Week Research Paper 2 – Info Tech Strat Plan

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Intro to Data mining

 

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

 Please ensure to cite the Author, YYYY with any content brought into the discussion.   All discussions should contain at least one reference (and matching in-text citation in APA format).

week 6 individual

  Minimum 600 words

This assignment should be in APA format and have to include at least two references.

Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? 

APA formatted research for network security

report select two of the topics below to create an actionable report with a common theme below the topics selected. Your analysis should demonstrate you understand the material.  In general, each topic should be covered in 400-600 words.

  1. On your personal computer, download, install, and run Wireshark (found at http://www.wireshark.org/). Wireshark is a network protocol analyzer that let’s you capture and view network traffic. You may want to watch the videos found on that site first. With wireshark running, go to a standard website (e.g., Google, Yahoo, Amazon, etc.) and report what it shows you.  Do you see the standard TCP/IP handshake? Do you see your http traffic? How could a network administrator use wireshark?  Include screen captures of the wireshark showing your results. 
  2. On your personal computer, download, install, and run Nmap (found at http://nmap.org/). Nmap or “Network Mapper” is a free, open-source tool for network discovery, system security testing, port availability, and system monitoring. Before using nmap, you should study the Reference Guide (http://nmap.org/book/man.html). If you are using a Windows operating system, you’ll need to download ZenMap (http://nmap.org/zenmap/). For this exercise, run three different types of scans on another computer in your local network.  MAKE SURE YOU HAVE THE SYSTEM OWNER’S PERMISSION FIRST! Provide screenshots of the command used and the results.  What do the results tell you?  How can a network security administrator use a tool like nmap?
  3. Using your book and other resources from the Internet, define and discuss the following network protocols: TCP, UDP, IP, and ICMP. Include the differences between TCP & UDP and IP & ICMP. Why is this important for network security? Make sure you list any outside references in APA format.
  4. Discuss the four different types of suspicious traffic signatures:
    1. Informational
    2. Reconnaissance
    3. Unauthorized access
    4. Denial of service .
  5. Provide a detailed description of how each of the following TCP flags are utilized:
    1. SYN (Synchronize)
    2. ACK (Acknowledgement)
    3. PSH (Push)
    4. URG (Urgent)
    5. RST (Reset)
    6. FIN (Finished)

final project

 Design a Java application that will read a file containing data related to the US. Crime statistics from 1994-2013. The description of the file is at the end of this file. The application should provide statistical results on the data including:  

Need help with a Virtualization project

Installation and Running benchmarks of TOP 3 virtualization products .. preferably OS level virtualization tools like Oracle VirtualBox, VMWare Workstation etc., Please feel free to select the virtualization tools as per the present market situations.

Other artefacts needed : project report and ppt presentation.

More details provided in the attached instruction file.

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Final Project Paper

 

Your Research Project is due this week. It must consist of:

Project Topic:  Health Insurance Portability and Accountability Act (HIPAA) Compliance.

1. Summary or Abstract containing at least 750 words.

2. 5 source annotated bibliography in one page.

No Plagiarism, APA style writing required