Network Security

 

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.

 https://www.schneier.com/essays/archives/1997/01/why_cryptography_is.html 

cloud computinhg

 University of cumberlands 

website :  https://www.ucumberlands.edu/ 

Create a PowerPoint brief on the topic of Academic Integrity. 

  • Cover (Course, Student Name, Date)
  • Topics (10 each – 1 Slide per topic)
    • Add graphics or screen captures
    • One slide is dedicated locating and listing at least three (3) UC resources that the university provides regarding writing assistance, avoiding plagiarism
  • Conclusion
    • A brief personal statement about your pledge to avoid academic dishonesty and what that means to you and the university (standards, morals, character, etc.)

assign

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment.  

For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

Describe the change in the time complexity of K-means as the number of clusters to be found increases.

Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

Explain the difference between likelihood and probability.

Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.

CC-12 project

   Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the Research Databases available from the Danforth Library not Google.  

Topic: “What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? “

OLDM W 2 A

 This week’s journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age.  Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts:1.Define TAM and the components.2.Note how TAM is impacting educational settings.3.Give an overview of the case study presented and the findings.Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.The paper should meet the following requirements:•3-5 pages in length (not including title page or references)•APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.•A minimum of five peer-reviewed journal articles 

https://journals.sagepub.com/stoken/rbtfl/UOAG6PEG9TBN05IGNLQU6/pdf/10.1177/1742715016649722

https://journals.sagepub.com/stoken/rbtfl/6NZC36N6XC3DSGF0ORCDVI/pdf/10.1177/1742715015571392

700 word discussion: After reading through the Chapter1 to Chapter3, Que – Who are these public servants?

After reading through the Chapter1 to Chapter3, its reasonable to state that, Koliba and Zia (2015) observed that advancements in high-speed computing, digitization of data and improved collaboration across informatics project platforms create the need for quality simulation modeling education for two types of public servants.

Question – Who are these public servants? 

identify and name the two types of public servants,

provide a narrative why it’s important for these servants to receive education.