Discussion post week 5

 Need a 250 words Discussion post for each of the following questions and URL references link of both questions.

1. Privacy precautions for web surfing.

 2. Outline the steps and best practices of risk analysis of cyberattacks.

Note: NO PLAGIARISM

Data and Text mining

Chapter 7

Discussion Question 1: Explain the relationship among data mining, text mining, and sentiment analysis.

Discussion Question 2: In your own words, define text mining, and discuss its most popular applications.

Discussion Question 3: What does it mean to induce structure into text-based data? Discuss the alternative ways of inducing structure into them.

Discussion Question 4: What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Exercise 3: Go to https://www.teradata.com/Blogs/Analyzing-the-Analytics and read the case study titled “Analyzing the Analytics”. Read the case carefully and extend your understanding of it by searching the Internet for additional information, and then answer the following question: How effective is managing analytical models through automation? Write a one-page report.

Internet Exercise 7: Go to kdnuggets.com. Explore the section on applications as well as software. Find the names at least three additional packages for data mining and text mining. Write a one-page report summary the identified packages.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Project

 

our client is a medical clinic that has multiple small offices in San Diego County. Each office has its own network that includes the following:

4 – workstations (three doctors and one administrative assistant)

1 – Database server (patient’s records)

1 – Windows server (active directory for authorization)

1 – Web Server (with links to the other offices)

 This design is duplicated in each of the clinic’s small offices.

You have been assigned to develop the security architecture for a cloud deployment using AWS or Azure (your choice) that minimizes duplication currently implemented in the clinic. The deployment must consist of the following minimum components:

  • Load Balancer
  • Web Server
  • Back-end database

 

Develop a security architecture that meets the following requirements:

Access control and authentication:

  1. Public facing area
  2. Authenticated access for registered customers
  3. Multi-Factor authentication for developers and admins

Network Security

  1. Monitoring and testing
  2. Encrypted communications

(References will be checked, and a Plagiarism Checker may be used)

Deliverables:

  • Written Report of recommendations (10-15 pages
  • A detailed network diagram of your proposed recommendations. 
  • Title Page – containing the following at a minimum: Title, Authors, Institution Name, Class number, Date
  • APA format
  • See grading rubric for details

project 6 to ppt

 

All assignment must be/have: In APA with a separate Cover and Reference page In 12 Font Doubles spaced In a Microsoft Word format 2-3 Pages of findings Have 4-6 LIRN Library resources that are cited within the paper to show where they apply.

Explain how to determine appropriate tests of controls and consider the results of tests of controls in auditing long-lived assets.

Explain how to determine appropriate responses to identified risks of material misstatement in auditing long-lived assets.

around these questions make ppt of slides 8.

Mobile -4

 

“Interactive Design involves understanding users, developing prototypes, and evaluating and refining the product in a participative manner” (Jones and Marsden).

Can you give an example of 

a) where you KNOW this was done, or 

b) where you THINK  this was done, or 

c) where you think this was NOT done…and that was a problem?

Do not simply name a mobile application – tell us why you think what you think.

Vulnerability Process and Assessment Memo

 

Mercury USA is a small- and medium-sized business (SMB) in the transportation sector with 400 employees. 

You’ve just been hired by Mercury USA as the first cyber threat analyst on the team and will work within the existing Information Technology department. Mercury USA has an urgent interest in addressing security vulnerabilities.

Judy “Mac” McNamara, the manager of IT services, said the chief executive officer (CEO) recently learned via a mandatory breach disclosure that a competitor was a victim of ransomware. The firm in question lost a significant amount of intellectual property and customer data and is facing expensive litigation, government fines, and loss of customer confidence. These issues are likely to result in bankruptcy.

Thus, executive management would like to prevent Mercury USA’s critical data (e.g., order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software) from falling into the wrong hands and threatening the survival of the business.

Message from the CEO

The CEO of Mercury USA has recorded a video message for all employees. Watch this video before starting the projects.

As the cyber threat analyst at Mercury USA, you will be expected to identify security-related issues that hackers could use against the company. You will begin by addressing the security vulnerabilities present in the IT infrastructure of the company and develop a way forward that helps to prevent and deter attacks.

You will be completing three projects for this course:  

Part 1:  Vulnerability Process and Assessment Memo—A two- to three-page memorandum outlining the VM process in which you will use a sample vulnerability scan report to assess security posture and develop a recommended VM process (Week 3)

Part 2:  VM Scanner Background Report—A four- to six-page background report to review a commercial scanning tool and provide a recommendation (Week 5)

Part 3:  Presentation to Management—A five- to 10-slide “pitch” to executive management outlining your assessment of Mercury USA’s security posture, the business need, and seeking a decision on purchasing the commercial tool (Week 7