Business Conti Plan & Disaster Recovery Plan

1. When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

2. What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Cryptography Project

Papers are typically 10 pages (content) length and presentation times vary on class (typically 10 – 15 minutes). Each group member should participate in both portions of the assignment. I expect an additional 2-3 pages for figures, tables, and references.  Thus total is 12-13 pages APA format.

Be sure to review with students that APA format is REQUIRED. 

Research Topics:

1. Cryptographic Applications for City Government

2. Cryptography in Internet of Things

3. Using Crytpographic in Everyday Use for Persoanl Device

4. Need for Establishing National Agency for Cryptography in [Select Country This is Not Present – Central European Country]

5. Cryptography Needs to Personal Use

6. Need for Crypgraphy in [Selected Country]

You will cite the following items in your paper submission.

Abstract

Examined are the three core themes: the role of education in cybersecurity, the role of technology in cybersecurity, and the role of policy in cybersecurity. These topics are essential for organizations seeking to establish environments that allow them to be successful irregardless of location while examining external and internal conditions. This study examined the research gaps within cybersecurity as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cybersecurity use. This work illustrates how cybersecurity can be broken into these three core areas and used together to address issues such as developing training environments for teaching real cybersecurity events. It will further show the correlations between technologies and policies for system Certification and Accreditation. Finally, it will offer insights on how cybersecurity can be used to maintain wirelessly security for international and national security for global organizations.

Abstract

This thesis examined the three core themes: the role of education in cyber security, the role of technology in cyber security, and the role of policy in cyber security in which the papers are published. The associated works are published in referred journals, peer reviewed book chapters, and conference proceedings. Research can be found in the following outlets; 1. Security Solutions for Hyperconnectivity and the Internet of Things, 2. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention, 3. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 4. International Journal of Business Continuity and Risk Management, 5. Handbook of Research on 3-D Virtual Environments and Hypermedia for Ubiquitous Learning, 6. Information Security in Diverse Computing Environments, 7. Technology, Innovation, and Enterprise Transformation, 8. Journal of Information Systems Technology and Planning, 9. Encyclopedia of Information Science and Technology. The short comings and gaps in cyber security research is the research focus on hypeconnectivity of people, and technology to include the policies that provide the standards for security hardened systems. Prior research on cyber and homeland security reviewed the three core themes separately rather than jointly. This study examined the research gaps within cyber security as it relates to core themes in an effort to develop stronger policies, education programs, and hardened technologies for cyber security use. This work illustrates how cyber security can broken into these three core areas and used together to address issues such as developing training environments for teaching real cyber security events. It will further show the correlations between technologies and policies for system Certification & Accreditation (C&A). Finally, it will offer insights on how cyber security can be used to maintain security for international and national security. The overall results of my study provide guidance how on to create an ubiquitous learning (u-learning) environment to teach cyber security concepts, craft polices that affect secure computing, effects on national, and international security. The overall research has been improving the role of cyber security in education, technology, and policy.

BI_Assignment_3

Discussion: 
1. How do you describe the importance of data in analytics? Can we think of analytics without data? Explain.
2. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
3. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
4. What are the most common metrics that make for analytics-ready data?

Exercise:

12: Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education,
climate to public safety. Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site.
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
 

Be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
 

Assignment

 Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 

PowerPoint Career Presentation for ADN (Nursing)

  

Create a PowerPoint presentation about the career you are planning to pursue after graduating. Use the following criteria:

  • The presentation should include information about a specific career including the education needed, salary expected, job responsibilities, etc.
  • It is important to review the attached PowerPoint Dos and Don’ts file
  • The presentation must contain a minimum of six slides to include a title slide containing your name and the career that your presentation is about, at least four content slides, and a summary slide at the end
  • Apply an appropriate theme to the presentation
  • Use slide layouts that will effectively present the content
  • Keep in mind the 7 x 7 rule:  use a maximum of seven lines of text per slide and not more than seven words per line
  • Modify text alignment and line spacing as necessary
  • Include at least two pictures in the presentation; apply a picture style to each picture
  • Add a footer to all slides, except the title slide, that includes the slide number and your last name
  • Apply one slide transition to all slides
  • Save the presentation as Your Name Career PowerPoint

R exercise

This is the R exercise from the first lecture.

As discussed in class please submit the following:

The R code & line plot of the boys, girls and total all on the same plot and in separate color.  Do not foreget Title and axes labels and Chart legend

Complete R lab Assignment as per Instructions in Class.

https://cdn.inst-fs-iad-prod.inscloudgate.net/181b95eb-37bf-43a2-ac63-81cd33f19840/Lecture%201.R?token=eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCIsImtpZCI6ImNkbiJ9.eyJyZXNvdXJjZSI6Ii8xODFiOTVlYi0zN2JmLTQzYTItYWM2My04MWNkMzNmMTk4NDAvTGVjdHVyZSUyMDEuUiIsInRlbmFudCI6ImNhbnZhcyIsInVzZXJfaWQiOiIxMDEyNDAwMDAwMDAwMTI3NzYiLCJpYXQiOjE2MDQyODc5ODEsImV4cCI6MTYwNDM3NDM4MX0.IrsQ2YaOqooI-cHS4mLplBqtXM_HV_E1qzK5M4-lOpnZxsmKj17v_Cnme5UY4QFT9O7xtn4MGtkf2QV0jHA3FQ&download=1&content_type=null

Digital Forensics Tools and Tech – New England

 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Create summary tables that address relevant factors related to COVID-19 (Must have idea on Visualizing tools like Tableau, R datasets)

Academic Research Team Project Paper

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.