Discussion

 Many experts predicted that small, local ISPs would disappear as regional and national ISPs began offering local access. This has not happened. Why? 

Discussion question “Conflict with Teams”, 350 words and 2 references.

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Cloud Computing Discussion 2

  

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

configuring

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Physical security

Topic:Response in physical security (research paper)

  

•10-12 pages (not including title, TOC, references, and any appendices)

•Double spaced APA style

•At least 10 references

At least 5 of your references must be scholarly peer-reviewed articles

  

•The purpose of the research paper is to associate controls (administrative, technical, and physical) with your assigned physical security goal.

•Some items that need to be addressed are:

–Associated Threats

–Policies

–Procedures

–Plans

–Guidelines and standards

–Appropriate controls

–Issues and concerns for different industries

–Business continuity and risk mitigation

–Budgetary concerns

  

•Find and review peer-reviewed scholarly articles concerning the access control and the associated industry

•Find and review other information that associates with your topic area

•Apply research from articles on chosen topic area to create research paper

BI and Chryptography

Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. (250 to 300 words)

Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)

1.What is an artificial neural network and for what types of problems can it be used?

2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?

3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.

6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

7.List and briefly explain different learning paradigms/ methods in AI.

8.What is representation learning, and how does it relate to machine learning and deep learning? 

9.List and briefly describe the most commonly used ANN activation functions.

10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

operations security

 

Identify one key concept that you learned in chapters covered through week 3 that you think is important for your professional career.  Write a 2 page paper on the concept you chose.  In your paper, cover these key points:

  • Full describe the concept you identified from what you learned so far.  Be very detailed and pretend you are explaining the concept to someone who knows very little about it.  Be sure to include citations to sources from the library and textbook.  You will need to use APA format. 
  • Identify how you will apply the concept to the job you have or that you aspire to achieve.  Be very specific about the job role and tasks
  • Tell why you think knowledge of this concept is important.

Reflect deeply when you write this paper as this a personal reflection and not just a research paper on the topic.   Think about how you will apply what you learned and your writing will be evaluated on the quality of your reflection on your chosen topic.   Describing how you will apply what you learned is a very important part of this assignment. 

Project #2: Securing Digital Government Services

  

Project #2: Securing Digital Government Services

For this paper, you will research potential and existing security issues affecting digital government websites. Government websites enable customers to enroll in programs and services, check the status of benefits, and receive information about the federal government’s activities. Your audience for this research report is the Chief Information Officer for a small federal agency who asked for assistance in developing a risk assessment and risk mitigation strategy for the agency’s digital government websites.

Note: this research report is separate from the report you previously prepared about OPEN data and may not reuse information from that report. This paper must address other types of government services. See Table 1 for the list of websites to use in your research.

For this report, you should begin by reviewing three or more specific digital government websites (from the list provided in Table 1) to determine:

(a) the types of information provided by the websites

(b) the types of services provided by the websites

(c) security issues which could impact the delivery of digital government services by the websites

After you have reviewed these websites, review the Federal Cybersecurity Risk Determination Report and Action Plan https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-FINAL_May-2018-Release.pdf to identify additional sources of risk that the agency must be aware of and should address in its planning. You should also review Executive Order 13800 Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/ 

Table 1. List of Digital Government Websites

  

Base URLs

 

BENEFITS.GOV

CANCER.GOV

CONSUMERFINANCE.GOV

DATA.GOV

 

DIGITALGOV.GOV

DISASTERASSISTANCE.GOV

FOODSAFETY.GOV

GRANTS.GOV

 

HEALTHCARE.GOV

HEALTHFINDER.GOV

MEDICARE.GOV

READY.GOV

 

RECREATION.GOV

REGULATIONS.GOV

RESEARCH.GOV

SAFERCAR.GOV

 

SERVE.GOV

STOPFAKES.GOV

USA.GOV

VOLUNTEER.GOV

  

Research:

1. Read / Review the Weekly readings

2. Research three or more attacks that could compromise the security of a Digital Government Website that uses Web Applications, a Web Server, and a Database Server. Here are some sources to get you started:

a. Web Applications Architectures and Security (in the Week 3 content module).

b. Cyber Vandalism — https://www.digitalgov.gov/resources/readiness-recovery-response-social-media-cyber-vandalism-toolkit/ 

c. Cybersecurity: Actions needed to address challenges facing federal systems (GAO 15-573T) http://www.gao.gov/assets/670/669810.pdf 

3. Review three or more websites that deliver digital government services (select from those listed in Table 1). What types of information or services are available via these websites? What population do these websites serve (who is in the intended audience for each website)?

4. As part of your Digital Government websites review, determine the types and sensitivity of information collected, displayed, processed, and stored by the Web applications that implement the Digital Government services. 

a. See http://www.digitalgov.gov/resources/checklist-of-requirements-for-federal-digital-services/ for general security and privacy requirements. 

b. See FIPS 199 for additional guidance on determining the sensitivity level of a Federal IT system. (See the section on public websites.)

5. Using FIPS 200, the NIST Cybersecurity Framework, and NIST SP 800-53, research the general types of security controls required by IT systems hosting the Digital Government service that you reviewed. 

a. FIPS 200 https://doi.org/10.6028/NIST.FIPS.200 

b. NIST Cybersecurity Framework https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf 

c. NIST SP 800-53 https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-53r4.pdf 

6. Find three or more additional sources that provide information about best practice recommendations for ensuring the security of the Web Applications used to deliver Digital Government information and services. These additional sources can include analyst reports and/or news stories about recent attacks/threats, data breaches, cybercrime, cyber terrorism, etc. that impacted the security of digital government services.

  

Write:

Write a five- to seven-page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview of digital government that provides definitions and addresses the laws, regulations, and policies that require federal agencies to provide information and services via the Web. This introduction should be suitable for an executive audience.

2. An overview of the information and services provided by the digital government Websites that you reviewed.  Answer the following questions:

a. What types of information or services are available via your selected Websites? 

b. What populations do the websites serve (who is the intended audience)? 

c. What sensitivity level are applicable to each Website (use FIPS 199 criteria).

d. What security issues did you observe during your review?

3. A separate section that addresses the architectures and security issues inherent in the use of Web applications when used to deliver the services provided by your selected digital government Website. Include 5 or more examples of security issues and address how these issues contribute to increased risk. 

4. A separate section that includes recommendations for best practices for ensuring Web application security during the design, implementation, and operation of digital government websites. Include five or more best practice recommendations in your recommendations. (Hint: at least one of your recommendations should address use of the NIST Cybersecurity Framework. Another recommendation should address use of NIST SP 800-53 controls for ensuring security and privacy.) 

5. A closing section in which you summarize your research and your recommendations.

Submit for Grading 

Submit your work in MS Word format (.docx or .doc file) using the Project 2 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5- to 7-page paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Course Resources > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. You can find APA formatting guidelines and examples under Content > Course Resources > APA Resources. You can use the provided APA template file (MS Word format) CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be a separate page at the end of your file. These pages do not count towards the assignment’s page count. 

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct, and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). 

JSON object with five elements

Create a JSON object with five elements. Explain the definitions of object serialization and deserialization. Write and explain the Python code to apply these concepts to the created JSON object.

Demonstrate how to explain these concepts to the created JSON object.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

You are required to reply to at least two peer responses to this week’s discussion question and/or your instructor’s response to your posting. Your replies need to be substantial and constructive in nature. They should add to and evaluate/analyze the content of the post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.