Social media Anlaytics

Question:

 What is social media analytics? How is it done? Who does it? What comes out of it? Unique answers only. 

Length:250 words

Format: MS word

Citations: Required

Digital Forensic Conferences

 Assignment: Digital Forensic Conferences

Learning Objectives and Outcomes

  • Research digital forensic conferences.
  • Identify a conference that is most suited to advancing your career.

Assignment Requirements
You are an experienced employee of the DigiFirm Investigation Company. You’re interested in obtaining some additional training to further your career and advance within the company. You recently sent a message to your team leader, Chris, mentioning that you would like to attend a conference in the field of digital forensics.Chris responded by saying he’s all for it! To get the expense approved, he needs you to identify which conference would you like to attend and explain why. In other words, what skills or knowledge will you gain by attending?For this assignment:

  1. Research at least three applicable conferences.
  2. Write a report that describes the three conferences.
  3. Identify the one you would most like to attend and describe the specific skills or knowledge you think you would gain at this conference.

Required Resources

  • Course textbook
  • Internet access

Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages 

Core Principles

 

You have been hired as the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC to overhaul the cyber security program. In addition to local PCS information systems, the CISO is responsible for ensuring the various program managers maintain security compliance for customer systems under PCS security cognizance. PCS holds several government contracts in various regulatory environments making CISO a challenging position.

One of your first actions to improve the security program is to create a working group between the Information Technology, Engineering, and Security departments to foster better communication, address information system security challenges, and to work off action items. During this week’s working group meeting, an informative debate breaks out regarding the three core principles of information security and which one is most important: confidentiality, integrity, or availability. The working group debate stemmed from discussions regarding security protections for PCS’s new contract to overhaul the early warning missile detection system for the Ministry of Defense in Istanbogus.

Rank each of the three security principles in the order of importance for this system. Explain your rationale for each ranking to include any factors, criteria, and assumptions you made in selecting the order of precedence. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers discuss their ranking/rationale.

Discussion post

There is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important?

Assignment Requires usage of R tool for the project.

 ****Only use the following dataset for drafting the project: https://www.kaggle.com/ramjasmaurya/best-cities-and-countries-for-startups-in-2021

This is a team assignment. Each team must use the R tool to use for the project.Your team will select a dataset from Kaggle that will be used for their project.Teams will be from 1 to 3On Friday evening, teams will meet for the residency weekend and put together a one page proposal that must be reviewed and approved by the professor that states:

  1. The problem to solve.
  2. The data sources to pull from.
  3. The tool that will be used (R)
    1. Note high level graphics that will be used to solve the problem and how they will be used.

On Saturday, teams will reconvene and complete the following:

  1. There must be a through data plan this includes:
    1. Where the data is online
    2. How you know the data is accurate and the plan for ensuring accuracy.
    3. An import of the data into the selected tool.
  2. A paper that includes:
    1. The data plan mentioned above
    2. The problem- note the description and why it’s a problem and how you are going to make a recommendation with the data presented.
    3. The analysis of why the data will solve the issue.
    4. Graphical representation and formulas.  The screenshots of the formulas in the tool must be present. 
    5. A summary of the consideration and evaluation of results
      1. This includes your teams’ final analysis of the problem and the resolution.

Note: The paper and data sheet (this is the raw data that will be imported into the tool) must be turned in before the end of the day on Saturday. 

network security layers

A best practice is to thoroughly document the lifespan of a firewall. A firewall implementation procedure should prescribe the systematic process to install and configure a firewall properly. Anytime the firewall is modified, the documentation should be updated accordingly.

Answer the following question(s):

Assuming you would rarely need to reinstall a firewall, why do you think such thorough documentation is needed for installation?

Cloud computing Telehealth business.

Explain about G Suite Platform , how it is implemented in Tele Health business? 

The Mind Map must have the following 4 major topics

· Storage Products

· Database Products

· G Suite Platform

· Networking Products

Cloudcomputing

Select three topics of interest in cloud computing and note: What you learned about the topic Why you selected the topic How you will utilize the topic in the future Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved?