Project part 2

  

Project Part 2: Access Controls Procedure Guide

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

§ Understand and document the purpose of each access control change request

§ Know what access controls were in place before any changes

§ Get an approval of change by management

§ Understand the scope of the change, both with respect to users, computers, and objects

§ Have evaluated the expected impact of the change

§ Know how to evaluate whether the change meets the goals

§ Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

§ Status or setting prior to any change

§ Reason for the change

§ Change to implement

§ Scope of the change

§ Impact of the change

§ Status or setting after the change

§ Process to evaluate the change

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

System Security Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

 

Consider the data flow “octopus,” as shown in Figure. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. (600 Words)

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Apply research to create original insights and/or solve real-world problems

 

How did this historic landmark case affect the scientific field of computer forensics, and the required expert testimony of forensic professionals? Your paper should assess the problem that prompted the lawsuit and draw on key points from your research to justify your views.

The complete essay should be no less than 3 double-spaced pages, conforming to APA style guidelines. Be sure to reference at least three sources outside of the course book. Ensure that the paper has a complete introduction, main body, conclusion, and reference page.

Assignment Requirements:

  1. Include a title page.
  2. Font size 10 or 12.
  3. At least 3-5 full double-spaced pages in length, not counting the title page or reference page.
  4. Includes a highly developed viewpoint, purpose and exceptional content.
  5. Demonstrates superior organization, is well ordered, logical and unified.
  6. Free of grammar and spelling errors.
  7. No evidence of plagiarism.

********** Design an app on swift language. ***********

Please develop an app to show the list of all branches of an organization. The branches should be located at different places. You can choose whatever organization you like, and it can be either realistic or fictional. For example, Walmart stores, KFC restaurants, Global Defense Initiative (fictional) bases, etc.

Business Intelligence

Discussion:  

Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples. 

Exercise:

1. Go to microstrategy.com. Find information on the five styles of BI. Prepare a summary table for each style.

2. Find information about IBM Watson’s activities in the healthcare field. Write a report.  (limit to one page of analysis) 

 The above assignments should Include an APA cover page and a reference page. 

Week 3 Assignment 3 Business Intelligence

 Chapter 5

1. What is an artificial neural network and for what types

of problems can it be used?

2. Compare artificial and biological neural networks. What

aspects of biological networks are not mimicked by artificial

ones? What aspects are similar?

3. What are the most common ANN architectures? For

what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised

learning. Explain how they learn in a supervised mode

and in an unsupervised mode.

Go to Google Scholar (scholar.google.com). Conduct

a search to find two papers written in the last five years

that compare and contrast multiple machine-learning

methods for a given problem domain. Observe commonalities

and differences among their findings and

prepare a report to summarize your understanding.

Go to neuroshell.com. Look at Gee Whiz examples.

Comment on the feasibility of achieving the results

claimed by the developers of this neural network model.

Chapter 6

What is deep learning? What can deep learning do that

traditional machine-learning methods cannot?

2. List and briefly explain different learning paradigms/

methods in AI.

3. What is representation learning, and how does it relate

to machine learning and deep learning?

4. List and briefly describe the most commonly used ANN

activation functions.

5. What is MLP, and how does it work? Explain the function

of summation and activation weights in MLP-type ANN.

Cognitive computing has become a popular term to define

and characterize the extent of the ability of machines/

computers to show “intelligent” behavior. Thanks to IBM

Chapter 6 • Deep Learning and Cognitive Computing 385

Watson and its success on Jeopardy!, cognitive computing

and cognitive analytics are now part of many realworld

intelligent systems. In this exercise, identify at least

three application cases where cognitive computing was

used to solve complex real-world problems. Summarize

Business Stratergy

 1) 350 words – Why is it critical for company managers to have a clear strategic vision regarding their organization? 

2) 1 reply of 150 words

plain view doctrine

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Denial of Service attack

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    1000 words