SlideShare a Scribd company logo
1 of 15
Excel Data Reporting: Assignment 3 Data Analysis (Feasibility
Study Data
Reporting)
Assignment Checklist:
☐ Am I submitting my Excel workbook AND delivery of
strategy (delivery can be
a paper or a podcast)?
☐ Did I place all of my files into a folder and then compress
that folder to upload
to the FSO platform?
☐ Did I include messages in my chart titles to persuade my
audience?
☐ Did I use projection formulas as well as percent change
formulas to analyze
the company's financials?
☐ Did I review the Worksheet Design Guidelines before
submitting my Excel
workbook?
☐ Did I use the correct chart types for my data?
☐ Did I properly format my axes so my audience will know how
the data is being
measured? (For example: dollar figures include dollar signs,
percentages show
the percent symbol)
☐ Do the Excel Data file and delivery form I'm presenting tell a
persuasive
story?
☐ Did I include citations and references for all of the sources I
used for my
data?
Your introduction to the topic provides background information
and prepares the reader for what follows. After discussing the
OS vulnerabilities, you describe the threats to your
environment. As you say, you can prevent weak password by
setting up the security policies to enforce strong policies and
this is so easy to implement that you can remove the threat right
away. Instead of 'Week', try 'Weak'. You have very good
material. The only item missed was the prioritization of the
threats to decide which ones to mitigate. Good references and
citations. Grade: 05/05 – Document Organization 15/15 – OS
for Security 35/35 – OS Security Risks 34/35 – Mitigation
Strategy 10/10 – Mechanics 99%
Operating System Security
Operating system security can be defined as the various sets of
protection mechanisms or techniques employed by system
administrators to prevent information theft and unauthorized
resource access. All systems and especially in distributed
systems require some measure of security that only allows
authorized data manipulation and availability to employees of a
company. Jinx will also need to secure its system to prevent
both external and internal threats.
Services that are mostly focus on in system security include;
· Authentication: This is the validation of system servers or the
identity of users or information/data senders within an
organization.
· Availability: Authorized users of a system should be able to
access information freely in addition to withholding it from
unauthorized access. This also includes shared resources in the
system.
· Authorization: This can also be referred to as Access Control.
Organizations can limit the number of people access the
network resources by simply verifying users when logging into
the system. Using passwords and usernames is one way of
controlling unauthorized access to computers and the system.
However, authentication does not always guarantee a user full
access to network resources or data. This is only achieved
through the process of authorization.
· Confidentiality: When the personnel is involved in leaking
information or if the system has poor measures in their security
protocols then information can be disclosed to unauthorized
people. Allowing access to delicate information anonymously is
a good example of poor security.
· Integrity: It involves preventing of fraudulent access and
altering of a company’s sensitive information. Authorized users
can also cause errors or omissions hence alteration of important
business data (Heidari, 2011).
System security is classified into three main protective
measures. The system administrator needs knowledge of the
information’s value so that they are able to develop the right
security measures. They include;
· Prevention: This can be done in a number of ways ranging
from setting up high security protocols to locking servers in
strong rooms. All these policies are put in place to prevent data
theft, damage or alteration.
· Detection: Tools have been developed to aid in detecting
unauthorized intrusion, alterations, viruses and damages. A
system administrator is required to take steps that ensure
information is protected from loss, being illegally altered or
being damaged to enable a company function at maximum
output. Detection also may include finding out information
about extent of damages, how data has been altered or which
data has been stolen.
· Reaction: This includes setting up corrective measure to
effectively recover damaged or lost information.
Security Threats
We have various security threats and attacks that have been
discussed worldwide. These threats can be divided into two
categories; natural disasters and human threats. Natural
disasters are unforeseen and in most cases very hard to predict.
Hurricanes, fire, lightning or floods are some of the natural
disasters that can occur and cause damage to physical
components of a system. Other security threats that are human
caused but categorized as natural disasters include terrorist
attacks, riots or in the event of a war.
Human caused threats are many and consist of internal attacks
by unsatisfied or malicious employees or external threats by
hackers who look to disrupt and harm the smooth running of an
organization. Employees and former employees however pose
the greatest security threat because they have knowledge of
security passwords and protocols of a company. Insiders can
delete vital information either maliciously or accidentally and
they can also damage information by planting viruses and other
malware. Crackers or hacker also pose considerable threats to
vulnerable systems. The goal of a hacker could be to steal
information, damage the information to disrupt the effective
running of an organization or to simply alter important data.
Main areas of the operating system that are evaluated for
performing risk assessment at Jinx are:
· The biggest threat to data
· Unprotected network access
· weak or compromised passwords
· Physical Security
· Malware
Threat to the data: The biggest threat to the Operating system is
the threat to the data stored in databases. The data of the
company is highly confidential and the organization needs to
secure that data and the organization has to make it
confidential. To make the data more secure the Jinx may have to
add some high-level data security permissions to the database
(Watson M, 2012). Also controlling the availability of sensitive
data to unauthorized employees is a threat to the integrity of a
company’s information. Data threats sometimes can be caused
by viruses, worms or Trojans planted by disgruntled employees
or malicious hacker
Unprotected network access: The network of the enterprise
should be protected from external access. External users may
cause damage to confidential data or steal data for purposes of
selling it to competitors. Most companies rely on the menu
security because it is easy to build. Menu security ensures that
different categories of employees have access to the data
authorized for manipulation in their area of operation. Access is
limited while other menu items remain deactivated and
unavailable to the entire security group. Creating user accounts
in separate security groups and creating passwords reduces the
risk of compromising data integrity.
Weak or compromised cryptographic algorithms: Another
security threat to the enterprise is weak and easily compromised
passwords. The password of a user can be sniffed in the network
traffic so there are more chances of security breach using stolen
passwords. Passwords should be encrypted using strong
cryptographic algorithms. Malicious attackers may sometimes
manage to develop plaintext access codes from encrypted
passwords.
Physical security: Physical security is one of the most important
methods of guaranteeing operating system security. Since
operating system code and configuration files are installed on a
system's internal hard drive, an attacker with physical right of
entry to the system can easily modify, delete or steal critical
files on a system. For this motive, most commercial servers are
stored in protected rooms and watched by armed security guards
Malware: Malware, short for malicious software, hijacks an
operating system to perform some sort of destructive task for an
attacker. Viruses, Trojans, Worms and spyware are the most
common form of malware, and each work to destabilize
operating system security controls (Shawgo, Faber & Whitney,
2005).
Prioritization risks in the operating system:
(== missing this part =======??????
Risk mitigations for the risks in the operating systems:
Database security:
1) The first thing we have to implement in the company’s
system is separate the web server and database server of the
enterprise.
2) Encryption of stored files so that if anyone has unauthorized
access they cannot steal and decrypt it.
3) Encrypt your backup files.
4) Use web application firewalls. It protects the database of the
enterprise from unwanted users otherwise known as crackers.
Unprotected network access:
1) Apply proper security protocols to the company’s network.
Setting up of proper and complex passwords to the network is
one way of ensuring less to no unauthorized network breach.
2) Use firewalls in the network to restrict unwanted users from
gaining access to the enterprise network (Bassil, 2012).
3) Reduce the use of Telnet protocols that allow user to log into
a system connected to the network remotely and operate it as if
they were sitted there.
4) Avoid using commands that reveal a user’s confidential
information as well as sensitive system information. These
commands can cause system vulnerability and allow hackers to
infiltrate the system. They include Rexec and Finger.
Weak or compromised passwords:
1) Use Single Sign-On to reduce the number of stored
passwords in your organisation’s database.
2) Don’t send passwords via email, or over un-secured
networks.
3) Require that passwords be changed at regular intervals.
4) Don’t use default passwords (Watson M, 2012).
Physical security:
1) Keeping all important company resources like servers behind
a locked door and protected from natural and human-made
disasters.
Malware:
1) Run Windows Firewall to protect individual computers while
on the Internet.
2) Run a secondary system protection firewall program
whenever you use the Internet. (Wepman, 2007)
References
Bassil, Y. (2012). Windows and linux operating systems from a
security perspective. Journal of Global Research in Computer
Science, 3(2), Retrieved from
http://www.jgrcs.info/index.php/jgrcs/article/download/305/259
Heidari, M. (2011, July 11). Operating systems security
considerations. Retrieved from
http://www.packetsource.com/article/operating-
system/40069/operating-systems-security-considerations
Shawgo, J., Faber, S., & Whitney, N. (2005). Operating system
legacy, enterprise, and
specialized security benchmark consensus baseline security
settings. The Center for
Internet Security, 2(1),
Watson M, R. N. (2012). New approaches to operating system
security extensibility. (Doctoral dissertation), Available from
Technical Report. (UCAM-CL-TR-818)Retrieved from
http://www.cl.cam.ac.uk/techreports/
Week
Three
–
Online
Excel Data Reporting: Assignment 3 Data Analysis (Feasibility
Study Data
Reporting)
The objectives of this assignment are to help you:
1. Analyze and interpret financial data
2. Chart data in Excel using the MCCD Model
3. Create a persuasive argument to influence the audience
Assignment Requirements:
4. Your assignment must include the following:
o Excel Data Analysis:
o Presentation:
Part 1 – Identify and submit publicly traded company choice,
proposal idea
and financial statements.
Due by Wednesday of Week 3 on the Assignment 3 Part 1
discussion board
Use LexisNexis in the library research tools to choose a public
company of
your choice that you will develop a new strategy for. Submit
your choice
of a public company, proposal idea as well as the reference for
the raw
financial data from the LexisNexis database to the Assignment 3
Part 1
discussion board.
Your proposal idea should be a new strategy for the company to
improve
overall financial performance. This may include proposing a
new product,
halting production of an existing product, improving
distribution, targeting
new markets, etc.
While this information will be posted on a discussion board,
only one post
is required. If you would like to provide feedback to a fellow
classmate,
you are more than welcome to, but it is not a requirement.
If you have any difficulties choosing a company, developing a
strategy or
finding financial statements, be sure to attend our live
GoToTraining
session or contact your instructor.
Part 2 – Excel Data Analysis
Excel Data Analysis Requirements:
5. Your analysis must include all of the following:
o Historic performance (calculate percent change)
o Calculated projections
o Four or more charts
Examples of company figures to calculate percent change and
projections may
include (but are not limited to):
6. Revenue
7. COGS (Might be Cost of Sales if no product)
8. Gross Profit
9. Operating Expenses
10. Net Profit
Remember: Use the data to tell your story: Whichever
information will
support and defend your proposal is what should be presented.
At least
one chart should display your projections but feel free to
encompass other
impacts of your proposal such as:
11. Demographic Data (current or potential customers, new
markets, etc.)
12. Competitive Analysis (market share, competitor’s financial
performance, etc.)
13. Market Trends (product usage or popularity, prices, etc.)
Using this calculated data, create Excel charts to display the
need for your
proposed strategy. Design the charts according to the lessons
learned from Say
It With Charts.
Part 3 – Delivery
Due by Sunday of Week Four
In addition to the Excel document being submitted, select one of
the following
two options to deliver your pitch:
14. Write a paper. Must be two-to-three pages and follow APA
format. Be sure to
write in a professional business style and be persuasive. Sell
your idea to the
company on why they should change or add this
product/service. Use the Excel
data/charts to support the paper. Cite sources for all of your
research.
a. Deliverables:
i. Word file
ii. Excel file
15. Create a podcast. Create a narrated presentation selling
your idea to the
company. An Excel file with all of your calculations and
original charts will
Week
Three
–
Online
accompany and support the audio presentation. Cite sources for
all of your
research. Make sure the script you read from follows the
Academic Integrity
standards.
a. Deliverables:
i. Excel file
ii. Podcast File
If you have any questions or concerns, be sure to attend our live
Week Four
GoToTraining session or contact your instructor.
Plan for the worksheets to be printed and review the bundled
worksheet design
guidelines as well as the Assignment Three checklist.
Academic Integrity
Please review the Academic Integrity section of the course
Syllabus and ensure
that your assignment does not plagiarize or violate any
academic integrity
principles of Full Sail University before submitting it. Violation
of this policy can
have severe consequences.
Students are required to use their own language when writing
papers or
submitting other media assignments. The purpose of
assignments is for each
student to demonstrate his or her own analysis, ideas, and
synthesized
information – not to just copy and paste what has been
published on a particular
topic. While research is encouraged for some assignments,
research entails
reading and synthesizing information with one’s own ideas, and
citing sources
used during research, to give credit to those whose ideas or
language are
utilized. Quoted materials should be clearly identified and
woven into a longer
paper that consists primarily of the student’s ideas. Quotations
must be
punctuated as quotations per APA format, must be cited, and
must not represent
the majority of the assignment.
Plagiarism is using another author’s ideas, words, or language
without putting
those words in quotation marks and citing the reference, giving
proper credit to
the author. Plagiarism also includes changing the words from a
third party source
while maintaining the same sentence structure and not providing
proper citation
and reference. It is not permissible to copy a passage and then
just change a few
words. These actions are considered plagiarism, regardless of
whether or
not the intention was to plagiarize. To avoid plagiarism,
students should
adhere to the following guidelines:
a. If you are using words that were written or spoken by
someone else, you
must put quotation marks around the words and insert the
citation in
parentheses at the end of the quote. Any quote over 40 words
must be in
indented block paragraph style, per APA guidelines.
b. Even brief phrases of four words or more must be included in
quotation
marks if those words are not your own and were taken from
another
source.
c. If the information or ideas you are using come from another
source—even
if it is paraphrased and contains your own words—you must cite
the
source at the end of the passage (in parentheses) and in the
“References”
section at the end of the paper. Please refer to the APA style
guide for
examples on how to cite various types of references
(www.apastyle.org).
d. No more than 10% of your paper should be directly quoted
material,
unless the course director indicates otherwise within the
assignment
instructions.

More Related Content

Similar to Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx

Website security
Website securityWebsite security
Website securityRIPPER95
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...Alisha Henderson
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breachincmagazineseo
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security FrameworkMaria Perkins
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKijcsit
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptwaleejhaider1
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxJanani S
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxwlynn1
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Mukesh Chinta
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxronak56
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 

Similar to Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx (20)

Website security
Website securityWebsite security
Website security
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
A Database System Security Framework
A Database System Security FrameworkA Database System Security Framework
A Database System Security Framework
 
A DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORKA DATABASE SYSTEM SECURITY FRAMEWORK
A DATABASE SYSTEM SECURITY FRAMEWORK
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
Ethical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptxEthical Hacking and Network Defence 1.pptx
Ethical Hacking and Network Defence 1.pptx
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 
IS Unit II.pptx
IS Unit II.pptxIS Unit II.pptx
IS Unit II.pptx
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Securing information system
Securing information systemSecuring information system
Securing information system
 

More from gitagrimston

External Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxExternal Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxgitagrimston
 
Exploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxExploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxgitagrimston
 
External and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxExternal and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxgitagrimston
 
Exploring Music Concert Paper Guidelines Instructions.docx
Exploring Music  Concert Paper Guidelines Instructions.docxExploring Music  Concert Paper Guidelines Instructions.docx
Exploring Music Concert Paper Guidelines Instructions.docxgitagrimston
 
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxExpo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxgitagrimston
 
ExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxgitagrimston
 
Explain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxExplain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxgitagrimston
 
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxExploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxgitagrimston
 
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxExploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxgitagrimston
 
Explain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxExplain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxgitagrimston
 
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations  6.1 Qualities of Explanations Questions 0 of 3 com.docxExplanations  6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docxgitagrimston
 
Experts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxExperts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxgitagrimston
 
Explain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxExplain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxgitagrimston
 
Explain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxExplain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxgitagrimston
 
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxExplain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxgitagrimston
 
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxExplain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxgitagrimston
 
Exploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxExploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxgitagrimston
 
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxExploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxgitagrimston
 
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxExperiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxgitagrimston
 
Experimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxExperimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxgitagrimston
 

More from gitagrimston (20)

External Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docxExternal Factor Analysis Summary (EFAS Table)External Factors.docx
External Factor Analysis Summary (EFAS Table)External Factors.docx
 
Exploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docxExploring Online Consumer Behaviors.docx
Exploring Online Consumer Behaviors.docx
 
External and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docxExternal and Internal Analysis 8Extern.docx
External and Internal Analysis 8Extern.docx
 
Exploring Music Concert Paper Guidelines Instructions.docx
Exploring Music  Concert Paper Guidelines Instructions.docxExploring Music  Concert Paper Guidelines Instructions.docx
Exploring Music Concert Paper Guidelines Instructions.docx
 
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docxExpo 12 Discussion QuestionsThink about the cooperative learni.docx
Expo 12 Discussion QuestionsThink about the cooperative learni.docx
 
ExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docxExplanationMaster Honey is a franchise-style company that sel.docx
ExplanationMaster Honey is a franchise-style company that sel.docx
 
Explain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docxExplain where industry profits are maximized in the figure below.docx
Explain where industry profits are maximized in the figure below.docx
 
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docxExploratory EssayResearch - 1The ability to Wallow in complex.docx
Exploratory EssayResearch - 1The ability to Wallow in complex.docx
 
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docxExploring MusicExtra Credit #2 Due November 6 in classIn G.docx
Exploring MusicExtra Credit #2 Due November 6 in classIn G.docx
 
Explain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docxExplain why Franz Boas did not accept Morgan’s view about evol.docx
Explain why Franz Boas did not accept Morgan’s view about evol.docx
 
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations  6.1 Qualities of Explanations Questions 0 of 3 com.docxExplanations  6.1 Qualities of Explanations Questions 0 of 3 com.docx
Explanations 6.1 Qualities of Explanations Questions 0 of 3 com.docx
 
Experts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docxExperts PresentationStudentPSY 496Instructor.docx
Experts PresentationStudentPSY 496Instructor.docx
 
Explain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docxExplain whether Okonkwo was remaining truthful to himself by killi.docx
Explain whether Okonkwo was remaining truthful to himself by killi.docx
 
Explain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docxExplain How these Aspects Work Together to Perform the Primary Fun.docx
Explain How these Aspects Work Together to Perform the Primary Fun.docx
 
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docxExplain the 3 elements of every negotiation. Why is WinWin used m.docx
Explain the 3 elements of every negotiation. Why is WinWin used m.docx
 
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docxExplain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
Explain how the Kluckhohn–Strodtbeck and the Hofstede framework ca.docx
 
Exploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docxExploration 8 – Shifting and Stretching Rational Functions .docx
Exploration 8 – Shifting and Stretching Rational Functions .docx
 
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docxExploring Innovation in Action Power to the People – Lifeline Ene.docx
Exploring Innovation in Action Power to the People – Lifeline Ene.docx
 
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docxExperiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
Experiment 8 - Resistance and Ohm’s Law 8.1 Introduction .docx
 
Experimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docxExperimental Essay The DialecticThe purpose of this paper is to.docx
Experimental Essay The DialecticThe purpose of this paper is to.docx
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx

  • 1. Excel Data Reporting: Assignment 3 Data Analysis (Feasibility Study Data Reporting) Assignment Checklist: ☐ Am I submitting my Excel workbook AND delivery of strategy (delivery can be a paper or a podcast)? ☐ Did I place all of my files into a folder and then compress that folder to upload to the FSO platform? ☐ Did I include messages in my chart titles to persuade my audience? ☐ Did I use projection formulas as well as percent change formulas to analyze the company's financials? ☐ Did I review the Worksheet Design Guidelines before submitting my Excel workbook? ☐ Did I use the correct chart types for my data? ☐ Did I properly format my axes so my audience will know how the data is being measured? (For example: dollar figures include dollar signs, percentages show the percent symbol)
  • 2. ☐ Do the Excel Data file and delivery form I'm presenting tell a persuasive story? ☐ Did I include citations and references for all of the sources I used for my data? Your introduction to the topic provides background information and prepares the reader for what follows. After discussing the OS vulnerabilities, you describe the threats to your environment. As you say, you can prevent weak password by setting up the security policies to enforce strong policies and this is so easy to implement that you can remove the threat right away. Instead of 'Week', try 'Weak'. You have very good material. The only item missed was the prioritization of the threats to decide which ones to mitigate. Good references and citations. Grade: 05/05 – Document Organization 15/15 – OS for Security 35/35 – OS Security Risks 34/35 – Mitigation Strategy 10/10 – Mechanics 99% Operating System Security Operating system security can be defined as the various sets of protection mechanisms or techniques employed by system administrators to prevent information theft and unauthorized resource access. All systems and especially in distributed systems require some measure of security that only allows authorized data manipulation and availability to employees of a company. Jinx will also need to secure its system to prevent
  • 3. both external and internal threats. Services that are mostly focus on in system security include; · Authentication: This is the validation of system servers or the identity of users or information/data senders within an organization. · Availability: Authorized users of a system should be able to access information freely in addition to withholding it from unauthorized access. This also includes shared resources in the system. · Authorization: This can also be referred to as Access Control. Organizations can limit the number of people access the network resources by simply verifying users when logging into the system. Using passwords and usernames is one way of controlling unauthorized access to computers and the system. However, authentication does not always guarantee a user full access to network resources or data. This is only achieved through the process of authorization. · Confidentiality: When the personnel is involved in leaking information or if the system has poor measures in their security protocols then information can be disclosed to unauthorized people. Allowing access to delicate information anonymously is a good example of poor security. · Integrity: It involves preventing of fraudulent access and altering of a company’s sensitive information. Authorized users can also cause errors or omissions hence alteration of important business data (Heidari, 2011). System security is classified into three main protective measures. The system administrator needs knowledge of the information’s value so that they are able to develop the right security measures. They include; · Prevention: This can be done in a number of ways ranging
  • 4. from setting up high security protocols to locking servers in strong rooms. All these policies are put in place to prevent data theft, damage or alteration. · Detection: Tools have been developed to aid in detecting unauthorized intrusion, alterations, viruses and damages. A system administrator is required to take steps that ensure information is protected from loss, being illegally altered or being damaged to enable a company function at maximum output. Detection also may include finding out information about extent of damages, how data has been altered or which data has been stolen. · Reaction: This includes setting up corrective measure to effectively recover damaged or lost information. Security Threats We have various security threats and attacks that have been discussed worldwide. These threats can be divided into two categories; natural disasters and human threats. Natural disasters are unforeseen and in most cases very hard to predict. Hurricanes, fire, lightning or floods are some of the natural disasters that can occur and cause damage to physical components of a system. Other security threats that are human caused but categorized as natural disasters include terrorist attacks, riots or in the event of a war. Human caused threats are many and consist of internal attacks by unsatisfied or malicious employees or external threats by hackers who look to disrupt and harm the smooth running of an organization. Employees and former employees however pose the greatest security threat because they have knowledge of security passwords and protocols of a company. Insiders can
  • 5. delete vital information either maliciously or accidentally and they can also damage information by planting viruses and other malware. Crackers or hacker also pose considerable threats to vulnerable systems. The goal of a hacker could be to steal information, damage the information to disrupt the effective running of an organization or to simply alter important data. Main areas of the operating system that are evaluated for performing risk assessment at Jinx are: · The biggest threat to data · Unprotected network access · weak or compromised passwords · Physical Security · Malware Threat to the data: The biggest threat to the Operating system is the threat to the data stored in databases. The data of the company is highly confidential and the organization needs to secure that data and the organization has to make it confidential. To make the data more secure the Jinx may have to add some high-level data security permissions to the database (Watson M, 2012). Also controlling the availability of sensitive data to unauthorized employees is a threat to the integrity of a company’s information. Data threats sometimes can be caused by viruses, worms or Trojans planted by disgruntled employees or malicious hacker Unprotected network access: The network of the enterprise should be protected from external access. External users may cause damage to confidential data or steal data for purposes of selling it to competitors. Most companies rely on the menu security because it is easy to build. Menu security ensures that different categories of employees have access to the data authorized for manipulation in their area of operation. Access is limited while other menu items remain deactivated and unavailable to the entire security group. Creating user accounts in separate security groups and creating passwords reduces the risk of compromising data integrity. Weak or compromised cryptographic algorithms: Another
  • 6. security threat to the enterprise is weak and easily compromised passwords. The password of a user can be sniffed in the network traffic so there are more chances of security breach using stolen passwords. Passwords should be encrypted using strong cryptographic algorithms. Malicious attackers may sometimes manage to develop plaintext access codes from encrypted passwords. Physical security: Physical security is one of the most important methods of guaranteeing operating system security. Since operating system code and configuration files are installed on a system's internal hard drive, an attacker with physical right of entry to the system can easily modify, delete or steal critical files on a system. For this motive, most commercial servers are stored in protected rooms and watched by armed security guards Malware: Malware, short for malicious software, hijacks an operating system to perform some sort of destructive task for an attacker. Viruses, Trojans, Worms and spyware are the most common form of malware, and each work to destabilize operating system security controls (Shawgo, Faber & Whitney, 2005). Prioritization risks in the operating system: (== missing this part =======?????? Risk mitigations for the risks in the operating systems: Database security: 1) The first thing we have to implement in the company’s system is separate the web server and database server of the enterprise. 2) Encryption of stored files so that if anyone has unauthorized access they cannot steal and decrypt it. 3) Encrypt your backup files. 4) Use web application firewalls. It protects the database of the enterprise from unwanted users otherwise known as crackers. Unprotected network access: 1) Apply proper security protocols to the company’s network. Setting up of proper and complex passwords to the network is one way of ensuring less to no unauthorized network breach.
  • 7. 2) Use firewalls in the network to restrict unwanted users from gaining access to the enterprise network (Bassil, 2012). 3) Reduce the use of Telnet protocols that allow user to log into a system connected to the network remotely and operate it as if they were sitted there. 4) Avoid using commands that reveal a user’s confidential information as well as sensitive system information. These commands can cause system vulnerability and allow hackers to infiltrate the system. They include Rexec and Finger. Weak or compromised passwords: 1) Use Single Sign-On to reduce the number of stored passwords in your organisation’s database. 2) Don’t send passwords via email, or over un-secured networks. 3) Require that passwords be changed at regular intervals. 4) Don’t use default passwords (Watson M, 2012). Physical security: 1) Keeping all important company resources like servers behind a locked door and protected from natural and human-made disasters. Malware: 1) Run Windows Firewall to protect individual computers while on the Internet. 2) Run a secondary system protection firewall program whenever you use the Internet. (Wepman, 2007) References Bassil, Y. (2012). Windows and linux operating systems from a security perspective. Journal of Global Research in Computer Science, 3(2), Retrieved from http://www.jgrcs.info/index.php/jgrcs/article/download/305/259 Heidari, M. (2011, July 11). Operating systems security considerations. Retrieved from http://www.packetsource.com/article/operating-
  • 8. system/40069/operating-systems-security-considerations Shawgo, J., Faber, S., & Whitney, N. (2005). Operating system legacy, enterprise, and specialized security benchmark consensus baseline security settings. The Center for Internet Security, 2(1), Watson M, R. N. (2012). New approaches to operating system security extensibility. (Doctoral dissertation), Available from Technical Report. (UCAM-CL-TR-818)Retrieved from http://www.cl.cam.ac.uk/techreports/ Week Three – Online Excel Data Reporting: Assignment 3 Data Analysis (Feasibility Study Data Reporting) The objectives of this assignment are to help you: 1. Analyze and interpret financial data 2. Chart data in Excel using the MCCD Model
  • 9. 3. Create a persuasive argument to influence the audience Assignment Requirements: 4. Your assignment must include the following: o Excel Data Analysis: o Presentation: Part 1 – Identify and submit publicly traded company choice, proposal idea and financial statements. Due by Wednesday of Week 3 on the Assignment 3 Part 1 discussion board Use LexisNexis in the library research tools to choose a public company of your choice that you will develop a new strategy for. Submit your choice of a public company, proposal idea as well as the reference for the raw financial data from the LexisNexis database to the Assignment 3 Part 1 discussion board.
  • 10. Your proposal idea should be a new strategy for the company to improve overall financial performance. This may include proposing a new product, halting production of an existing product, improving distribution, targeting new markets, etc. While this information will be posted on a discussion board, only one post is required. If you would like to provide feedback to a fellow classmate, you are more than welcome to, but it is not a requirement. If you have any difficulties choosing a company, developing a strategy or finding financial statements, be sure to attend our live GoToTraining session or contact your instructor. Part 2 – Excel Data Analysis Excel Data Analysis Requirements: 5. Your analysis must include all of the following: o Historic performance (calculate percent change) o Calculated projections o Four or more charts Examples of company figures to calculate percent change and projections may
  • 11. include (but are not limited to): 6. Revenue 7. COGS (Might be Cost of Sales if no product) 8. Gross Profit 9. Operating Expenses 10. Net Profit Remember: Use the data to tell your story: Whichever information will support and defend your proposal is what should be presented. At least one chart should display your projections but feel free to encompass other impacts of your proposal such as: 11. Demographic Data (current or potential customers, new markets, etc.) 12. Competitive Analysis (market share, competitor’s financial performance, etc.) 13. Market Trends (product usage or popularity, prices, etc.) Using this calculated data, create Excel charts to display the need for your proposed strategy. Design the charts according to the lessons learned from Say It With Charts. Part 3 – Delivery Due by Sunday of Week Four In addition to the Excel document being submitted, select one of
  • 12. the following two options to deliver your pitch: 14. Write a paper. Must be two-to-three pages and follow APA format. Be sure to write in a professional business style and be persuasive. Sell your idea to the company on why they should change or add this product/service. Use the Excel data/charts to support the paper. Cite sources for all of your research. a. Deliverables: i. Word file ii. Excel file 15. Create a podcast. Create a narrated presentation selling your idea to the company. An Excel file with all of your calculations and original charts will Week Three – Online accompany and support the audio presentation. Cite sources for
  • 13. all of your research. Make sure the script you read from follows the Academic Integrity standards. a. Deliverables: i. Excel file ii. Podcast File If you have any questions or concerns, be sure to attend our live Week Four GoToTraining session or contact your instructor. Plan for the worksheets to be printed and review the bundled worksheet design guidelines as well as the Assignment Three checklist. Academic Integrity Please review the Academic Integrity section of the course Syllabus and ensure that your assignment does not plagiarize or violate any academic integrity principles of Full Sail University before submitting it. Violation of this policy can have severe consequences. Students are required to use their own language when writing papers or submitting other media assignments. The purpose of assignments is for each student to demonstrate his or her own analysis, ideas, and synthesized information – not to just copy and paste what has been published on a particular topic. While research is encouraged for some assignments,
  • 14. research entails reading and synthesizing information with one’s own ideas, and citing sources used during research, to give credit to those whose ideas or language are utilized. Quoted materials should be clearly identified and woven into a longer paper that consists primarily of the student’s ideas. Quotations must be punctuated as quotations per APA format, must be cited, and must not represent the majority of the assignment. Plagiarism is using another author’s ideas, words, or language without putting those words in quotation marks and citing the reference, giving proper credit to the author. Plagiarism also includes changing the words from a third party source while maintaining the same sentence structure and not providing proper citation and reference. It is not permissible to copy a passage and then just change a few words. These actions are considered plagiarism, regardless of whether or not the intention was to plagiarize. To avoid plagiarism, students should adhere to the following guidelines: a. If you are using words that were written or spoken by someone else, you must put quotation marks around the words and insert the citation in parentheses at the end of the quote. Any quote over 40 words must be in
  • 15. indented block paragraph style, per APA guidelines. b. Even brief phrases of four words or more must be included in quotation marks if those words are not your own and were taken from another source. c. If the information or ideas you are using come from another source—even if it is paraphrased and contains your own words—you must cite the source at the end of the passage (in parentheses) and in the “References” section at the end of the paper. Please refer to the APA style guide for examples on how to cite various types of references (www.apastyle.org). d. No more than 10% of your paper should be directly quoted material, unless the course director indicates otherwise within the assignment instructions.