describe how you would go about ensuring the security of data stored on a public blockchain. Assume that your blockchain app is one that manages prescription drugs for individual patients. Considering each of the elements of the CIA triad, describe how you might protect the blockchain data security. Write three questions.
QUANTITATIVE Journal Article Review
Subject: Infer Stats in Decision-Making (DSRT-734)
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is Cyber Security. There are no hard word counts or page requirements as long as you cover the basic guidelines. Must be original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.
Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
Discussion
Discussion 1 (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations
Equifax Data Breach
WHAT ARE THE CAUSES OF Equifax Data Breach .YOU HAVE TO WRITE 2PAGES FOR ASSIGNMENT IN APA FORMAT ?
discussion 11/07
Discuss how your employer prepares to establish, maintain, and execute your temporary work area to reestablish or maintain your business operations. You can use information from your employer, outside research, or your personal work experiences as your basis for this discussion.
400 words.
BI
1. Discussion (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
2. How do you describe the importance of data in analyt-ics? Can we think of analytics without data? Explain.
3. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
4. Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
5. What are the most common metrics that make for analytics-ready data
6. Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu-cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
internet security
You are a security specialist and have been asked to provide a presentation to the CSU Medical Center. Your audience consists of medical receptionists, doctors, and finance personnel. Summarize the concepts of the threat triad and C-I-A triad on how patient information is handled by the different jobs within the medical facility. Hint: Does the receptionist need billing information, or the finance department need patient prognosis, or do doctors need patient addresses? Explain who needs what information and how C-I-A helps protect that information.
Your completed PowerPoint presentation should be 8 to 10 slides in length.
Interpersonal Communication Principles
Discuss principles that govern interpersonal communication interactions. In MS Word, list the 5 principles of interpersonal communication. Then choose one principle and share an experience you have had that illustrates or is an example of that principle. Explain why your example fits the criteria for that principle.
Write at least 2 paragraphs to address this question
CSCI 352 Project #1 Understanding RSA
I want to get this coding done. You can choose the code between Java or C++.
Access Control and SSO
What is Access Control?
What is SSO and what are some of parts and types of Access Control?