complete by tommorrow
Organ leader and decision making
The project entails you creating your own technology roadmap based on either your current work technology map or you may create a personal technology roadmap to keep as your own portfolio.
Sample templates and websites that you may find helpful in Week 14.
The assignment should be in APA format
Malicious Activities 3.0
The three major types of malicious activities that organizations’ information systems face include:
- Hostile or malicious insider activity.
- Theft of private, proprietary, or sensitive data, by insiders or external attackers.
- Large scale DoS (denial-of-service) attacks.
Based on your research:
- Describe a present-day example of your selected type of malicious activity and its impact on the organization.
- Specify the countermeasures the organization took to address the malicious activity.
- Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.
3 page review for blockchain
Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:
1. Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.
2. Discuss the purpose and problem the article is addressing.
3. Elaborate on the content of the article.
4. Discuss the findings and conclusion(s) drawn by the article’s author.
5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.
6. Discuss the significance of the article. Why it is important? On what do you base your assertions?
7. Conclude your paper. Summarize the important aspects of the review.
8. References
Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).
BSWP Week 3
Do a bit of research on CWE, Common Weakness Enumeration.
Write a brief overview of their scoring system.
Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Cryptography(subject) – Two page assignment for explaining and identifying differences between symmetric and asymmetric encryption and identify which one is the best
In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
End search 1
Research project manager’s positions and please post the following. Please do not copy and paste from web sites.
- Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area.
- In your opinion was any of the information that you uncovered in your search interesting or surprising?
Corporate Ethics Portfolio
The corporate Board of Directors has asked you to provide a portfolio of your research into the expansion of the company into the country you presented on in Wk 4.
Include an overall corporate code of ethics based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2). Include the following in your portfolio:
- Based on the ethical challenges identified in Week 4, choose and depict 2 risks to the corporation related to each challenge in a 1-page table using either Microsoft Word, PowerPoint, or Excel.
- A 1- to 2-page corporate code of ethics using Microsoft Word based on your review of professional associations, such as IEEE, ACM, SANS, ISACA, ASIS, and ISC(2), and the ethical challenges identified
- A 1- to 2-page concise synopsis of classical ethical theories
- A 1- to 2-page process to logically evaluate ethical dilemmas as they arise with the expansion of the company into the country you have chosen. Ensure that the process reflects the code of ethics you provide; for example, your process could start with identifying which part of the code applies to a particular new dilemma and move through assessing the various choices you could make along with any resulting consequences. The end goal is to help your corporation manage complex ethical questions with a variety of stakeholders.
All references need to adhere to APA guidelines and images should not be copied unless you’ve obtained author permission or used copyright-free images.
Submit your assignment.
Hillclimbing and simulated anealing algorithms
write a hillclimbing algorithm to find maximum value of function f=|13.value(v)-170| where v is the input binary variable of 40bits and one counts the number of 1’s in v. set Max at 100 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.
Note:For this the output should be local maxima,global maxima and so on… example:350,170,350,170,350,170
write a Simulated Anealing algorithm to find maximum value of function f=|14.value(v)-190| where v is the input binary variable of 50bits and one counts the number of 1’s in v. set Max at 200 and thus reset algorithm 100 times for the global maximum and print the found maximum value for each reset separated by a comma in the output.txt file.
Describe how to run the code. Write the code in Python.
Week
Association Analysis: Advanced Concepts
Cluster Analysis: Basic Concepts and Algorithms
Please pick a concept from above and Explain why it was selected and note the various importance to data analytics.