Database SQL essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?  Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)
With atleast 3 references 

Access control discussion 7

Discuss how human nature affects Access Control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly site the references.

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

CC W 14 A 2

 Clond computing can create huge competitive advantages if applications and services are correctly architected to satisfy the business requirements. In this assignment, identify and describe briefly four factors that should be considered when choosing a cloud service model (CSM). Select two out of the four that you think are very important for implementation. This should be a 250 words assignment. Plagiarism will be checked as well as APA style and format. 

Resource assignment fri

Please find at least 5 sites with useful and relevant information that focus on some aspect of blockchain in finance. Include a short summary of the sites and the applicable citations/reference information.

Statistical analysis using R

  

Final Exam DPEE

Note: 

· For demonstrating conceptual understanding, you are required to work on the model that is easier to handle or compute, not necessarily the more suitable (or more complicated) model for the dataset. Follow the question description. 

· You don’t need to check the assumption of a model unless the question asks for it. For example, if the question asks you to make prediction based on a model, you don’t need to check the assumption for the model before making prediction. 

· For any of the testing (hypothesis test) problem, define Ho/Ha, compute the test statistic, report the exact p value, and state the conclusion. The default alpha value is 5%, unless specify. 

· Elaborate your reasoning clearly and show relevant plots, R results, and tables to support your opinion in each step and conclusion. 

· Submit the Rmd file and the corresponding pdf file knitted from it, along with your answer, this format is similar to your homework. 

· The data is real, just like the project you are working on. Hence it is possible that even after the remedial method has been done, the model is still not perfect. When this happens, evaluation will be based on the level you execute the methods covered in Stat512 to improve the model. Don’t worry if your model is not perfect, try your best to demonstrate the skill set you learn in this class. 

Study the data with a linear analysis and complete the problems. The data set, dataDPEE.csv has 3 continues predictors and two categorical predictors. 

  

Problem 1. Consider only the first order model with X1, X2 and X3, perform the following hypothesis. 

a. (10) whether X1 can be dropped from the full model. 

> dpeemod <- lm(y ~ x1 + x2 + x3)

> plot(dpee)

> summary(dpeemod)

Call:

lm(formula = y ~ x1 + x2 + x3)

Residuals:

Min 1Q Median  3Q Max 

-15.948 -11.640 -1.480 6.402 31.650 

Coefficients:

Estimate Std. Error t value Pr(>|t|) 

(Intercept) 90.79017 22.07408 4.113 0.00106 **

x1 -0.68731 0.47959 -1.433 0.17377 

x2 -0.47047 0.24227 -1.942 0.07254 . 

x3 -0.06845 0.46523 -0.147 0.88513 

Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1

Residual standard error: 14.75 on 14 degrees of freedom

Multiple R-squared: 0.6257, Adjusted R-squared: 0.5455 

F-statistic: 7.8 on 3 and 14 DF, p-value: 0.002652

 

Ho: X1 is significant and cannot be dropped from the model.

Ha: X1 can be dropped from the model. 

Using the model Y~X1 + X2 + X3, 

b. (10) whether X1 can be dropped from the model containing only X1 and X2. 

  

Problem 2 (10) Consider the first order model with X1, X2 and X3, simultaneously estimate parameters (beta1, beta2 and beta3)  with a confidence level of 75%. 

  

Problem 3 (20) Perform appropriate analysis to diagnose the potential issues with the first order full mode with X1 X2 and X3, improve the model as much as possible with the methods covered in Stat512. You should also consider the assumption checking for your revised model.  

  

Problem 4 

a. (10) Compute AIC, BIC, and PRESSP to compare the following two models. 

· The model on the first order terms for X1 and X2 and the interaction term X1X2.

· The model on the first order terms for X1, X2 and X3 

Do they all yield the same better model? If not, explain. 

b. (10) Select the model that you think is better to predict the mean response value, then predict the mean response for the following case, at a confident level of 99%. 

  

x1

x2

x3

 

45

36

45

Problem 5 

X4 and X5 are two factors on Y.

a. (10) Is there any significant interaction effect between X4 and X5 on Y? 

b. (10) With the ANOVA method, compute the 95% confidence interval for the following difference, respectively: 

D1= The difference in the mean of Y when (X4=high, X5=less) and (X4=high, X5=more) 

D2= The difference in the mean of Y when (X4=low, X5=less) and (X4=low, X5=more) 

c. (10) With the ANOVA method, compute the 95% confidence interval for 

D1-D2

Where D1 and D2 are described in b. 

How is your result related to a? 

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

online discussion

 

There are many ways to misrepresent data through visualizations of data. There are a variety of websites that exist solely to put these types of graphics on display, to discredit otherwise somewhat credible sources. Leo (2019), an employee of The Economist, wrote an article about the mistakes found within the magazine she works for. Misrepresentations were the topic of Sosulski (2016) in her blog. This is discussed in the course textbook, as well (Kirk, 2016, p. 305).

After reading through these references use the data attached to this forum to create two visualizations in R depicting the same information. In one, create a subtle misrepresentation of the data. In the other remove the misrepresentation. Add static images of the two visualizations to your post. Provide your interpretations of each visualization along with the programming code you used to create the plots. Do not attach anything to the forum: insert images as shown and enter the programming code in your post.

When adding images to the discussion board, select the plus sign in the toolbar, then choose the image from your files.

 

This is the data to use for this post: Country_Data.csv

Before plotting, you must subset, group, or summarize this data into a much smaller set of points. Include your programming code for all programming work. It would be more likely that one would win a multi-million dollar lottery than plot the same information the same exact way. However, if you have, you will need to repost and make your post unique. The first post to provide the content does not need to change.

References

Kirk, A. (2016). Data visualisation: A handbook for data driven design. Sage.

Leo, S. (2019, May 27). Mistakes, we’ve drawn a few: Learning from our errors in data visualization. The Economist. https://medium.economist.com/mistakes-weve-drawn-a-few-8cdd8a42d368

Sosulski, K. (2016, January). Top 5 visualization errors [Blog]. http://www.kristensosulski.com/2016/01/top-5-data-visualization-errors/

Considerations for every forum:

Remember your initial post on the main topic must be posted by Wednesday 11:59 PM (EST). Your 2 following posts, discussing and interacting with peers’ posts must be completed by Sunday at 11:59 PM (EST). 

Your initial post should include your references, thoroughly present your ideas, and provide evidence to support those ideas.  A quality peer response post is more than stating, “I agree with you.” State why you agree with your classmate’s post. Use the purpose of the forum is to generate discussion. 

No credit will be earned for posts that are disrespectful or not on the topic of the forum.

An example post:

The factual and misrepresented plots in this post are under the context that the visualizations represent the strength of the economy in five Asian countries: Japan, Israel, and Singapore, South Korea, and Oman. The gross domestic product is the amount of product throughput. GDP per capita is the manner in which the health of the economy can be represented.

The visual is provided to access the following research question:

How does the health of the economy between five Asian countries: Japan, Israel, and Singapore, South Korea, and Oman, compare from 1952 to 2011?

gdpPerCapitaGDP

The plot titled with “GDP per Capita” is the true representation of economic health over the years of the presented countries. Japan consistently has seen the best economic health of the depicted countries. Singapore and South Korea both have large increases over the years, accelerating faster than the other countries in economic health. Oman saw significant growth in the years between 1960 and 1970, but the growth tapered off. All of the countries saw an increase in health over the provided time frame, per this dataset. Israel saw growth, but not as much as the other countries.

The plot titled without “per capita” is only GDP and does not actually represent economic health. Without acknowledging the number of persons the GDP represents, Japan is still the leading country over the time frame and within the scope of this dataset. Singapore’s metrics depict some of the larger issues of representing the GDP without considering the population. Instead of Singapore’s metrics depicting significant growth and having a level of health competitive with Japan in the true representation, Singapore has the fourth-smallest GDP. It indicates that Singapore’s economy is one of the least healthy amongst the five countries.

The programming used in R to subset, create, and save the plots:

# make two plots of the same information - one misrepresenting the data and one that does not
# use Country_Data.csv data
# plots based on the assumption the information is provided to represent the health of the countries' economy compared to other countries
# August 2020
# Dr. McClure



library(tidyverse)
library(funModeling)

library(ggthemes)

—————– Coding removed due to issues with students reposting the example post in prior courses —————–
You are required to post your code on the discussion, despite the removal in this example.

Your peers and I should be able to copy and paste your code into RStudio to render your graphics.

——————————————————————————————————————————————–

# save each plot with a transparent background in the archive image folder 
ggsave(filename = "PerCapita.png",
      plot = p1,
      bg = "transparent",
      path = "./code archive/_images")
ggsave(filename = "GDP.png", 
      plot = p2,
      bg = "transparent",

Research paper

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.