Big data

  

Assignment # 3 is a research assignment.

We studied Apache Pig in lecture # 4. You are supposed to do online research and find out one case study where Apache Pig was used to solve a particular problem. I am expecting 4-page write-up. Please provide as much technical details as possible about solution through Apache Pig. Please draw technical diagrams to explain the solution. 

I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up.

Please draw your own diagrams and don’t go more than 4 pages in total.

Term Paper Cybercrime

 

Instructions

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 5-8 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 8.
  4. In addition to the 5-8 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  10. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

law enforcement

Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.[500 words 

How can cryptography be incorporated into a company's system,

 

For the purposes of this course, you will assume the role of the Tier 1 Cybersecurity expert. As you work through the assignments and discussions, please keep in mind that you have the responsibility to guard against cyber attacks. In doing so, a big part of your job is to be proactive about protecting against attacks. You work on a team of network professionals. Your direct report is the CIO who also answers to the Board of Directors. There are times when you will be asked to write reports, make security recommendations, and make presentations to the Board of Directors. If you do well in your responsibilities now, there may be a job advancement with significantly more pay in the near future if you can move up to a Tier 2 expert.

Unit 1 Discussion Assignment

Answer the following questions:

  • How can cryptography be incorporated into a company’s system, focusing on improved security and ease-of-use,  during the initial stages?
  • Why do you believe the plan you described for the first question will meet the initial requirements of improved security and ease-of-use? Use specific descriptions to support your reasoning.

Bitcoin Economics.

For this week’s research paper, you need to search the Internet and explain why some businesses are accepting and other businesses are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology.

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Portfolio Assignment

 

Students will create a Disaster Recovery Plan for either the organization they work for or one they wish to work for in the future.  The plan will follow the template/example provided.

 Student should request prior authorization of company to be addressed to ensure that all students are working on unique companies.

**Even though this is a technical document, for academic purposes, all sources should be cited and referenced.

***Student may modify some of the sections per the company they have selected but all students will need to complete a DR Plan for the Portfolio Requirement. 

****SafeAssign should be turned on and reviewed since it will flag a lot of the common elements but we want to make sure the students are writing the content from scratch.

Data Science and big data analysis

 Topic name:   

The Most Efficient Heart Disease Prediction using Technique of Classification in 

Machine Learning

Guidelines 

Introduction

Problem Statement

Description of Dataset

Description of model/algorithm used

Description of tools used at all stages of the Data Analytics Lifecycle

Analysis and Discussion

Conclusion

APA format with min 13 slides in presentation without cover page and references 

Apa format with 13 pages min word document without cover and references 

Week-12 discussion cpm

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?