be persuasive. Sell
your idea to the
company on why they should change or add this
product/service. Use the Excel
data/charts to support the paper. Cite sources for all of your
research.
a. Deliverables:
i. Word file
ii. Excel file
15. Create a podcast. Create a narrated presentation selling
your idea to the
company. An Excel file with all of your calculations and
original charts will
Week
Three
–
Online
accompany and support the audio presentation. Cite sources for
13. all of your
research. Make sure the script you read from follows the
Academic Integrity
standards.
a. Deliverables:
i. Excel file
ii. Podcast File
If you have any questions or concerns, be sure to attend our live
Week Four
GoToTraining session or contact your instructor.
Plan for the worksheets to be printed and review the bundled
worksheet design
guidelines as well as the Assignment Three checklist.
Academic Integrity
Please review the Academic Integrity section of the course
Syllabus and ensure
that your assignment does not plagiarize or violate any
academic integrity
principles of Full Sail University before submitting it. Violation
of this policy can
have severe consequences.
Students are required to use their own language when writing
papers or
submitting other media assignments. The purpose of
assignments is for each
student to demonstrate his or her own analysis, ideas, and
synthesized
information – not to just copy and paste what has been
published on a particular
topic. While research is encouraged for some assignments,
14. research entails
reading and synthesizing information with one’s own ideas, and
citing sources
used during research, to give credit to those whose ideas or
language are
utilized. Quoted materials should be clearly identified and
woven into a longer
paper that consists primarily of the student’s ideas. Quotations
must be
punctuated as quotations per APA format, must be cited, and
must not represent
the majority of the assignment.
Plagiarism is using another author’s ideas, words, or language
without putting
those words in quotation marks and citing the reference, giving
proper credit to
the author. Plagiarism also includes changing the words from a
third party source
while maintaining the same sentence structure and not providing
proper citation
and reference. It is not permissible to copy a passage and then
just change a few
words. These actions are considered plagiarism, regardless of
whether or
not the intention was to plagiarize. To avoid plagiarism,
students should
adhere to the following guidelines:
a. If you are using words that were written or spoken by
someone else, you
must put quotation marks around the words and insert the
citation in
parentheses at the end of the quote. Any quote over 40 words
must be in
15. indented block paragraph style, per APA guidelines.
b. Even brief phrases of four words or more must be included in
quotation
marks if those words are not your own and were taken from
another
source.
c. If the information or ideas you are using come from another
source—even
if it is paraphrased and contains your own words—you must cite
the
source at the end of the passage (in parentheses) and in the
“References”
section at the end of the paper. Please refer to the APA style
guide for
examples on how to cite various types of references
(www.apastyle.org).
d. No more than 10% of your paper should be directly quoted
material,
unless the course director indicates otherwise within the
assignment
instructions.