Word Document 1 Page

You have to conduct informed analysis and opinion of whether the compliance laws, IP laws, forensic investigations—benefits or/and hurts affect the organization. Assume the role of information security and privacy risk consultant in this section.

Equifax Company name

Discussion week 2 – Information Governance

Question:  

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References***

No Plagiarism********* 

What are browser cookies?

Cybersecurity & Web Browsing 

 

  • Describe what browser cookies are, where they are located in the software, and what type of information would be stored in them.

300 words

due 5/7/21

Research Findings

Please go through chapter 1-3 and then write the draft of chapter 4 with Research Findings.

Note: Please do not use the document for other posts.

Database Systems – Discussion

Consider the ER diagram shown in Figure 3.22 for part of a BANK database (also below for reference). Each bank can have multiple branches, and each branch can have multiple accounts and loans.

(a) List the strong (nonweak) entity types in the ER diagram.

(b) Is there a weak entity type? If so, give its name, its partial key, and its identifying relationship.

(c) What constraints do the partial key and the identifying relationship of the weak entity type specify in this diagram?

(d) List the names of all relationship types, and specify the (min,max) constraint on each participation of an entity type in a relationship type. Justify your choices.

– apa

– 2 pages

Image Captioning using Neural Networks

Image Captioning ( Use Python Jupyter Notebook )

—————–

Prepare one python notebook to build, train and evaluate model (TensorFlow or TensorFlow.Keras library recommended) on the datasets given below.

Image Captioning is the process of generating textual description of an image. It uses both Natural Language Processing and Computer Vision to generate the captions. The dataset will be in the form [image → captions]. The dataset consists of input images and their corresponding output captions.

Data Processing

—————

Read the pickle file (https://drive.google.com/file/d/1YX_ossqpLuYZxER4b91eFphhKRTf3U6H/view?usp=sharing) and convert the data into the correct format which could be used for ML model. 

Pickle file contains the image id and the text associated with the image.

Eg: ‘319847657_2c40e14113.jpg#0tA girl in a purple shirt hold a pillow .

Each image can have multiple captions.

319847657_2c40e14113.jpg -> image name

#0 -> Caption ID

t  -> separator between Image name and Image Caption

A girl in a purple shirt hold a pillow . -> Image Caption

Corresponding image wrt image name can be found in the image dataset folder.

Image dataset Folder : https://drive.google.com/file/d/1AZ213vTwLTzRLqbuh-zpv8Jkl_-N2_2m/view?usp=sharing

Plot at least two samples and their captions (use matplotlib/seaborn/any other library). 

Bring the train and test data in the required format. 

Model Building

—————

Use Pretrained Resnet-50 model trained on ImageNet dataset (available publicly on google) for image feature extraction.

Create 5 layered LSTM layer model and other relevant layers for image caption generation.

Add L1 regularization to all the LSTM layers. 

Add one layer of dropout at the appropriate position and give reasons. 

Choose the appropriate activation function for all the layers. 

Print the model summary. 

Model Compilation

——————

Compile the model with the appropriate loss function. 

Use an appropriate optimizer. Give reasons for the choice of learning rate and its value.

Model Training

————–

Train the model for an appropriate number of epochs. Print the train and validation loss for each epoch. Use the appropriate batch size. 

Plot the loss and accuracy history graphs for both train and validation set. Print the total time taken for training. 

Model Evaluation

—————

Take a random image from google and generate caption for that image.

RP

We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Defense in Depth

A common model for security is called “Defense in Depth.” As the name might suggest, this is recommending a layered approach to security with multiple security protections in line between the item of value and any potential attacker. Pick some item of value (data), describe the data and its value, and suggest a set of security protections you would recommend that are in line for adequate defense in depth.  

       Parameters 

  • Posts should be 250 to 300 words in length
  • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
  • All sources should be used in the content of the post using APA format

Big Data and Blockchain Technology

Question 1

 The concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings . Use proper citations and references in your post.

Question 2 :

 There are several emerging concepts that are using  Big Data and Blockchain  Technology. Please search the internet  and highlight 5 emerging concepts that are exploring the use of Blockchain  and Big Data.Conclude your paper with a detailed conclusion section. The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.