Why is this industry causing disruption?

topic : search (i.e google)

DIRRECTIONS: Answer these seven questions as best as you can using peer-reviewed literature, well respected news sources (New York Times, Washington Post), textbooks, government cited articles etc. You cannot use blog postings, wiki postings, or Websites unless they are from an authoritative source 

Helpful hint:

This assignment is a stepping stone to begin your research towards your final paper. I HIGHLY suggest you look at the requirements for TEAM ASSIGNMENT #3 each time you complete an assignment to try and capture as much as you can in your work. This will help enrich your response a great deal. You should also save many of the references you use for this assignment for Team Assignment #2 as this will likely save you time for the annotated biblography!

QUESTIONS

1. Who are the key industry players that raise a red flag in your industry segment? Why?

2. Why is this industry causing disruption? Cite 3-5 explicit examples. 

3. When you conduct an internet search on your topic pertaining to regulatory and compliance issues, what are some of the key regulatory and compliance issues in your business area of concern?

4. Has the federal, state, or local government had to develop specific law or develop measures of compliance to protect citizens and businesses from harm?

5. Evaluate 5-10 Internet Website Privacy Statements for the industry you have been given. Do you see a trend on the type of data that the vendor is concerned about? If so, please state what is the most evident in the statements?

6. How does/has your industry handled its last major data breach? Which legal mechanism is most relevant to your industry of concern?

7. What does literature and your research suggest about how the industry will need to deal with the regulatory concerns over time?

Assignment 2: 

The APA explains that an annotated bibliography is essentially a summation of citations to books, articles, Websites, and scholarly documents. Each citation is followed by a short (usually about 150 words) paragraph, “the annotation”. 

The purpose of completing an annotated bibliography is to gather a comprehensive list of like-kind resources that help an individual or group towards their collective research body. This is inching the group towards their final project. 

For this assignment, you will need to collect twelve (12)crediblesources. This includes peer review journal articles, books, news articles (not blogs entries), books, or government documents that contribute to the completion of your research paper (Team Assignment #3). In order to gain full credit for this assignment, you must do the following:

  • Cite each entry correctly in APA format. To receive full credit, the citation must be flawless. 
  • Provide a substantive well-written description of the entry that is 150-200 words each. The annotated entry must be flawless of grammar errors and contextually relevant to the paper topic to receive full credit. 

Assignment 3:

In a double spaced, 10-point Times New Roman Font with 1-inch Margins. You are to write an APA formatted paper answering the following questions. Each question should be concerned a separate section of the paper. Consider each section a header for all purposes. 

  1. Provide an overview about your industry and why it is relevant to ensuring data regulation and compliance is in place? (1 page)
  2. Who are the industry disruptors and how are they disrupting the industry (1/2 page)?
  3. What are the specific data standards and types of data that this industry is concerned about? (1/2 – 1 page)
  4. When reviewing policy statements on the industry segment Websites and/or mobile applications you were assigned, what are common themes you found? (1-2 pages)
  5. Identify and discuss any internal and external organizational threats in the industry assigned? (1/2-1 page)
  6. Address any recent significant events in the news that may impact the regulatory, legal, or compliance landscape in the immediate or near future for the industry or like-kind industries (i.e. social media may impact entertainment etc.)? (1/2 page – 1 page)
  7. Discuss ways in which the government and/or companies are putting controls in place to protect people and/or their organizations (1 page)
  8. Provide your teams recommendation on how to better handle information and data regulation compliance in the industry you just reviewed? (1/2 – 1 page)

PRESENTATION DETAILS : 

You are to present the findings of your Team #3 assignment in a 10-15-minute presentation. The PowerPoint presentation should contain the following in a 10-15 Minute Presentation (your time slot is below).

  • The deck including a cover page should contain NO MORE THAN eleven (11) slides.
  • Each member of the team can ONLYpresent two (2) slideseach.
  • The deck must address the following:
  1. The industry assigned
  2. Who are the industry disruptors in the space?
  3. The specific type(s) of data the industry is concerned about
  4. The types of data that are addressed in policy and regulatory statements
  5. The internal and external threats that face the organization on a daily basis
  6. Recent industry threats/concerns
  7. Ways in which the government has puts controls in place
  8. Ways in which companies have put controls in place
  9. Your suggestions and thoughts on how to address the problem

please update and rewrite your professional objective and upload it here.

Task: 

Using all the information we have discussed in class so far, please update and rewrite your professional objective and upload it here.  You may now have a few more details you wish to include.  Also, please select a position you are interested in from any source and upload a copy of the position posting( Search about Quality Assurance Position ).

Check the file attached to see the information that you need to update. 

Professional Objective

I am senior student at University of Dayton, my major is Industrial engineering. I am graduating in this summer 2019, so it is important to think about what you are going to be after graduation. My present work desire is in quality insurance felid especially when someone has an experience to advise you to be in that felid. My brother is working now in manufacturing company, he is a member of quality team. I like when he talks about the duties that he and the team are assigned for complete each day, that is the work desire come from.

I have a command on modern designing software’s such as solid works as well MS project. I can also perform cost analysis and speak different language. I think that my unique skills and talent will have the critical role regrading my future goals and accomplishments. I will use my skills to design projects and provide solution to complex problems. I will also act a negotiator between work cultures where language become the main barrier for work performance. I am a fast leader. The number of design projects justify that my determination for growth and improvement.

My plan to accomplish my goals is to improve the abilities or skills that I am already known to get the desirable job. An ideal work place for my qualities as well as skills would be a multinational organization where innovation and creativity are empowered for development. I think that this workplace would perfectly suit my qualifications as well expertise. Not only I will be able to design new projects, but it will allow me to exhibit all the skills which I have learned from my university as well education period. An ideal workplace would be an organization where a new challenge is subjected to people regarding growth and improvement.

Evaluate 5-10 Internet Website Privacy Statements for the industry you have been given.

TOPIC :   Healthcare Pharma (i.e. Pfizer, Merck, J&J) 

ASSIGNMENT 1:

ISOL-633
Research Paper Questionnaire
Jack A. Hyman, Ph.D.; Summer 2019

Group #_______________

Topic Area_______________________________

DIRRECTIONS: Answer these seven questions as best as you can using peer-reviewed literature, well respected news sources (New York Times, Washington Post), textbooks, government cited articles etc. You cannot use blog postings, wiki postings, or Websites unless they are from an authoritative source 

Helpful hint:

This assignment is a stepping stone to begin your research towards your final paper. I HIGHLY suggest you look at the requirements for TEAM ASSIGNMENT #3 each time you complete an assignment to try and capture as much as you can in your work. This will help enrich your response a great deal. You should also save many of the references you use for this assignment for Team Assignment #2 as this will likely save you time for the annotated biblography!

QUESTIONS

1. Who are the key industry players that raise a red flag in your industry segment? Why?

2. Why is this industry causing disruption? Cite 3-5 explicit examples. 

3. When you conduct an internet search on your topic pertaining to regulatory and compliance issues, what are some of the key regulatory and compliance issues in your business area of concern?

4. Has the federal, state, or local government had to develop specific law or develop measures of compliance to protect citizens and businesses from harm?

5. Evaluate 5-10 Internet Website Privacy Statements for the industry you have been given. Do you see a trend on the type of data that the vendor is concerned about? If so, please state what is the most evident in the statements?

6. How does/has your industry handled its last major data breach? Which legal mechanism is most relevant to your industry of concern?

7. What does literature and your research suggest about how the industry will need to deal with the regulatory concerns over time?

ASSIGNMENT 2: 

The APA explains that an annotated bibliography is essentially a summation of citations to books, articles, Websites, and scholarly documents. Each citation is followed by a short (usually about 150 words) paragraph, “the annotation”. 

The purpose of completing an annotated bibliography is to gather a comprehensive list of like-kind resources that help an individual or group towards their collective research body. This is inching the group towards their final project. 

For this assignment, you will need to collect twelve (12)crediblesources. This includes peer review journal articles, books, news articles (not blogs entries), books, or government documents that contribute to the completion of your research paper (Team Assignment #3). In order to gain full credit for this assignment, you must do the following:

  • Cite each entry correctly in APA format. To receive full credit, the citation must be flawless. 
  • Provide a substantive well-written description of the entry that is 150-200 words each. The annotated entry must be flawless of grammar errors and contextually relevant to the paper topic to receive full credit. 

See example citation in APA format on OWL Purdue Website

ASSIGNMENT 3:

In a double spaced, 10-point Times New Roman Font with 1-inch Margins. You are to write an APA formatted paper answering the following questions. Each question should be concerned a separate section of the paper. Consider each section a header for all purposes. 

  1. Provide an overview about your industry and why it is relevant to ensuring data regulation and compliance is in place? (1 page)
  2. Who are the industry disruptors and how are they disrupting the industry (1/2 page)?
  3. What are the specific data standards and types of data that this industry is concerned about? (1/2 – 1 page)
  4. When reviewing policy statements on the industry segment Websites and/or mobile applications you were assigned, what are common themes you found? (1-2 pages)
  5. Identify and discuss any internal and external organizational threats in the industry assigned? (1/2-1 page)
  6. Address any recent significant events in the news that may impact the regulatory, legal, or compliance landscape in the immediate or near future for the industry or like-kind industries (i.e. social media may impact entertainment etc.)? (1/2 page – 1 page)
  7. Discuss ways in which the government and/or companies are putting controls in place to protect people and/or their organizations (1 page)
  8. Provide your teams recommendation on how to better handle information and data regulation compliance in the industry you just reviewed? (1/2 – 1 page)

PRESENTATION DETAILS :

You are to present the findings of your Team #3 assignment in a 10-15-minute presentation. The PowerPoint presentation should contain the following in a 10-15 Minute Presentation (your time slot is below).

  • The deck including a cover page should contain NO MORE THAN eleven (11) slides.
  • Each member of the team can ONLYpresent two (2) slideseach.
  • The deck must address the following:
  1. The industry assigned
  2. Who are the industry disruptors in the space?
  3. The specific type(s) of data the industry is concerned about
  4. The types of data that are addressed in policy and regulatory statements
  5. The internal and external threats that face the organization on a daily basis
  6. Recent industry threats/concerns
  7. Ways in which the government has puts controls in place
  8. Ways in which companies have put controls in place
  9. Your suggestions and thoughts on how to address the problem

PLEASE ALL THE ASSIGNMENTS ARE INTERRELATED AND I WILL NEED WORD FILE AND PPT AS WELL WITH PROPER APA, CITATION AND REFERENCES AS ASKED.

Prepare an annotated bibliography of your research to date for your Critical Infrastructure Sector/Company Project.

I have chosen information technology sector and the company is Microsoft 

SAP #2 – Annotated Bibliography – Due: Monday 6/3/2019 (10 pts):

Prepare an annotated bibliography of your research to date for your Critical Infrastructure Sector/Company Project. You should have a minimum of 5 references at this stage of your research. Please post as a word attachment under BLACKBOARD / ASSIGNMENTS / CRITICAL INFRASTRUCTURE SECTOR PROJECT / Annotated Bibliography. You will use this document in your final report as well. KPP

An annotated bibliography is a list of citations to books, articles, and documents. Each citation is followed by a brief (usually about 150 words) descriptive and evaluative paragraph, the annotation . The purpose of the annotation is to inform the reader of the relevance, accuracy, and quality of the sources cited. (Michael English, Cornell University Library, 3/17/17)

THE PROCESS

Creating an annotated bibliography calls for the application of a variety of intellectual skills: concise exposition, succinct analysis, and informed library research.

First, locate and record citations to books, periodicals, and documents that may contain useful information and ideas on your topic. Briefly examine and review the actual items. Then choose those works that provide a variety of perspectives on your topic.

Cite the book, article, or document using the appropriate style.

Write a concise annotation that summarizes the central theme and scope of the book or article. Include one or more sentences that (a) evaluate the authority or background of the author, (b) comment on the intended audience, (c) compare or contrast this work with another you have cited, or (d) explain how this work illuminates your bibliography topic.

CRITICALLY APPRAISING THE BOOK, ARTICLE, OR DOCUMENT

For guidance in critically appraising and analyzing the sources for your bibliography, see How to Critically Analyze Information Sources. For information on the author’s background and views, ask at the reference desk for help finding appropriate biographical reference materials and book review sources.

CHOOSING THE CORRECT FORMAT FOR THE CITATIONS

Check with your instructor to find out which style is preferred for your class. Online citation guides for both the Modern Language Association (MLA) and the American Psychological Association (APA) styles are linked from the Library’s Citation Management page. We will use the APA format for this class.

SAMPLE ANNOTATED BIBLIOGRAPHY ENTRY FOR A JOURNAL ARTICLE

The following example uses APA style (Publication Manual of the American Psychological Association, 6th edition, 2010) for the journal citation:

Waite, L. J., Goldschneider, F. K., & Witsberger, C. (1986). Nonfamily living and the erosion of traditional family orientations among young adults. American Sociological Review, 51, 541-554. The authors, researchers at the Rand Corporation and Brown University, use data from the National Longitudinal Surveys of Young Women and Young Men to test their hypothesis that nonfamily living by young adults alters their attitudes, values, plans, and expectations, moving them away from their belief in traditional sex roles. They find their hypothesis strongly supported in young females, while the effects were fewer in studies of young males. Increasing the time away from parents before marrying increased individualism, self-sufficiency, and changes in attitudes about families. In contrast, an earlier study by Williams cited below shows no significant gender differences in sex role attitudes as a result of nonfamily living.

SAP #3 – Post Final Report: Analysis and Recommendations – Due: Monday, 6/17/19:

Submit your Project “Final Report: Analysis and Recommendations” under BLACKBOARD / ASSIGNMENTS / CRITICAL INFRASTRUCTURE SECTOR PROJECT / Final Report. Be sure to include the critical infrastructure sector and company name on the Title Page of your Report and in the Cover Letter, and the Executive Summary. Submit all three items combined in one Word document.

Your submission should include the following elements:

1. Cover Letter introducing your report to the CEO (1 page) {for your “make believe interview for the position of CISO.

2. Executive Summary of your report (1 page)

3. <Insert “Critical Infrastructure Sector” & “Company” Name here> Final Report: Analysis and Recommendations (4 pages)

1. Analysis of both the “Critical Infrastructure Sector” and the Company key information security concepts (support with actual data and statistics)

1. Assess how confidentiality, integrity, and availability relate to this sector and company, specifically, (is one more important than the others — or — are they all equal?  Why?)

1. Outline key threats (with supporting data).

1. Your strategy for how you would address the above issues (what risk management choices and associated security controls).

1. Identify example incidents/breaches in your specific critical infrastructure sector and outline lessons learned that you would apply to your company.

· References and Annotated Bibliography – Site your references and any resources using APA format. Attach the Annotated Bibliography you already prepared (IP#2) as an addendum.

See attached Project Grading Rubric for specific details.

Grading Rubric

(5 pts)(4 pts)(3 pts)(2 pts)(1 pt)Total
Critical Infrastructure Sector Analysisclearly stated and appropriately focusedclearly stated but focus could have been sharperanalysis phrasing too simple, lacks complexity; or, not clearly wordedanalysis lacks a clear objective and/or does not “fit” content of essayanalysis not evident__/5
Company Analysisclearly stated and appropriately focusedclearly stated but focus could have been sharperanalysis phrasing too simple, lacks complexity; or, not clearly wordedanalysis lacks a clear objective and/or does not “fit” content of essayanalysis not evident__/5
Focus & Contentsharp, distinct focus; balanced, substantial, specific, and/or illustrative content; sophisticated, mature ideas are particularly well-developedfocus is slightly unclear and/or focus is slightly unbalancedfocus is somewhat unclear and content is somewhat unbalancedfocus is unclear, content is unbalancedfocus and/or content is missing portions or is inappropriate__/5
Organizationobviously controlled and/or subtle organization; strong topic sentenceslogical and appropriate organization; clear topic sentencesorganization attempted, but unclear or inappropriateinconsistent organizationabsence of planned organization__/5
(2.5 pts)(2 pts)(1.5 pts)(1 pt)(.5 pt)
Grammar & Spellingfree of grammar and spelling errorsfew grammar and spelling errorssome grammar and spelling errors, but not severe enough to interfere significantly with writer’s purposesome grammar and spelling errors, but not severe enough to interfere significantly with writer’s purposegrammar and spelling errors that significantly interfere with the writer’s purpose__/2.5
Proper Citationsall references and sources are accurately documented in the proper formatall references and sources are accurately documented in the proper formatmost references and sources are documented, but many are not in the desired formatseveral references and sources lack proper documentationReferences sources are not accurately documented, and format is not attempted or followed properly__/2.5
__/25

Occupational Safety and Health Administration (OSHA) Compliance Audit

Occupational Safety and Health Administration (OSHA) Compliance Audit

Using the Plan-Do-Check-Act (PDCA) model we discussed in Units I, II, and III, here you will address the “check” (C) and “act” (A) portion in this assignment. 

Continuing with the scenario presented in the Unit VII Assignment (refer to Unit VII Assignment in the syllabus), you are now assuming the role of an OSHA compliance safety and health officer who has been assigned to perform an audit of the facility where the accident occurred. You have been asked to evaluate the company’s safety management system (SMS) to determine if there were any deficiencies in the system that could have caused the accident. You are required to prepare a summary of your audit process to evaluate the post-accident findings compliant with OSHA standards and also include the following information: 

  • identification of who would be involved in the opening and closing conferences, 
  • specific OSHA standards you would review to determine compliance (you must identify at least three standards and they must relate to the accident), 
  • specific items you would be looking for during your visit to determine compliance, 
  • development of a point of scoring system that you would use to evaluate the SMS, and 
  • recommended feedback you would provide to the company to help them improve their SMS (based on what you have learned in this course). 

You are not required to use previously prepared work as the basis for your audit since your responses must be specific to the actual accident scenario in Unit VII (incident investigation exercise). 

Your audit report should be at least two pages, not including the title and reference pages. You should include at least one outside source (e.g., OSHA standards) besides your textbook and any other pertinent resources as guidance. All supporting references and in-text citations must follow APA formatting guidelines.

INFORMATION GOVERNANCE SUMMER IG – BI-TERM 2018 SEMESTER PROJECT – PHASE II

UNIVERSITY OF THE CUMBERLANDS ITS 833 – INFORMATION GOVERNANCE SUMMER IG – BI-TERM 2018 SEMESTER PROJECT – PHASE II

Please review the description of the organization that is the subject of your semester project. The description of that organization, Security Transport Professionals, Incorporated, (STP) is described in the instructions for Phase I that you have already completed.

1. This phase will involve performing a records inventory. The organization is far too large to undertake a records inventory for the entire company. You will need to make a determination of which program or division or functional area whether that be (a) the narcotic/drugs that you ship/store, (b) the top secret materials that you ship/store, or (c) the toxic or dangerous materials that you ship/store to include in its records inventory. Once you have made that determination, decide which of the managers/personnel previously identified that you will need to contact/interview and work with in order to complete the records inventory for the functional area that your group has selected. It will most likely include more than one of the personnel/departments listed above. As project manager you have decided to collect information using a two-step approach where you first send out survey questions and then once you have received the responses you will follow up by conducting interviews.

(a) State whether you intend to focus on the narcotic/drug area, top secret materials for the government, or toxic or dangerous materials/chemicals.

(b) Identify which of the above department(s)/areas/units that you will need to survey and subsequently interview, depending on which one of the three functional areas you have decided to focus your attention on.

(c) For the functional area that you have selected you want to be able to speak intelligently to the knowledge personnel within that department and ask appropriate and relevant questions. Therefore, you need to do some preparation and brainstorming before making contact with the departments/units that you have identified as essential. To that end, identify (using diagram, table, hierarchy chart, taxonomy, or other form that is most descriptive) the “record types” that you expect are created and maintained in each of the departments/areas/units that you have decided to focus on. Use descriptive names for each record type and tell the type of information that would be retained in each record type. This can be as specific as creating a taxonomy for the record if you should decide to do so (see Appendix A in your text book), or you may conduct research and determine what other structure would be appropriate in order to convey this information. The most effective way to convey this information to me would be in the form of a table that identifies the Record Type, Responsible Department, and the Event that triggers the creation of each record type. [For example, if we were dealing with a health care provider (WHICH WE ARE NOT, I am only using this unrelated example to give you an idea of what I want you to do), an

example of a record type that your doctor’s office might keep would be an Insurance Record that would include things like information about the Insurer, information about the patient, information about the insured if different from the patient, information about the plan options and conditions of coverage, information about the insured history of using this insurance in the past and the prior payment record.] [Another example: You will find a record type used on page 172 of your text book to describe a workers’ compensation insurance company’s accident/injury report as part of its record retention schedule.]

(d) Develop a Records Inventory Survey Form that you are going to use in surveying the departmental unit(s) you have identified above. The purpose for your survey is to be able to identify the kinds of records (contracts, financial reports, memorandum, invoices, etc.), which department owns the records, which departments access the records, what application creates the record, where the record is stored physically and logically, date created, last changed, whether it is a vital record, and whether there are other forms of the record. You want to be able to use this information to make decisions related to retention and disposal of the records. Explain who will receive the survey and why. The survey will be sent about one month prior to the follow up interviews. This will allow for two (2) weeks to complete and return the survey and two weeks to tabulate and review it, and to tweak your interview questions, depending on the results of the survey. Explain the rationale for the questions that you included in your survey.

(e) Develop an initial set of interview questions that you plan to use as a follow up to the initial survey that you drafted in (d) above.

(f) Based upon the records you have identified above, develop a record retention schedule and for the record types. Include in this the method of destruction when the record is marked for destruction. Explain whether you are going to use event-based retention for any of your record types and if so why, and identify the triggering event. For this question, you need to discuss the legal requirements and compliance considerations.

THE RESEARCH PAPER: While your research paper will undoubtedly include a number of tables, diagrams, lists and other illustrations, the paper is to be written in narrative form. The illustrations may be included in appendix at the end of the paper, or may imbedded in the body. But please don’t forget that the paper itself is written in narrative form. Include citations to your research.

The paper should be written in narrative form using the APA format. Please use ample subsections or subheading as appropriate. Your paper should have a 1-in margin on top, bottom, left and right margins. The paper should be double spaced. Use a cover page with a title, and the name of each team member who contributed to your project/paper. Each page should have a page number in the bottom right margin. The paper should also include a table of contents, which includes subject headings, subheadings or subtopics, references or sources, and illustrations as well as page numbers for each.

For each major area or section of your paper explain identify the options you have considered, where applicable. Discuss the alternatives you considered, giving pros and cons of

each, and provide information from the research you conducted that assisted you in arriving at your conclusion as to why one alternative was selected over another. You MUST cite the sources for your research any time you make reference to your research, whether that be through direct quotations or in summary. Your work should include no fewer than five (5) sources. While there is no minimum or maximum length for your paper, I anticipate that you cannot complete the assign in under ten (10) pages, excluding illustrations.

The research paper should be submitted using the link contained in the CONTENT section of iLearn. It will not be accepted via email to me.

PHASE II OF YOUR SEMESTER PROJECT IS DUE NO LATER THAN JUNE 17, 2018 AT 11:30 P.M. IT WILL NOT BE ACCEPTED LATE.

List and discuss two standard checks that you will perform on the coefficients derived from a linear regression model.

After reading Chapter 6, “Advanced Analytics Theory and Methods; Regression” of the text.

 A) 

 Respond to the following questions: 

  1. List and discuss two standard checks that you will perform on the coefficients derived from a linear regression model.
  2. Compare and contrast linear and logistic regression methods. Provide examples of real-life applications of each of these methods

Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Application Security have been applied


Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Application Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Choose : not working currently option 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Choose from the all  listed topics and make the assignment and you can choose some more topics related to the subject :- Application Security

Topics are as listed below:

· How information security applies to Windows OS. 

· Security features of Windows OS.

· build Implement secure access controls in Windows.

· setup encryption to secure a Windows environment.

· Install controls to protect Windows from malware.

· build Group Policy controls in Active Directory in Windows.

· use the profile and audit tools that keep Windows systems secure.

· review backup and restore operations on a given Windows system.

· design techniques to protect Windows networks from security vulnerabilities.

· develop a security administration framework to ensure security policy goals.

· decide which security controls are the most effective for computers & networks.

· design techniques to protect Windows apps from security vulnerabilities.

Learning and Reflecting about IT Cyber Security

Final Reflective Exam (6/17-20/19)

Learning and Reflecting about IT Cyber Security (25 pts)

“Critical Reflection” is the process of analyzing, reconsidering, and questioning one’s experience within a broad context of issues and content knowledge.” [Barbara Jacoby, 2012]

Background Summary

During the past five weeks, we studied an overview of information security for IT managers. The goal of the course was to prepare you, as an IT professional, to become aware of the cyber security challenges in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate weaknesses in current information technologies. This should also help you become aware of the role of an information security management practitioner who secures the systems and networks. The important lesson, however, is that EVERY IT PROFESSIONAL has a responsibility to be aware, to secure, and to protect the employees and data / information of a company of all potential security threats.

Purpose of the Assignment

Rather than take a traditional true false / multiple-choice test covering topics about specific security threats, this exam is designed to have you review and use critical thinking to answer three short essay questions.

Learning to write a “reflective” short essay is important because it helps you increase the value of your learning experience, it encourages you to take meaning from your own research and apply it to what you are learning, and it helps you relate new learnings and experiences to your prior knowledge.

Assignment Hint

Think about each question first. Then, list some bullet points off the top of your head. Research the question to find specific information to support your thoughts and your answers. Spend some time outlining your answer to be sure you have included everything you want to say. Include why you think and feel that way as well (justification). Then use the outline to write your thoughts in complete sentences and paragraphs. Do not submit your rough notes or outline, only submit your final written short essay for each question. Each short essay answer should be a minimum of 150 – 200 words. Remember, this assignment is worth 25 points (8-9 points per question.)

(Note: The previous four paragraphs are 318 words.)

There are no right answers. Good answers are your thoughts, your research, and how well you express what you have to say.

Final Exam Short Essays:

1. (8 pts) Two of the “Student Learning Outcomes” in the course Syllabus included:

6. Understand the trends, impacts, and effective security controls for the following types of threats:

· Web Application Attacks (#3)

· Point-of-Sale Intrusions (#4)

· Insider & Privilege Misuse (#5)

· Miscellaneous Errors (#6)

· Physical Theft & Loss (#7)

· Crimeware (#8)

· Payment Card Skimmers (#9)

· Cyber-Espionage (#10)

· Denial of Service Attacks (#11)

7. Compare the types of security attacks which affect the 17 Critical Infrastructure Sectors.

As a student, did the ITEC 493, IT Security for Managers, course accomplish these two Student Learning Outcomes (STOs)? Describe your feelings. Choose one security threat and one critical infrastructure sector that you studied over the semester as an example (counts as one question for grading purposes).

a. What did you learn about this threat and sector that was new to you?

b. How might you use this information in your future IT professional career?

2. (8 pts) During this summer, we studied the Verizon Data Breach Investigation (DBIR) reports (2019, 2018, 2017). We used the DBIRs throughout the course to find examples of actual security intrusions and threats plus the necessary security controls, which should be implemented to avoid or, at least, mitigate the security threats and attacks. Under BLACKBOARD / Module 3, I just posted another source of security best practice tools: DISA’s (Defense Information Systems Agency’s) STIGS’ (security technical implementation guides’) role in cybersecurity. Please review this information and prepare answers to the following two questions from the Quick Start Introduction & Demonstration Video (34:21 mins), https://public.cyber.mil/stigs/srg-stig-tools/ , (counts as one question for grading purposes). The answers to these questions are in the first two minutes of the video.

a. What is the difference between a STIG “Guide” and a STIG “tool?”

b. List three different members of the “User Community” and explain how you, as an IT Professional” might use the DISA STIGs even if you are not working in the Defense Sector?

3. (9 pts) During this semester, we used Small Group Virtual Discussions (SGVDs) to learn about nine different security threats. Small groups allowed you to discuss the threat examples and controls with only 7-8 other students instead of the entire class of 22 students. Separate SGVDs allowed you to concentrate each discussion on one security threat. Rather than discuss what you learned in these discussions, please take the time to reflect on the assignments and write the pros and cons of this type of learning method. What did you like or dislike? Any recommendations for future classes?

You have from Monday, 6/17/19, 6:00 pm, through Thursday, 6/20/19, 11:00 pm, to complete this exam. Please POST your written answers to these three questions as one MS Word document posted as an attachment to BLACKBOARD / ASSIGNMENTS / EXAMS / FINAL. Be sure to include your name, course, date, and assignment title on your submission. Each question is worth from 0-8 or 9 points. See Grading Rubric on the next page. I look forward to reading your answers.

Final Exam Grading Rubric (for each question)

Questions #123
Below ExpectationsPoor answer, little thought and reflection, no connections between class readings and your own research and learning, some grammar / spelling mistakes1 pt  
Approaching ExpectationsGood answer, some thought and reflection, although descriptions of connections between class readings and your own research and learning is minimal, some grammar / spelling mistakes2 pts  
Meets ExpectationsGood answer, good thought and reflections, strong connections between class readings and your own research and learning, no grammar / spelling mistakes3 pts  ·
Exceeds ExpectationsExcellent answer, excellent thinking and reflection, multiple and specific connections between class readings and your own research and learning, clearly articulated, well-written – no grammar / spelling mistakes4-6 pts  
Plus   Word  Count· > 150 words = 3 pts· 100 < answer < 150 words   = 2 pts· < 100 words = 0 pts   0-3 pts  
Total Points  

KPP 6/17/19

And here is my work to give you some idea about the class and information

Annotated Bibliography-Information Technology Critical Infrastructure Case of Microsoft

Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in the industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6). IEEE.

The authors of this article focused on understanding the context through which the information technology industry and the company’s critical infrastructures are studied. The authors who have conducted several studies in this perspective are of the views that most of the security measures for information in technology industry fail because scholars have focused their research through information technology field other than information security management perspective. It is because of this that authors in this article provide a recommendation that companies, and scholars should not focus their studies of critical infrastructure’s security from a technological perspective but in information security management perspective.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review. International Journal of Information Management36(2), 215-225.

The authors of this article provide recommendations as to why organizations that operate in the information technology industry should not focus on their individual organization security. Through literature review, the authors provide evidence that supports the idea that security issues in the information industry are likely to be contained if organizations will take a holistic approach to approach in implementing information security to protect their critical infrastructures. The authors noted in this article that combined efforts by the organization will provide sufficient skills, expertise, and resources that these organizations require to implement a watertight security framework that will be used to secure the safety of their critical infrastructures in the individual companies.

Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security60, 154-176.

The authors in this study are of the views that the internet-enabled security compromises have changed significantly today. The authors observe that threats related to hobby hacking have to more organized cybercrimes that target well-established organizations such as Microsoft. Based on the findings of the authors, most of these hacking and security of critical infrastructures in organizations is done based on economic reasons of which others are done by competitors. It is because of this that it is critical and important for organizations to enhance the security of their critical infrastructures by sharing security incidents information.

Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. (2015). A survey of approaches combining safety and security for industrial control systems. Reliability engineering & system safety139, 156-178.

The findings from the survey that was done by Kriaa and others in 2015 indicates that organizations especially operating in information technology industry need to adopt a security approach that combines both security and safety of their major controlling components. The authors revealed in this survey that most the organizations in different industries that have combined their safety and security approaches towards their critical infrastructures have proven to be very successful and have experienced limited security breaches of their information technology important infrastructures. It is because of this that organizations should combine their safety and security measures aimed at protecting their important companies.

Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection9, 52-80.

The authors of this study focused on studying cybersecurity management of control components in different industries. The survey findings are very interesting as it is very clear that most of the companies in industries that incorporate critical infrastructures in their operations do not put much focus on the protection of their infrastructures. The authors are of the views that important control components in organizations no longer operate in isolation but are enhanced or connected to other components such as corporate network to enhance business operations. The interdependency of the components in companies pose a huge risk to security breaches and it is because of this that organizations have to focus their efforts in securing their components from cyber insecurity.

Radvanovsky, R. S., & McDougall, A. (2018). Critical infrastructure: homeland security and emergency preparedness. CRC Press.

Radvanovsky and McDougall are prominent and renowned authors on issue cyber security today. In this book, the authors took their time to provide in-depth analysis of the preparedness of Homeland agency on dealing with attacks on critical infrastructures both in the public and in industrial perspective. The authors use different cases to convey their message as they argue that much has been done by Homeland agency to prepare itself to deal with attack or emergencies that affect critical infrastructures. The authors concluded their book by recommending that the Department of Homeland security should enhance their emergency preparedness to deal with attacks and emergencies that may affect the operation of major critical infrastructures that may compromise the security of the entire nation.

Mashkina, I. V., Guzairov, M. B., Vasilyev, V. I., Tuliganova, L. R., & Konovalov, A. S. (2016, May). Issues of information security control in the virtualization segment of company information system. In 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) (pp. 161-163). IEEE.

The authors of this article focused their research on the issues that impact the security of the information system negatively in the time when information virtualization is gaining acceptance. The authors are of the views that organizations in the information industry are facing challenges of implementing security measures to protect their critical components because of the high level of virtualization in this section of the company. The findings of this study are very important in understanding some of the problems that organizations such as Microsoft that have most of their system virtualized face in implementing security policies to protect their critical infrastructures.

Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2019). Cybersecurity management model for critical infrastructure.

Limba, Plėta, Agafonov, and Damkus (2019) in this study focused on developing a framework that organizations can use to enhance the security of their cyber-systems and critical infrastructures. The authors in this study are of the views that organizations need to develop security measures that are sufficient in regard to the protection of their critical infrastructures. A model cyber security management framework is explained in this article by the authors and recommendations based on evidence to adopt the model are provided. The findings of the authors to support their model cyber security management framework are similar to those that are provided in the study that was done by Radvanovsky and McDougall (2018) to the Homeland security department.

Paté‐Cornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for critical infrastructure: A risk analysis model and three case studies. Risk Analysis38(2), 226-241.

The authors in this study provide a systematic review of the literature to understand some of the available models that are used to protect critical infrastructures in the information technology industry. The authors’ model that is described in this article resembles the model that was developed by Pate-Cornell et al (2018). The findings of this study are very important in this study since the authors use examples of information technology companies to test the model. It is because of this that the content of this study is very important in completing my final analysis report.

References

Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection9, 52-80.

Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. (2015). A survey of approaches combining safety and security for industrial control systems. Reliability engineering & system safety139, 156-178.

Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2019). Cyber security management model for critical infrastructure.

Mashkina, I. V., Guzairov, M. B., Vasilyev, V. I., Tuliganova, L. R., & Konovalov, A. S. (2016, May). Issues of information security control in the virtualization segment of company information system. In 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) (pp. 161-163). IEEE.

Paté‐Cornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for critical infrastructure: A risk analysis model and three case studies. Risk Analysis38(2), 226-241.

Radvanovsky, R. S., & McDougall, A. (2018). Critical infrastructure: homeland security and emergency preparedness. CRC Press.

Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in the industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6). IEEE.

Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security60, 154-176.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review. International Journal of Information Management36(2), 215-225.

Information Technology Critical Infrastructure Case of Microsoft

Executive Summary

Microsoft Corporation is the leading developer company of computer software systems and applications. The company also engages in the publication of books, the production of computer tablets and also gives e-mail services. In addition to this Microsoft also operates research labs in various parts of the world such as Cambridge, China, India, and Beijing. The Microsoft Corporation has had notable success which has expanded and also ventured into information services and entertainment industries which offer a variety of products and services such as the Microsoft Network. Cyber-attacks threaten the information sector at Microsoft Corporation. Mitigation of these threats is necessary so as to limit the dangers that these threats bring about. Critical infrastructure means the continuous operation that is necessary for the societies’ stability and security from various industries or institutions. Various sectors such as healthcare sector, transportation sector, energy sector, and water sector are essential for the security and stability of a society. Attention to issues like cyber security is required from the organizations that run the various sectors. In order to enhance critical infrastructure protection, cooperation from both the public and private sectors is required. Often, the critical infrastructure is owned and operated by industries in the private sector and highly depends on technologies that are under private companies. Therefore, the government has a vital role in recognizing the security needs and success requirements. The Organization of American States publication which was developed in partnership with Microsoft highlights the importance of collaboration between the public and private sector. In this publication, Microsoft gave technical insights that will best enhance the guarding of systems based on owner priorities by the critical infrastructure operators.

Information Technology Critical Infrastructure Case of Microsoft

Final Report: Analysis and Recommendations

The Microsoft Corporation address security issues in regard to mobile codes by offering role-based security. Authentication is one of the key security concepts at Microsoft. Authentication refers to the examination of users’ credentials and also validating the credentials so as to discover and identify the verified identity (Knowles et al, 2015). During Authentication, the information obtained can be used by a person’s code directly. Another key security concept at Microsoft is authorization whereby the permission to perform a requested action is permissible (Soomro et al, 2016). This process happens after authentication whereby data about the identity of a principal are used to determine the sources that can be accessed by the principal.

Analysis and Recommendations

Information security is highly influenced by the use of information technology. This makes many users of information technology at the risk of information security issues. Therefore, information security measures are necessary so as to enhance the protection of valuable information of the users (Limba et al, 2019). Security measures are enhanced through the use of CIA triad which is the securing tool for information systems and technological assets. The goals of confidentiality, integrity, and availability will help in protecting important information at Microsoft. Confidentiality refers to guarding of information from access that is not authorized. Information protection is one of the goals that are emphasized by the CIA triad. In confidentiality, it is ensured that information can only be accessed by authorized people. Restriction to those who can access some information is the main aim of confidentiality.

Confidentiality relates to the information sector in that the personal information of people should not be shared to any unauthorized persons as this may bring about different threats (Limba et al, 2019). The Microsoft Company should ensure that information of its principals should only be accessed by authorized persons. Integrity refers to the accurate and consistent keeping of information with the exception of when authorized changes are required. Change of information can result from careless access, information system errors and access to information by unauthorized sources. Maintenance of integrity is, therefore, necessary as it helps in information security. During the storage and transmission of information, it should remain unchanged and no modification should be done to the information (Kriaa et al, 2015). The information security should put in place measures that monitor and regulate authorized access, the use of information and its transmission.

Integrity will help the information sector of Microsoft Company to ensure that no alterations are made to information during storage and transmission. Availability refers to the circumstance where information is available when needed and where it is required. The authorized users of information should be able to get information when they need it, the availability of information is enhanced through the proper working of all the components of the information system (Mashkina et al, 2016). Access to information can be made impossible when the information systems have problems. The information sector of Microsoft should ensure the proper working of all its information systems so that the users can access information anytime they need it. All his components of the CIA triad are important. They will all enhance information security at the Microsoft Company. The coordination of confidentiality, integrity, and availability is what will enhance the attainment of the goals of the information security sector of Microsoft. All these aspects are therefore required to enhance information security.

The information technology sector is faced with a number of threats. A computer virus is a common threat faced by the information technology sector. A computer virus IS a software piece which spreads from an infected computer to another (Paté‐Cornell et al, 2018). The virus is dangerous in that it can lead to deletion information or even steal corrupt some information. Computer viruses are also a threat to the information technology sector because the virus could lead to the spread of information like emails from one computer to another. Rogue security software is also another threat to the information technology sector. Security update advertisements can be dangerous when one clicks on the update so as to install the update as it leads to the downloading of software that is not genuine (Soomro et al, 2016). However, Microsoft has a webpage which gives a description of rogue security software and also informs people on how to protect themselves from it. Malicious spyware, an application created by cybercriminals is also a threat to the information technology sector. The Trojan application helps in spying on the cybercriminal’s victims (Mashkina et al, 2016). A software example is key logger which records keyboard typing of a victim and then the information is sent back to the cybercriminal.

The key threats to the information sector can be managed through a number of strategies. Solutions need to be implemented to different threats. The management, leadership and team members at Microsoft departments should help in implementing solutions that will sustain them in the different information technology threats (Paté‐Cornell et al, 2018). The issue of information technology sector threats can also be solved through the identification and catalog of the sensitive information that the department has. Sensitive information should be kept safe in this era of mobile phones. In Microsoft, the Azure Information protection aids the department in detecting information that is sensitive and securing sensitive personal information regardless of the place it is stored or whom the information is shared with. Another strategy of minimizing the information technology sector threat is by ensuring that only authorized users and systems are the ones who can access sensitive information (Radvanovsky & McDougall, 2018). The department should be careful of whom asses some information. Authentication can be enhanced through the multi-factor authentication that is built into the Azure AD and gives a single authentication platform which the department uses to give access to individuals and systems which are authorized.

The information technology sector at Microsoft has been faced by various threats such as the rogue security software. Individuals end up installing malicious software. Through the webpage that describes the rogue security software, individuals can be educated on how to identify legitimate updates (Skopik et al, 2016). The computer virus threat in the information technology sector can also be curbed by the use of antivirus. This can help in reducing the loss and corrupt of personal information.

The Chief Information Security Officer post at the Microsoft Company will help in the Information Technology Sector. The Officer will enhance the security of all the personal information that the Microsoft Company contains (Radvanovsky & McDougall, 2018). Taking care of personal information of users by many organizations has always been a challenge. The threats that are faced by the Information Technology Sector make an individual’s personal information unsecure. Many at times information has been accessed by unauthorized individual and systems which is dangerous for the victims (Sadeghi et al, 2015). It is, therefore, the role of the Chief Information Security Officer to ensure that confidentiality and integrity are exercised when handling the data. Unauthorized persons and systems should be blocked from accessing data that is not meant for them. The Officer also ensures that the information is not altered during storage and when the information is being transmitted. The role of the Officer also includes ensuring that information is available to its users anytime they need it. Therefore, proper management of all information systems is essential so as to avoid the problem of lack of information when it is required by the users (Paté‐Cornell et al, 2018). Threats in the information sector should also be mitigated by the officer by putting in place strategies such as authentication of the authorized users of the information at Microsoft Company.

Conclusion

Critical infrastructure protection can be enhanced through the formulation of policies which will emphasize on security baselines. Through these policies, Microsoft Corporation will get informed on how to secure critical information systems while at the same time allowing the evolving and innovativeness of industries in their approaches. In order to enhance critical infrastructure protection, cooperation from both the public and private sectors is required. Often, the critical infrastructure is owned and operated by industries in the private sector and highly depends on technologies that are under private companies.

References

Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection9, 52-80.

Kriaa, S., Pietre-Cambacedes, L., Bouissou, M., & Halgand, Y. (2015). A survey of approaches combining safety and security for industrial control systems. Reliability engineering & system safety139, 156-178.

Limba, T., Plėta, T., Agafonov, K., & Damkus, M. (2019). Cyber security management model for critical infrastructure.

Mashkina, I. V., Guzairov, M. B., Vasilyev, V. I., Tuliganova, L. R., & Konovalov, A. S. (2016, May). Issues of information security control in the virtualization segment of company information system. In 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) (pp. 161-163). IEEE.

Paté‐Cornell, M. E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for critical infrastructure: A risk analysis model and three case studies. Risk Analysis38(2), 226-241.

Radvanovsky, R. S., & McDougall, A. (2018). Critical infrastructure: homeland security and emergency preparedness. CRC Press.

Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy challenges in the industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC) (pp. 1-6). IEEE.

Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security60, 154-176.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review. International Journal of Information Management36(2), 215-225.

oltage and Current Laws in Multisim

Circuit Analysis – Week #1 Lab

Voltage and Current Laws in Multisim

PRELIMINARY LAB INSTRUCTIONS:

Use the following Lab Report Template (also found in Tools and Templates) when submitting your lab work.

Rules for lab submissions:

1.  The lab document must be a Word document.  PDF files are NOT accepted.

2.  All screenshots must be included.

3.  All screenshots must include the Multisim time stamp.

4.  Any and all Multisim files must be submitted. 

5.  Calculations must be provided when relevant to show how you arrived at any calculated numbers. 

6.  Any equations used must be typed in Word.  Copy and paste of equations from outside sources is prohibited.

7.  No graphics are allowed in the Word document other than screenshots of circuits from Multisim with the time stamp.

8.  The lab template must be used.  Specifically, it is brought to your attention that a summary MUST be provided explaining the results of the labs, the relationship of the results to expected results, and any challenges encountered.  This is not a personal reflection on the lab but rather a professional five sentence or more summary of the lab.

Any violation of the submission rules above will result in a grade of 1.

BACKGROUND RESEARCH:

In preparation for the lab, research what resistance tolerance is and what causes is.  Think about the impact resistance tolerance would have on measured values in a circuit.  While resistance tolerance means that a given resistance will have a different resistance other than the ideal, it will not fluctuate over a short period of time.  Think about these questions before starting the lab as it will help you in the analysis:  Why then in a physical electrical circuit do the measurements fluctuate?  What are the other factors involved?  Is there anything else which effects the resistance value when placed in a circuit in a certain location?

LAB:

This week’s lab introduces you to the construction of a resistive network in Multisim and identifying the effect of tolerances. You will learn to utilize Multisim to confirm your calculations.

  1. See the circuit below. For the load resistor of 7 KΩ, use the tolerance levels in the table to calculate ‘Vx’ to fill in the ‘Calculated Vx’ in the table below.  When the tolerance is included in the calculation, the calculated Vx will be in the form x +/- y.  (It should be noted that usually tolerance levels are not used in calculations.  Rather, an ideal circuit is assumed, and it is expected that the measurements will not be exact due to the component tolerances.)  Be sure to show your calculations, step by step (read rules above).

Resistance

Tolerance

Calculated  Vx (V)

Measured  Vx (V)

Measured Vx (V)

Measured Vx (V)

Average Measured Vx (V)

7KΩ

7KΩ

5%

7KΩ

10%

2.  Construct the above circuit in Multisim.  If you need help with Multisim, refer to the tutorials in the Tools and Templates section.  Please use the following documentation (also found in the Tools and Templates) if you need help setting up tolerances in Multisim. Use the Agilent Multimeter to make measurements. 

3.  Simulation:

  1. Run simulation to measure the voltage drop across the 7KΩ resistor and record the measurements in the first box under ‘Measured Vx’ column.  Take a time-stamped screenshot of the result.
  2. Now, add the tolerances to the resistor based on the tolerances in the table and run the simulation to complete the table. Run the simulation three times in order to obtain three measured values for each tolerance.  It is IMPORTANT to note that this variation in the simulation is NOT due to one resistor. In other words, it is as if the simulation takes out the resistor in the circuit, goes and gets another resistor out of the bin with the same tolerance, puts it in the circuit, and runs the simulation.  Take at least one time-stamped screen capture for each tolerance level.

4.  Analysis:  In this section, you are to analyze your results.  While the following questions MUST be answered, they may NOT be exhaustive nor represent all that you may want to look at.  You may have other items you would like to address or calculate.  You may have an idea to expand the table for the analysis to look at an additional item.  You are free and expected to do that here as this is a minimum guide.

a.  Calculate the average measured value for each tolerance level.

  1. Do the measured values match the calculated values? If not, explain why they are different?
  2. Explain the significance and the effect of adding resistor tolerances on your measurements of ‘Vx’ in Multisim?
  3. Do the measured and average values seem reasonable in light of your calculated values?  What is the relationship between the measured values and your calculated value?

e.  While the simulation mimics changing out the resistor with a new resistor every time you run the simulation, it also reflects some of the variation one might experience with one resistor in a typical operating scenario.  Why is that?  What things besides tolerance effect the resistance value and measurements in real circuits?  Explain at least one of those items in detail from the perspective of physics.

  1. Create your lab report in a word document called “Lab1_StudentID.docx” with your GID substituted into the file name.  Refer to the submission rules above. Be sure to include calculations, your analysis and answers to questions, screenshots, summary, etc. 
  2. Upload file “Lab1_StudentID”.

Rules for lab submissions:

1.  The lab document must be a Word document.  PDF files are NOT accepted.

2.  All screenshots must be included.

3.  All Multisim screenshots must include the date/time stamp. See TOOLS AND TEMPLATES for the procedure to display the date and time.

4.  Any and all Multisim files must be submitted. 

5.  Any equations used must be typed in Word.  Copy and paste of equations from outside sources is prohibited.

6.  No graphics are allowed in the Word document other than screenshots of circuits from Multisim and hardware if applicable, with the date/time stamp.

7.  The lab template should be used.  Specifically, it is brought to your attention that a summary MUST be provided explaining the results of the labs, the relationship of the results to expected results, and any challenges encountered.

8.  Hardware portion of labs should include screenshots of the assembled circuit with your name and student GID number written on paper next to the circuit. There should be screenshots of the instrument readings with the date and time stamp on lower right corner clearly shown. See example below.

Any violation of the submission rules above will result in a grade of 1.

Lab 1

Grading Rubric

Analyze the circuit to calculate ‘Vx’ without tolerances

15 points

Use of tolerance to calculate ‘Vx’

15 points

Circuit design in Multisim (Failure to use Agilent Multimeter results in a 1.)

10 points

Measurements of ‘Vx’

20 points

Analysis/Answer to the questions

20 points

Professional Summary

10 points

Lab Report (includes table, measurement with proper units, screenshots, APA guidelines)

10 points

Total

100 points