Chapter 17 introduced some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational and Analytical Center, explain how you would use data available to you to prepare a report for the Governor for the State Program “Combating Proliferation of Drugs.” Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts.

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, assume you are an analyst working for the St. Petersburg Informational and Analytical Center. Explain how you would use data available to you to prepare a report for the Governor for the State Program “Combating Proliferation of Drugs.” Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts.

 

====================================================================

 

In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be cancelled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.

Start a discussion thread and discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.

You must do this following:

1) Create a new thread. As indicated above,  discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.

Leave a Comment

Your email address will not be published. Required fields are marked *