Big Data and Cloud Computing _ Discusion

As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

application security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

Response 3-3

Note: Please go through the attached document. we need to respond to that like whether we are agreeing or not. If yes why we are agreeing if not why we are not agreeing. 

Need it in APA format with peer reviewed references.

Password complexity policy (Cybersecurity)

 For this week’s discussion,explain the purpose of a password complexity policy.  Give an example of a complete one that you may have used or have seen used.  Also, give an example of one that is not complete and where there may be holes that could cause issues.  Give full details of each example.  

Assignment

 Discussion #1: What are some of the major privacy concerns in employing intelligent systems on mobile data? 

Discussion #2: Identify some cases of violations of user privacy from current literature and their impact on data science as a profession. 

cc-17

 

Write a brief reflection on this Cloud Computing and on how it will aid your professional career and development.

  • How will this  Cloud Computing impact your professional objectives?
  • What were the major work-related lessons that you learned?
  • How will this  Cloud Computing prepare you for further studies related to your chosen Software career?

Cybersecurity Planning

1. Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. 

Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

2. Some common biometric techniques include:

Fingerprint recognition

Signature dynamics

Iris scanning

Retina scanning

Voice prints

Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Cloud Computing

1) Identify and define at least three Cloud Deployment Models.  What are their characteristics? What are the pros and cons?

2) There are three common Cloud Service Models.  Define one and identify at least three cons and three pros for that particular Cloud Service Model. 

TextBook

Jamsa, K. A. (2013). Cloud computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. Burlington, MA: Jones & Bartlett Learning.

Erl, T., Mahmood, Z., & Puttini, R. (2014). Cloud computing: concepts, technology, & architecture. Upper Saddle River, NJ: Prentice Hall.

Discussion

 Discussion (Chapter 9): What are the common business problems addressed by Big Data analytics? In the era of Big Data, are we about to witness the end of data warehousing? Why?