Help
Foundations of Cybersecurity-SP21
This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.com. KrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com.
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge. The articles must have been published in the last six months. For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site. Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information. Limit your writeups to no more than one page for each of the two topics. When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base. For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic. Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found. Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.
BI and Chryptography
Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted. (250 to 300 words)
Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)
1.What is an artificial neural network and for what types of problems can it be used?
2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?
3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.
6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
7.List and briefly explain different learning paradigms/ methods in AI.
8.What is representation learning, and how does it relate to machine learning and deep learning?
9.List and briefly describe the most commonly used ANN activation functions.
10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.
11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.
read the attachment and answer the question
1. Download and read attached report: “Metrics for the Second Curve of Health Care”. You need to concentrate your reading on contents related to “Strategy 4: developing Integrated Information Systems”.
Write a report to explain
- what is the Second Curve Health Care? (10 points)
- why Strategy 4 is important in the transition from the First Curve to the Second Curve (40 points)? Your explanation should be written from the informatics perspective focusing on how the three components of Informatics are involved in this strategy.
If you choose to supplement your writing with resources besides the attached document, you need to include their references in APA format.
Save your report as a Word document and name it as SecondCurve_FL where FL are your first and last name initials. Your Word document should be formatted using Times New Roman font (no smaller than 10 pt but no bigger than 11 pt), single spacing, 1″ margins on all sides, and the report length (2 page minimum,
……………………………………………………………………………………………………………………………………………………………….
2. Download and read a document on Quality Data Model (QDM). Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.
Tasks: Write a report that contains your answer to the following questions:
1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)
2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)
3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”. (40 points)
In order to help you understand this question, please consider the following sample scenario: Doctor A needs to find if any of his/her patients in the age group 35-55 has low HDL so that s/he can recommend them to practice regular aerobic exercise and loss of excess weight to increase the HDL level. Doctor A asks you for help since you are a health informatics analyst. Describe how you would use the database to find the answer. For example, do you need to use the database table representing QDM element “Laboratory Test”? What other tables in this database do you need to use? How will you generate the answer for Doctor A from theses database tables?
Save your report as a Word file and save it as H3_FL2.docx where FL are your first and last name initials.
……………………………………………………………………………………………………………………………………………………………
3. The attached Ethics-III.pdf continues the discussion on what other ethical obligations software engineers are under.
Then proceed to answer the questions inside the reading:
- Questions 5.1 to 5.12
Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).
Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.
Save your file as Ethics_3_FL where FL is your first and last name initial and Submit.
……………………………………………………………………………………………………………………………………………………………….
4. Answer the following two questions based on what you have learned from “Head First” book Chapter 4 and Chapter 5.
Q1. Describe the usage of the Burn Down chart in the Head First book Chapter 4. Explain how to calculate the value and update it on the chart for any particular day? (Your answer should explain the relationship between the Burn Down chart and the other techniques discussed in Chapter 4 such as the Big Board and the Standup Meeting.) (20 points)
Q2. Suppose that you are asked to add a new event to the iSwoon system: The event is “Party at a friend’s place” and it is only allowed to occur on the 4th date or later. Describe what you would have to do to add this Event to the original iSwoon design(Ch 4) AND the “fixed” iSwoon design (Ch 5) respectively.(10 points)
Give your own evaluation of the latter “fixed” design; does it address the problems of the original design? What problems might the original design have and how might you fix them? (20 points)
Save your file as iSwoon_FL where FL is your first and last name initial and Submit.
………………………………………………………………………………………………………………………………………………………………………….
5. you are going to complete a midterm paper and it’s based on the movie “Office Space”. You choose the way to watch the movie in a comfortable setting.
Write your review in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides, and the paper’s length is no more than 2 pages. Any direct quotes from the movie do not count into the length of the paper.
In the midterm paper, you need to identify at least three problems (problems identified must be from the software engineering perspective, not from the general ethics perspective) that could have been avoided if a good software development method is applied in “Office Space”.
- Identify the problems related to software engineering and describe what the consequences of these problems are respectively; (15 points)
- Explain what actions you, as a member working on a software project, would have taken in order to avoid those problem respectively; (30 points)
- Describe if your actions (described above) are related to any knowledge that you learned from the first 5 modules of this semester. (5 points)
Save your file as Movie_FL where FL is your first and last name initial. Submit your file through the dedicated link under the Submissions tab.
Air force missile
For this assignment, you will also need to read the 2 papers that are saved as:
15 sept-lights-out.pdf and 15 sept-HPEM.pdf, which can be found on Canvasor at the links:
https://breakingdefense.com/2012/10/new-air-force-missile-turns-out-lights-with-raytheon-microwave-t/
https://defensesystems.com/articles/2017/10/18/air-force-hpem.aspx
2.Read the 2 articles about Raytheon’s new missile. What does this missile do? Explain very clearly.[4 pts]
3.From an Information Systems standpoint, explain the impact of what this means, i.e. if this missile was actually used, what is the impact to any and all information systems –impact to anything else?? Give this deep thought and be VERY complete! [8 pts]
4.Does this concern you? (Think hard about this before you answer!) How? STRONGLY Support your answer with specific examples of your concerns or likewise be very supportive of why this does NOT concern you.[8 pts]
5.Next, research SDI (Strategic Defense Initiative) or “Star Wars”, which was a President Reagan term and initiative. What is this(be very clear)? Could this help the current (potential use of EMPs) situation? Explain thoroughly.[8 pts]
6.Lastly, imagine that you have been hired to protect your company against these Raytheon missiles. What options do you have? Be very clear and thorough.Think through ALLpossibilities. (feel free to be creative!))[8 pts]
Not to exceed two pages.
Paper needed on topic “Mobile devices Forensics”
“Mobile devices Forensics” as my project topic.
A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography
Glb Ethics
Read the doc file
week 12 Discussion – Cyberlaw
Please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 450 words. Please add references in APA format.
Data Systems
Throughout the chapter, you have reviewed various examples of B2B and B2C stores where 1-1, 1-M, and M-M relationships are portrayed. Can you provide example use cases where a business would need data to be fairly rigid, applying a 1-1 model? How about fairly lenient, applying a M-M model?
Instructions:
- Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
- Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
1 page
I would like you to find an elegantly designed chart and tell me in 4 sentences (one paragraph) why you think it is elegant.
It should be submitted in one page of a word document.
The top part should be a the screen shot of the design.
The explanation should be below.