Data encryption Standard

evaluate the history of the Data Encryption Standard (DES) and then how it has  transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.

Use the textbook for added reference

PS

 These days, many people are working remotely and working remotely can bring new challenges. List 5 “new” physical security challenges that work remotely entails? 

BI and Chryptography

Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. (250 to 300 words)

Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)

1.What is an artificial neural network and for what types of problems can it be used?

2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?

3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.

6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

7.List and briefly explain different learning paradigms/ methods in AI.

8.What is representation learning, and how does it relate to machine learning and deep learning? 

9.List and briefly describe the most commonly used ANN activation functions.

10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

Assessment

inventory of door and window locks in your living area or place of work to identify areas of concern and improvement. Remember to get permission from security.

Instructions: Attached  Door and Window Lock Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_3_Door_and _Window_Lock_Assessment.docx and submit to the appropriate assignment folder. Also review any additional files attached for more information.

Questions

1.  Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment in regards to Data mining. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  1. Provide a 500 word (or 2 pages double spaced) minimum reflection.
  2. You MUST Provide a single thesis statements in your introductory paragraph.
  3. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  4. Share a personal connection that identifies specific knowledge and theories from this course.
  5. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 
  6. You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 
  7.  Don’t forget that the grade also includes the quality of writing.

2.  250 words: 

 Discuss two (2)  methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion. 

3.  Discuss how an IT manager might use load testing on a site.  (250 words)

4.  Describe some development best practices for designing solutions for the mobile cloud. Be sure to reply to at least two classmates. Use at least one source to support your discussion.  Reference your source in APA. (250 words)

Software Quality Paper

For this assignment, imagine you are working as a Quality Consultant for Big Data organizations. You have been contracted by Logis-Study – a pharmaceutical test subject results and tracking application for large scale longitudinal studies.

Logis-Study is planning on creating a new application that will be used by researchers and scientists to access and contribute data to the system.

Logis-Study needs to be able to make updates to the system rapidly – new studies are often added and need to be able to quickly integrate with the larger system.

The CEO has a number of questions regarding Software Quality and Quality Management. She has contracted you do write a summary report for her.

She would like to know the following:

• Which development methodology should Logis-Study use?

• What are some of the Quality standards and do they need to be followed? Why or why not?

• What type of team should be hired (QA, QC, Testing) and why?

• Identify any quality costs and how/when the application testing should be performed.

Please create a summary report (2-3 pages) outlining your responses. The report should use appropriate business language and any references should follow the APA format.

Essay on Indigenous Literature

you can find the documents below please write an essay on the poem I am home again and also on the uses of indigenous literature please follow every instruction.

 Word Count: 500 words Style and Format: The paper should be formatted according to MLA style guide (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/m la_sample_paper.html ). Please type it in Times New Roman 12 font. Description Focusing on the poem “I am Home Again”, write an essay that highlights how Indigenous poetry play an important role in the construction of an aesthetic identity and culture for the Indigenous communities of Canada in the 21st century. Refer to the essay “The Uses of Indigenous Literature” to illustrate/ elaborate on the social function of Indigenous literature. Add a Works Cited page at the end of your essay and include both the poem and the essay in this list. Writing Hint In the introduction clearly identity the topos (of the poem). You should also have a clear thesis statement in the introduction that addresses the following question: Home does the poem “I’m Home Again” create an aesthetic identity for the Indigenous communities of Canada? This would be the working thesis which should be revised once the first draft has been prepared. The body paragraphs should highlight the specific devices (imagery/refrain/personification/symbolism/metaphor/analogy) addressed in the thesis. Ensure that your topic sentences are clear and specific and each paragraph is developed around the specific topic sentence. Dedicate one body paragraph to discuss how the poem can be read in light of the points discussed in the essay “The Uses of Indigenous Literature”. Your body paragraphs should use quotations from the poem. Try not to use quotations in the introduction or the conclusion. 

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?