SlideShare a Scribd company logo
W5: Technologies for Decision Making
Graded Discussion: Technologies for Decision Making
Create a new thread and address the following discussion
question.
When we think about various technologies for decision making,
there are many different types; however, when we focus in the
realm of decision making, remember that many decisions we
make are based on various data reports and raw data extracted
from databases transformed into usable business intelligence.
Some business intelligence technologies are associated with the
following:
· Data Warehousing
· Data Driven Dashboards
· Ad Hoc Reporting
· Data Discovery Technologies
· Cloud Data Services
Some example technology driven applications are associated
with the following:
· Microsoft Power BI
· R Studio
· IBM Cognos Analytics
· Dundas BI
· Oracle BI
Based on the types of technology driven tools to support
decision making, think about your current work environment or
possibly think about the type of organization you would like to
work for an its associated work environment. Based on this,
conduct some background research on a few technologies which
supports decision making and compare these technologies and
determine which would best support your chosen work
environment and why?
Discussion Expectations
Please make sure to proof read your post prior to submission.
They should be well written and free of grammatical or
typographical errors.
Initial postings are due by Wednesday. You are encouraged to
post your follow-up comments to different students and you can
do more than two if you want and these peer replies are due by
Saturday. Postings should include scholarly detail with
research support where appropriate
Important Reminder: Assessment of discussion boards and
other writing assignments account for 50% of overall grading
and below are how grades will be assessed for this discussion
board:
Assessment Criteria
Possible Points
Points Earned
Student included an initial posting
40
Student included at least two peer replies.
20
Content in student postings is of rich descriptive details
supported with research to support and move discussion topics
forward in a collaborative environment.
30
Student posted an initial posting by the Wednesday due date.
5
Student posted at least two peer replies by the Saturday due
date.
5
Total Earned points
100
Comments:
Computer Security Fundamentals
by Chuck Easttom
Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Chapter 11 ObjectivesUnderstand how to secure a system
Probe a system for vulnerabilitiesUse Vulnerability
vulnerability scanning toolsEvaluate potential security
consultants
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Understand and be able to conduct basic system reconnaissance.
Describe and use several port scanners.
Understand how to derive useful information about a Web site
from internic or the Netcraft Web site.
Know how to locate useful information about a system or
organization from Internet newsgroup postings.
Understand the use of vulnerability scanners.
Use port monitoring utilities.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
IntroductionSecure the system.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Basics of SecurityPortsProtectPoliciesProbePhysical
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
MBSAMicrosoft Baseline Security Analyzer
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
NessusPopular Vulnerability Scanner
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
Getting Professional
HelpCertificationEducationExperienceBackground Checks
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
The goals of the hacker and the network administrator have a
great deal in common.
CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft,
Cisco, and so on)GAIC
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
EducationComputer ScienceEngineeringComputer Information
SystemsSecurity Degrees
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
Background and ExperiencePrior Security ExperienceCriminal
Background CheckCredit CheckReferences Check
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*
SummaryInformation The more information you have about the
vulnerabilities and weaknesses of your system, the better
prepared you are to defend it.The more information the hacker
has about your system’s vulnerabilities and weaknesses, the
sooner it will be violated.The tools in this chapter are for the
network and security administrator and are to be used for legal,
not illegal, purposes.
© 2016 Pearson, Inc. Chapter 11 Network Scanning and
Vulnerability Scanning
*

More Related Content

PPTX
Introduction to cyber security
PPTX
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PPTX
Lecture-39.pptx Xperia of this slide can conversation
PDF
Cyber security series vulnerability assessments
PDF
Vulnerability assessment-info-savvy
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
Dncybersecurity
PPTX
CISSP - Security Assessment
Introduction to cyber security
PACE-IT, Security+3.7: Overview of Security Assessment Tools
Lecture-39.pptx Xperia of this slide can conversation
Cyber security series vulnerability assessments
Vulnerability assessment-info-savvy
ISACA Ethical Hacking Presentation 10/2011
Dncybersecurity
CISSP - Security Assessment

Similar to W5 Technologies for Decision MakingGraded Discussion  Technolo.docx (20)

PPTX
Technology
PPTX
9780840024220 ppt ch09
PPTX
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
PPT
Chapter 2
PDF
Vulnerability
PDF
Types of Vulnerability Scanning An in depth investigation.pdf
PPT
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PPT
Chapter 15 Presentation
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PPTX
Vapt life cycle
PPTX
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
PDF
Network Vulnerability and Patching
PPTX
501 ch 8 risk managment tool
PPT
M Kamens Iia Financial Services Presentation At Disney
PPT
Dr K Subramanian
PDF
Information Security Risk Management
PDF
CyberSecurity Update Slides
PPTX
What is a Port Scan in data visualization
PDF
Defcon 23 - damon small - beyond the scan
Technology
9780840024220 ppt ch09
UNIT I PPT.pptxsdVDSVDAVDSBGVGNhfzgnnzgdngfh
Chapter 2
Vulnerability
Types of Vulnerability Scanning An in depth investigation.pdf
50 Shades of RED: Stories from the “Playroom” from CONFidence 2014
Ethical Hacking n VAPT presentation by Suvrat jain
Chapter 15 Presentation
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
Vapt life cycle
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Network Vulnerability and Patching
501 ch 8 risk managment tool
M Kamens Iia Financial Services Presentation At Disney
Dr K Subramanian
Information Security Risk Management
CyberSecurity Update Slides
What is a Port Scan in data visualization
Defcon 23 - damon small - beyond the scan
Ad

More from jessiehampson (20)

DOCX
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
DOCX
Migration and RefugeesMany immigrants in the region flee persecu.docx
DOCX
Min-2 pagesThe goal is to develop a professional document, take .docx
DOCX
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
DOCX
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
DOCX
Migrating to the Cloud Please respond to the following1. .docx
DOCX
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
DOCX
Michelle Wrote; There are several different reasons why an inter.docx
DOCX
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
DOCX
MicroEssay Identify a behavioral tendency that you believe.docx
DOCX
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
DOCX
midtermAnswer all question with proper number atleast 1 and half.docx
DOCX
Midterm QuestionIs the movement towards human security a true .docx
DOCX
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
DOCX
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
DOCX
Microsoft Windows implements access controls by allowing organiz.docx
DOCX
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
DOCX
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
DOCX
Miami Florida is considered ground zero for climate change, in parti.docx
DOCX
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
Migration and RefugeesMany immigrants in the region flee persecu.docx
Min-2 pagesThe goal is to develop a professional document, take .docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Migrating to the Cloud Please respond to the following1. .docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Michelle Wrote; There are several different reasons why an inter.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
MicroEssay Identify a behavioral tendency that you believe.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
midtermAnswer all question with proper number atleast 1 and half.docx
Midterm QuestionIs the movement towards human security a true .docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Windows implements access controls by allowing organiz.docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Miami Florida is considered ground zero for climate change, in parti.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
Ad

Recently uploaded (20)

PDF
advance database management system book.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
Introduction to Building Materials
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
advance database management system book.pdf
Empowerment Technology for Senior High School Guide
Hazard Identification & Risk Assessment .pdf
Indian roads congress 037 - 2012 Flexible pavement
History, Philosophy and sociology of education (1).pptx
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
LDMMIA Reiki Yoga Finals Review Spring Summer
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
HVAC Specification 2024 according to central public works department
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Unit 4 Computer Architecture Multicore Processor.pptx
What if we spent less time fighting change, and more time building what’s rig...
Virtual and Augmented Reality in Current Scenario
Introduction to Building Materials
FORM 1 BIOLOGY MIND MAPS and their schemes
Introduction to pro and eukaryotes and differences.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Paper A Mock Exam 9_ Attempt review.pdf.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

W5 Technologies for Decision MakingGraded Discussion  Technolo.docx

  • 1. W5: Technologies for Decision Making Graded Discussion: Technologies for Decision Making Create a new thread and address the following discussion question. When we think about various technologies for decision making, there are many different types; however, when we focus in the realm of decision making, remember that many decisions we make are based on various data reports and raw data extracted from databases transformed into usable business intelligence. Some business intelligence technologies are associated with the following: · Data Warehousing · Data Driven Dashboards · Ad Hoc Reporting · Data Discovery Technologies · Cloud Data Services Some example technology driven applications are associated with the following: · Microsoft Power BI · R Studio · IBM Cognos Analytics · Dundas BI · Oracle BI Based on the types of technology driven tools to support decision making, think about your current work environment or possibly think about the type of organization you would like to work for an its associated work environment. Based on this, conduct some background research on a few technologies which
  • 2. supports decision making and compare these technologies and determine which would best support your chosen work environment and why? Discussion Expectations Please make sure to proof read your post prior to submission. They should be well written and free of grammatical or typographical errors. Initial postings are due by Wednesday. You are encouraged to post your follow-up comments to different students and you can do more than two if you want and these peer replies are due by Saturday. Postings should include scholarly detail with research support where appropriate Important Reminder: Assessment of discussion boards and other writing assignments account for 50% of overall grading and below are how grades will be assessed for this discussion board: Assessment Criteria Possible Points Points Earned Student included an initial posting 40 Student included at least two peer replies. 20 Content in student postings is of rich descriptive details supported with research to support and move discussion topics forward in a collaborative environment. 30 Student posted an initial posting by the Wednesday due date. 5
  • 3. Student posted at least two peer replies by the Saturday due date. 5 Total Earned points 100 Comments: Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Chapter 11 ObjectivesUnderstand how to secure a system Probe a system for vulnerabilitiesUse Vulnerability vulnerability scanning toolsEvaluate potential security consultants © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 4. * Understand and be able to conduct basic system reconnaissance. Describe and use several port scanners. Understand how to derive useful information about a Web site from internic or the Netcraft Web site. Know how to locate useful information about a system or organization from Internet newsgroup postings. Understand the use of vulnerability scanners. Use port monitoring utilities. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * IntroductionSecure the system. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * Basics of SecurityPortsProtectPoliciesProbePhysical © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 5. * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * MBSAMicrosoft Baseline Security Analyzer © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * NessusPopular Vulnerability Scanner © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning
  • 6. * Getting Professional HelpCertificationEducationExperienceBackground Checks © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * The goals of the hacker and the network administrator have a great deal in common. CertificationsCEHCISSPSecurity+Vendor-specific (Microsoft, Cisco, and so on)GAIC © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning EducationComputer ScienceEngineeringComputer Information SystemsSecurity Degrees © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning Background and ExperiencePrior Security ExperienceCriminal Background CheckCredit CheckReferences Check © 2016 Pearson, Inc. Chapter 11 Network Scanning and
  • 7. Vulnerability Scanning * © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning * SummaryInformation The more information you have about the vulnerabilities and weaknesses of your system, the better prepared you are to defend it.The more information the hacker has about your system’s vulnerabilities and weaknesses, the sooner it will be violated.The tools in this chapter are for the network and security administrator and are to be used for legal, not illegal, purposes. © 2016 Pearson, Inc. Chapter 11 Network Scanning and Vulnerability Scanning *