R Language

Assignment 1 Due(Wednesday afternoon):- 

R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment – developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. Therefore, R can be considered as a different implementation of S. However, there are some important differences, e.g., code written for S runs unaltered under R.

In this week’s posts, answer the following:

  • Why are statistical programming languages important to data scientists? 
  • What are some the advantages and disadvantages that R programming language has over the other mainstream statistical programming languages (i.e. Python, SAS, SQL)?

Reply Post  (Due(Sunday afternoon)

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. 

Using at least 3 – 5 sentences, explain the strengths and/or weaknesses of your peer’s evaluation of the different statistical programming languages.

Assignment 2 Due(Sunday Afternoon):– 

  1. Expand on your discussion post with a 3 page APA formatted research paper on the following topic:
  • Why are statistical programming languages important to data scientists? 
  • What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?

Wireless Security-2

1) You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone is powered on versus powered off status.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-5 to 8

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

Discussion Questions and Case Study

Discussion 7.1

What are some of the things that you need to consider when using encryption such as Base 64?  Why?  How can you be sure you need to consider such things?  Why? 

Discussion 7.2

Describe two security controls used to prevent physical infiltration?.  Which of the two would you use?  Why? 

Discussion 7.3

If you were asked to develop a script to enter an IP Address, how would you make sure it was indeed an IP Address and Why? Create a script and display its output (leave the script in your directory for me to check.). 

Discussion 7.4

Is it important to know how to debug code? 

If so, Why? 

If not Why? 

Case Study 7.1

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a location that you would like to physically infiltrate.  List the areas you would need access to and the methods you would use to get access given the list of different security controls that could be in place.  Also, provide examples of ways you would avoid detection if confronted by someone at the location you are trying to infiltrate.    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 7.2 

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a use for Base64 that involves the sending of encrypted letters. List some of the reasons you would need to use Base 64 and the methods you would use to send Base 64 messages  Also, provide examples of ways you would avoid detection if confronted by someone who gained access to your Base 64 encrypted letters..    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance.

 

Required Reading:

Read URBONAVIČIŪTĖ, K., & MAKNICKIENĖ, N. (2019). Investigation of Digital Retail Companies Financial Performance Using Multiple Criteria Decision Analysis. Science: Future of Lithuania, 11, 1–9. https://doi.org/10.3846/mla.2019.9737

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=141392864&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Assignment:

This week’s journal articles focus on the digital retail sector and how it is constantly growing each year. The case study/article reviews the top four digital retail company’s financial performance. After reviewing the reading, please answer the following questions:

  1. Present an overview of the top four digital retail companies.
    1. Note who they are and how they became the top four digital retail companies.
  2. Please review at least two other digital retail companies that are new in the market, note what you think they would have to do to obtain market share based on what you’ve learned this week.
    1. In response specifically list at least three key factors that would influence the success of the digital retail company, please be specific.
    2. Note a specific market that would thrive given the current market conditions and why.
    3. Discuss how innovation technology will influence the success of this new business.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

· 5  pages in length (not including title page or references)

· APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

· A minimum of five peer-reviewed journal articles.

MAC, DAC, RBAC

 

Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Tokenization

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols. Post should be minimum of 300-350 words.

Discussion

 Need 400 words

By October of 2017, Yahoo estimated that 3 billion user accounts were compromised. Users’ passwords in clear text, payment card data and bank information were not stolen. Yet, it remains one of the largest data breaches.

What that teach us as a security professional and as regular user ?