DS dis-7

Using below links Discuss the credit card fraud detection data set.

https://www.kaggle.com/isaikumar/credit-card-fraud-detection-using-k-means-and-knn 

And You can discuss any of the following topics

Section 1: Data Exploration of the Credit Card Fraud Dataset

Section 2: Resampling for Imbalanced Data

Section 3: Logistic Regression

Section 4: Decision Tree Classifier

Section 5: Random Forest Classifier

Section 6: Voting Classifier

Section 7: K-means Clustering

BSWA9

 

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post in 300 words. Use your own words. Do not copy the work of another students.

CISO VS CIO

 

You are a newly appointed CISO who reports directly to the CIO. In the past, the security team reported directly to the CIO. One of your first initiatives was to run a penetration test against the company to better understand its security posture. The results show that the company is severely lacking in security controls, putting the company at high risk for a breach. The CIO asks you about your pen test.

Working as a group, write a 1-page role-play script in Microsoft® Word depicting a conflict that may arise as you inform the CIO of the deficiencies and how you would turn a possible conflict into a positive interaction with recommendation for information security improvements.

Include the supporting roles of the senior security manager and/or information security auditor.

Cite all sources using APA guidelines.

Submit your assignment.

Cyber security Planning and Management: D2

 In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses.

Discussion

 In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity, not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. 

Please find the sources from  https://libguides.nec.edu/az.php 

Clinical Significance

 How does a nurse know what (if any) knowledge in a research study is usable for clinical practice? What would a critical thinker look for in the evidence before deciding to change? What influence do credibility and clinical significance have on your decisions to integrate research-based evidence into your practice 

week 3 Marketing Management

a) Discuss the notion that firms should stop doing business with customers who constantly generate losses versus the notion that the customer is always right (350 words)

Research

Topic: Work breakdown structure          &       critical success factor. 

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/9574360?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27BLCN%2520631%2520Residency%2520Project.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200919T000000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20200919%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=f659424f657e31fabd4b46bea46f61a28c1d3a2e16e53a442ab2f7d674043828

aaplication: Educational support platform using blockchain

1 discussion and 1 case study

Discussion 8.1

What is the role of United States Cyber Command?  

100 words only for discussion.

Case Study 8.1

 Give a real-world case of Cyberwarfare and explain the techniques used.

Writing Requirements

  • 6-10 pages in length  (excluding cover page, abstract, and reference list)