Please read the four documents and reply back with the responses with 150 words
Cloud Computing
1.) Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.
Module 7 Case Project 13-4
To examine a cloud environment, you must have the latest knowledge on cloud encryption. Conduct online research, and write a two-page report about current vendors and services for encrypting data stored in the cloud. List the ven- dors, their products, and what type of cloud service level each tool is intended for, such as PaaS, IaaS, or SaaS.
Please do not use books or journals as references. Check for grammatical errors.
Excel work assignment
This is an Excel short assignment. I provide you with the Instructions, Start file( the file you will work in it), and the solution file(how the final project should look like)
Cybersecurity Awareness Campaign
Assignment Content
- As a final project requirement, the executive staff requested recommendations to address the following:
- Strategy for staff awareness
- Strategy for ongoing security maintenance
- The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member’s request. Your campaign consists of the following three items:
- Mission statement
- Poster campaign
- Message to organization via the intranet
- Create an approximate 90-word security policy mission statement for Dayton Soft Products.
Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission statement. Highlight at least 5 legal and ethical issues across the 3 posters. You may use any program to create your posters.
Write a message for the company’s internal website to a diverse workforce announcing the cybersecurity awareness material. You will need to submit a draft of your announcement message to the executive staff in the form of a Microsoft® Word document.
Provide the following elements in your announcement message:
- The reason why the corporate security policy was established
- A mission statement
- Employees’ role to meet the mission
- Announce launch of the poster campaign
- Large images of the three posters
- Strategies and tools for ongoing monitoring and enforcement of the security policy
Project 2 – Cipher implementation in Python
The primary goal of this project is to understand how Caesar cipher works. Here, we are using the python programming language to implement the Caesar cipher algorithm. It is not mandatory to know python in order to run the program. The main focus is to understand how the input message is converted into ciphertext with the help of encryption logic and then use a similar pattern to perform decryption. You will be provided with a python code that has implemented encryption logic. Your task is to understand the logic and implement decryption by simply writing the logic explained in the pdf file.
Emerging Threats
Introduce and discuss a relevant issue regarding Emerging Threats.
DiscusssioN
According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision or plan for your work (p.63).
Reference
Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.
Instructor’s question
Why is it so important to formulate your brief for a data presentation? Discuss some ways/things you would do to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?
Dissertation Outline
In 250-300 words outline your dissertation topic and goals for this semester as they relate to your dissertation course. If you do not have a dissertation topic please revert those you are considering. Also, include ways that you could improve your dissertation, as well as areas you may be struggling with.
Dissertation course : Inferential Statistics in Decision making
Apache Pig Hadoop Assignment1.1
Do online research and find out one case study where Apache Pig was used to solve a particular problem.
Expecting 4 page write-up including diagrams. Please provide as much technical details as possible about solution through Apache Pig.
Must:
1)Atleast 2 Technical diagrams to explain the solution. own diagrams please, not from internet.
2) Maximum one page for business problem and 3 pages of technical solution.
3) No plagiarism.
4)Deadline 24 July 4PM, only respond if you can complete it in 1 day. i had enough with some fools and they wasted a week with no work.