Policy, Legal, Ethics and Cmplc

 

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

Summary of topics

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below points for a  total 300 words (100 words for each question with three research papers as reference)

 1.  What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.

2.  What is data mining? Support your discussion with at least 3 references.

3.  What is text mining? Support your discussion with at least 3 references.

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

Project part 2

  

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Apply research to create original insights and/or solve real-world problems

 

How did this historic landmark case affect the scientific field of computer forensics, and the required expert testimony of forensic professionals? Your paper should assess the problem that prompted the lawsuit and draw on key points from your research to justify your views.

The complete essay should be no less than 3 double-spaced pages, conforming to APA style guidelines. Be sure to reference at least three sources outside of the course book. Ensure that the paper has a complete introduction, main body, conclusion, and reference page.

Assignment Requirements:

  1. Include a title page.
  2. Font size 10 or 12.
  3. At least 3-5 full double-spaced pages in length, not counting the title page or reference page.
  4. Includes a highly developed viewpoint, purpose and exceptional content.
  5. Demonstrates superior organization, is well ordered, logical and unified.
  6. Free of grammar and spelling errors.
  7. No evidence of plagiarism.

********** Design an app on swift language. ***********

Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc.