12 sources- peer review articles 9-10 pages(cybersec-financial industry)
attached example
Machine Learning Iris
Write a program to apply Machine Learning classification models to Iris flowers dataset. Follow the steps:
1.Download the iris.csv file (example: https://gist.github.com/netj/8836201). From this file the label (target) is defined with the ‘variety’ column and the features with ‘epal.length’, ‘sepal.width’, ‘petal.length’, ‘petal.width’ columns.
2.Preprocess the iris.csv file by label encoding the target ‘variety’ column.
3.Apply the following Machine Learning classification models: K Nearest Neighbors and Random Forests
4.Calculate the following classification metrics to validate the model: Accuracy Score, Confusion Matrix and Classification Report.
5.Explain how the program works and compare these two classification models.
Make you follow all of them so you don’t lose any grade points because of that. Feel free to contact me for any questions you may have.
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples.
This assignment should be in APA format and have to include at least two references.
- When should the architect begin the analysis?
- What are the activities the architect must execute?
- What is the set of knowledge domains applied to the analysis?
- What are the tips and tricks that make security architecture risk assessment easier?
code of ethics for digital forensics.
Create your own code of ethics for digital forensics. If you need help writing a code of ethics, you can review the WikiHow website.
Week7
1. What are some of the potential risks involved with cloud computing?
2. Does the research and model in this article propose a viable solution to cloud-based risk management?
Discuss the impact of cloud processing environments on application security. Be sure to define cloud computing, application security, and the various types of implications.
The paper is to be between 2,000 and 2,500 words.
It must be formatted using APA style.
A least five scholarly resources must be utilized. Scholarly resources include journal articles in peer reviewed journals, textbooks, and Educational and Government websites. Wikipedia, message boards, blogs, and commercial websites are not scholarly. While you can cite a commercial website, it will not count as one of the scholarly sources. The paper will be evaluated using plagiarism scanning technology, so be careful to include citations and follow APA procedures when dealing with direct quotes. It is expected that one of the five sources will be your text.
The PowerPoint should support a 10-minute presentation.
Avoid slides with many words on it.
One tip is to not use a font smaller than 20 point.
Ensure that you have enough slides to address the topic,
Do not go over the 10-minute limit.
Include a slide that discusses who wrote what, and who presented what
EH week10 DB
Hello,
i need this paper by 10/28 afternoon.
Strictly No plagiarism please use your own words.
Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.
Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided? 300-350 words.
Reference Article Link:
https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering
Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism
IT345 8B
Find a recent article that relates to a software that has malfunctioned and caused either serious injury, death, or loss of revenue. Summarize the article and discuss whether you believe this will impact the adoption of this type of technology.
Post your reply at midnight. Your response should be at least 250 words and appropriately cite your resources.
Paper 7
Paper Section 1: Reflection and Literature Review
Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 13 and 14. This section of the paper should be a minimum of two pages.
Paper Section 2: Applied Learning Exercises
In this section of the professional paper, apply what you have learned from chapters 13 and 14 to descriptively address and answer the problems below. Important Note: Dot not type the actual written problems within the paper itself.
- Go to cloudera.com, MapR.com, hortonworks.com, or marklogic.com or in combination to find at least three customer case studies on Hadoop implementation, and then discuss the commonalities and differences of these cases.
- Search the job search sites like monster.com, careerbuilder.com, and so forth. Find at least five job postings for data scientist. Identify the key characteristics and skills expected from the applicants and based on what you are learned in this class, how high is your motivation now to seek these types of career choices?
- Important Note: With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.
Important Note: There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.
Paper Section 3: Conclusions (Part 1)
After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward. This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.
Paper Section 4: Overall Course Conclusions and Reflection (Part 2)
After the primary conclusion of this paper, extend this conclusion into an overall class conclusion and reflection providing at least 500 additional words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current or future work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Paper Section 5: APA Reference Page
The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.
Week 15 Discussion
Discussion (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.