Research paper and discussion

Part 1 : Research paper 

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2 : discussion ( 500 words including 2 responses ) 

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3 – discussion ( 500 words including 2 responses )

 discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.  

Creating website using infinity free(I will provide the username and password)

Create web pages for your database using PHP. You should have one page that will return all the information from the database. You should create additional pages that will allow you to do various queries of your database. You should be able to retrieve and insert data; also include functionality to delete data from your database. I will be looking for these features. Feel free to handle those functions however you feel is best for your project. 

Create an html form that will allow you to enter in new information for the database. The information should be handled by a PHP script that will take the data and input it into the database. 

The interface doesn’t have to look real pretty at this point. That will be done in the next phase. If you want to go ahead and make things look nice, feel free to do so.

If you have not yet created a home page, create a separate home page that contains links to each of the web pages you create to access your database.  Your database (must have a minimum of two tables) is not to be displayed on the home page; be creative on this page.   On each of the database pages create a button (link) to go back to the home page. Your project must have more than one page; your home page should have links to other pages to perform operations on the database.  Some appropriate picture or image should be on the home page that relates to you project.  Make your project look as professional as possible.  You may want to show it during a interview.

Create a text file in which to store hyperlinks to your home page and PHP scripts.  Turn in this file to the appropriate submission box.

Write about OAuth.

Write  500 words or more explaining why this “OAuth” is important for your peers to understand. Be focused and specific. You should do a deep dive into a topic.

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Information Governance week -4 -2

 Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread. 

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. 

500 words

Need help in homework

This week’s reading centered around Bitcoin Economics. Search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency. Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused to accept Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

 

Requirements:

Be approximately four pages in length, not including the required cover page and reference page.

Your paper should include an introduction, a body with fully developed content, and a conclusion.

threat modeling and simulations

  

In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

· Minimum 700 words

  Paper should be developed in accordance to APA

· Use citations with appropriate references

This assignment should be in APA format and have to include at least two references.

Informatics

O
From the moment you wake, you are in fact a data-generation machine. Each use of your phone, every transaction you make using a debit or credit card, even your entrance to your place of work, creates data. It begs the question: How much data do you generate each day? Many studies have been conducted on this, and the numbers are staggering: Estimates suggest that nearly 1 million bytes of data are generated every second for every person on earth.