AI and ML

 Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not. 

Malware Analysis & Mitigation

 

Assignment:
Provide a reflection of at least 500 words (or 3 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a  word (or 3 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. This assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

help3

if you are not an expert on the topic don’t bid.

further guidelines will be provided on chat.

see file attached.

Week 5 Assignment

  

Discussion 1 (Chapter 8): Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?

Discussion 2 (Chapter 9): What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

1.How does prescriptive analytics relate to descriptive and predictive analytics?

2. Explain the differences between static and dynamic models. How can one evolve into the other?

3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?

4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.

Exercise 

Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.

1.What is Big Data? Why is it important? Where does Big Data come from?

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?

3. What is Big Data analytics? How does it differ from regular analytics?

4. What are the critical success factors for Big Data analytics?

5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?

Exercise: 

At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.

Querries

  

1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).

2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence?  Why or why not? (300 Word)

ETCM-RESEARCH-DISCUSS-7

DISCUSSION:

Should be between 250-to-300 words. 

DUE DATE: Wednesday End of Day USA time (3 days from now)

Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO) 

DUE DATE: Saturday End of Day USA time (6 days from now)

Topic:

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail

RESEARCH:

Need this research paper by Friday USA time. (5 days from now).

7 pages without references and  cover page. Follow APA 7 format and citations.

TOPIC:

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements:

  • Be approximately seven pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Journal Assignment

 Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

Discussion:

 You installed and set up a Bitcoin Wallet last week(watch the above link). Do you plan to use your wallet to buy or sell merchandise or services? If so, what do you plan to do with your Bitcoin? If not, describe why you don’t want to use Bitcoin. Will your plans change in the future? 

Write 200 words paper.

N Discussion

Please review the following two papers:

Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37. 

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live

Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6.

Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live

Discuss the “Legal Protection for Bitcoin users in E-Commerce.” Provide use cases as examples and citations.

You must do the following:

 1) Create a new thread. As indicated above, please discuss “Legal Protection for Bitcoin users in E-Commerce”.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

RUBRICS

  1. Total grade points: 300/300
  2. Create a new thread. As indicated above, please discuss “Legal Protection for Bitcoin users in E-Commerce”. 50/50
  3. AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 150/150
  4. Conclusions & References: States a conclusion that is a logical extrapolation from the analysis of evidence/data presented. 100/100pt
  5. Conclusion = 50; References = 50

Also I need comments for posting to 3 other students which should be atleast 150 words each comment.