chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

Assignment

 Chapter 3 –discussion question #1-4 & exercise 12 (choose any two)

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Discussion: 

1. How do you describe the importance of data in analytics?

Can we think of analytics without data? Explain.

2. Considering the new and broad definition of business

analytics, what are the main inputs and outputs to the

analytics continuum?

3. Where do the data for business analytics come from?

What are the sources and the nature of those incoming

data?

4. What are the most common metrics that make for

analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data

portal that has a very large number of data sets on a

wide variety of topics ranging from healthcare to education,

climate to public safety. Pick a topic that you

are most passionate about. Go through the topic- specific

information and explanation provided on the site.

Explore the possibilities of downloading the data, and

use your favorite data visualization tool to create your

own meaningful information and visualizations.

risks in cloud computing

  

Read the attached article and  please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk      management?

Make sure to write in proper format

  • Explain, define, or analyze the topic in detail
  • Provide an outside source (for example, an article from the UC Library) that applies to the      topic, along with additional information about the topic or the source      (please cite properly in APA 7)

5

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that a bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

CC-12 project

   Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the Research Databases available from the Danforth Library not Google.  

Topic: “What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? “

Digital Forensics

  

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

MSDF-630: Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in MSDF-630 provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Name Lengths

Introduction

Do people with long last names also tend to have long first names? In this assignment, you will analyze data to investigate this question, construct and analyze a linear regression model based on the relationship between the length of the first and last names in the dataset that you collected, and draw insights into the phenomenon within the limitations of the model. You will count the alphabet letters used to write the name of 100 individuals from this dataset   arabic_first_last_name _1_.csv

e  .

Part I: Exploratory Analysis

a) Download the arabic_first_last_name.csv file which contains Arabic first and last name columns.

b) Construct a dot plot of the last name lengths and comment on any interesting features of this plot.

c) Construct a dot plot of the first name lengths and comment on any interesting features. Describe how the distribution of first name lengths compares to that of last name lengths.

Part II: Regression Model

a) Construct a scatterplot of x and y.

b) Explain if this is the plot consistent with the theory that people with long last names tend to also have long first names?

c) What is the value of the correlation coefficient for this data set?

Part III: Reporting

a) Discuss if your first and last name are included in the context of the model.

b) Discuss the limitations of the data, the model, and the analysis.

c) Write a 100-200 words meaningful paragraph summarizing the findings from the analysis.

Once you have developed responses to the task prompts, you will organize them in a professional 3-5-page report, not including the title and reference pages, that summarizes your actions, calculations, and findings. You will upload a zipped file that includes your response and all supporting files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.