Python project

 

Select a database or data set to write a report on.

Report the data set you have chosen for your final project. Give a preliminary report (a sentence or two) about why you chose it and what you expect to be able to show. Remember that you need to be able to make plots with the data, so you should have some idea of what it is you want to show in plots to help with visualization. 

Write a jupyter notebook document that explains what the data is and why it’s important. It should include code for downloading or otherwise accessing the data. It should save a relevant portion of the data in a file that is in the same folder as the notebook. It is preferred that the data file be online and that the code accesses it to perform the data manipulation and visualization work, and that the saved data file not be required to be passed with the notebook.

It should have several plots showing interesting data relationships. This can reference your reasons why the data is interesting, or it can be about some conclusions or correlations you notice.

IG W 4 D2

 

Our reading by Arinze and Ezema discusses Web 2.0. In our second discussion forum this week, please discuss how you think Web 2.0 has changed the behavior of Internet users. Do you feel the behavior change is for the good or are there disadvantages? Please discuss your thoughts on Web 2.0 including concepts of privacy and social media in a substantive, well-researched discussion thread.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

Ask an interesting, thoughtful question pertaining to the topic

  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Create a policy that will ensure all external computers that connect to Always Fresh environment are malware free

  Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

CIS5

 Explain the tasks and concepts you completed in this week’s labs. What is regression testing? How does it work, and why is it important? 

ETC W 2 D

 

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Excel Assignment

An Excel assignment with a few steps. 

I’ve attached 3 files, one for the instructions, one for the file that needs to be edited, one for the way the file is supposed to look at the end.

The instructor is very specific so please make sure you read everything very carefully.

Project1

 In this course you will prepare a project paper and summary presentation analyzing and evaluating the practical aspects of implementing information assurance change in an organization.  To begin your paper, review the systems security knowledge areas already selected for SyncSession Assignment1 (Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security).   From the best practices area selected that is of interest of you as the basis of this Project (Change Management Program), 

 

  1. Domain where the need for change (your research problem) exists.
  2. Information Assurance best practice being evaluated or selected and the justification for the selection.  You can make a problem statement and justification.
  3. Summary paragraph of why you think it is important to study the change process as it relates to your selected Information Assurance best practice.  Be sure to address how the change process impacts your research problem.
  4. Annotated bibliographic references of three of the previous articles used in your analysis.  

Policy Legal Ethics

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many?