Cloud Computing week 6

 Discussion Topic: Define and describe cloud-based collaboration. What are the advantages and disadvantages? 

Paper Topic

Topic: The CIO of Ace Accounting Services suggests that the company can save considerable money using VoIP for phone calls. Define and describe VoIP. Then present three companies that provide VoIP offerings. Compare and contrast each company’s offering. Also, discuss whether or not you agree with the CIO and justify why.

Paper requirements:

  • Minimum 900 words (excluding title page, table of contents, and references pages)
  • Minimum of 3 references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

Please use attached APA 7 format especially for REFERENCES, TABLE OF CONTENTS.

Research Paper

 After reading the provided article attached article.

Please do research on the Daubert standard (https://en.wikipedia.org/wiki/Daubert_standard) and the Frye standard (https://en.wikipedia.org/wiki/Frye_standard). I strongly recommend doing additonal research as well.

Then your deliverable in this assignment is a 2-page report (no more than 3 pages please) discussing how you would approach either (a) analyzing a new mobile forensics tool (2) what are the most important elements to you and (3) how you would justify your approach. Please be sure to:

1.    Outline and discuss the methodology that you will use.
2.    Provide a reasoned argument as to why the particular methodology (or methodologies) chosen is relevant.
3.    Identify key facts and identify key considerations to consider from a technical / forensic standpoint that the company should consider.
4.    Identify key facts and identify key considerations to consider from a legal standpoint that you should consider.
5.    Discuss in detail (step by step) the process that you will use to collect evidence and discuss the relevant guidelines that need to be followed when collecting digital evidence.
6.    Be sure to back your reasoning with case law as applicable. 

Cloud computing

Define and describe business continuity.
Define and describe disaster recovery.
Explain the differences between the two using at least 2 scholarly resources in APA format. Finally, provide a real world example of both

2-3 pages at least and no plagiarism.

Research Paper: Big Data and the Internet of Things

The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data.

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library(https://www.ucumberlands.edu/library) is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

object oriented programming java

 

Simulate the functioning of a network interface. An interface has a MAC address (a String). Computers (threads) send ethernet frames to the network interface input which is a waiting queue. Computers send frames every 1 second. Each frame contains a message and a destination address.

The network interface controller (thread) gets the frame from the queue and checks if the destination address is the same with the network card address. If they are they are different the packet is dropped. If they are the same the controller displays on the screen “Frame with message was accepted. Every 5 seconds the controller outputs on the screen statistics : how many frames were accepted, how many were dropped.

In main test the program with 100 computers, each sending 10 frames and a network interface card. Solve the concurrent access to shared resources using objects lock, wait and notify.

Computer science

What hardware architectures are not supporter by red hat?

Which command is used to remove a directory in linux?
What post does squid listen by default?

Discussion 1 response : Disaster Recovery

Module 1 Discussion Question

Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion within the past 5 years? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in place to protect against the intrusion?

You must write about a real-life network/system attack that you found through your internet research.  Failure to discuss a targeted attack and cite/reference the news source will result in a 0 for this entire discussion. 

I am adding my classmate’s response for the above question. You will have to write response for each post in 150 words. No references needed. 

Discussion 1:

 

Technological growth and the internet age has brought with it increased cases of cybercrimes where cybercriminals target personal information of governments, private firms, and even individual consumers. The value of data and its sensitivity to persons who own it have made cybercrimes and system intrusions very costly for the victims.

In 2017, Equifax broke the news of the system intrusion it had suffered as a company and the resultant exposure of data for approximately 143 million citizens of the United States. The other citizens who had been affected were UK citizens and Canadians, whose specific numbers were not revealed. The breach was noted to have affected online web application only with core consumer database untouched. The information targeted the names, dates of birth, residential addresses, social security numbers, and driver’s license numbers of the consumers.

The company responded to the breach by setting up a website from which customers would be able to tell if they were affected and the potential impact that it may have if their data was accessed (Nurse, 2017). Other measures included the company asking customers to register with their TrustedID premiere, which is a service used in credit monitoring from which they had to agree to a compulsory arbitration clause that would not apply to claims that may have originated from the security breach.

In the wake of the attack, and in a bid to forestall such attacks in the future, Equifax employed a new chief information security officer and rolled out comprehensive efforts to change their approach to data security. Equifax also invested more than $200 million on infrastructures that would help in securing user data, and the chief information security officer since reiterated that the company had allocated him enough resources to ensure they build hack-proof security systems. The company in the process prioritized fundamentals, and essential projects first given the need for an overhaul of most systems like vulnerability management and patching processes.

Discussion 2:

 

A network intrusion system from being hijacked and used, the computer equipment must have the ability to be disconnected from the network. The type of computer equipment used is very important. The most common computers used in intrusion systems are laptops which run Windows operating system. In this case, the network intrusion system would monitor the laptops which are connected to the network but it would not be able to determine any identity of the computers that are being used in the network. When a computer is not present in the network and a computer is not in the network, the intrusion system does not interfere with the operation of the network. (Alhadad, R. 2019).

A network intrusion system to be successful, there must be an entry in the intrusion database called network intrusion. This entry has to contain detailed information like IP address, MAC address, hostname, ports that are used, and all the traffic traffic that is flowing through that entry. This is an attack scenario when the attack has a purpose, and has an objective, and has a target. In an attack situation, this is a threat scenario. In an intrusion scenario the attack is carried out by a hacker using malware, or a Trojan, on a computer. The computer has become compromised. Once the computer has become compromised, the hacker enters the network and creates the network intrusion rules on the compromised computer. The computer can now be used as a target for an attack. DANE This is an intrusion system that intercepts the data traffic on the network. It looks the computers, then sends the information in the email. This is the system that can be used for monitoring the computers that are being monitored. If the intrusion system detects any login attempts from unauthorized computers, it is supposed to shut down the unauthorized users. This way, the intruder will not be able to break into your network and compromise your personal data. Network intrusion systems are very useful in preventing and containing network intrusions. These intrusion systems are installed on computers that are connected to the local network and to the internet via a firewall or router. (Poornachandran, P. 2018). 

Cloud Computing – Virtualization

 

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. .

 

Final_Assignment

1. In CLIQUE, the threshold used to find cluster density remains constant, even as the number of dimensions increases. This is a potential problem since density drops as dimensionality increases; i.e., to find clusters in higher dimensions the threshold has to be set at a level that may well result in the merging of low-dimensional clusters. Comment on whether you feel this is truly a problem and, if so, how you might modify CLIQUE to address this problem.

2. Name at least one situation in which you would not want to use clustering based on SNN similarity or density.

3. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

4. We take a sample of adults and measure their heights. If we record the gender of each person, we can calculate the average height and the variance of the height, separately, for men and women. Suppose, however, that this information was not recorded. Would it be possible to still obtain this information? Explain.

5. Explain the difference between likelihood and probability.

6. Traditional K-means has a number of limitations, such as sensitivity to outliers and difficulty in handling clusters of different sizes and densities, or with non-globular shapes. Comment on the ability of fuzzy c-means to handle these situations.

7. Clusters of documents can be summarized by finding the top terms (words) for the documents in the cluster, e.g., by taking the most frequent k terms, where k is a constant, say 10, or by taking all terms that occur more frequently than a specified threshold. Suppose that K-means is used to find clusters of both documents and words for a document data set.

(a) How might a set of term clusters defined by the top terms in a document cluster differ from the word clusters found by clustering the terms with K-means?

(b) How could term clustering be used to define clusters of documents?

8. Suppose we find K clusters using Ward’s method, bisecting K-means, and ordinary K-means. Which of these solutions represents a local or global minimum? Explain.

9. You are given a data set with 100 records and are asked to cluster the data. You use K-means to cluster the data, but for all values of K, 1 ≤ K ≤ 100, the K-means algorithm returns only one non-empty cluster. You then apply an incremental version of K-means, but obtain exactly the same result. How is this possible? How would single link or DBSCAN handle such data?