200-250 words discussion

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.

Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts.

Discussion 1

 How will Blockchain increase transparency and accountability in marketing? 

  1. APA style- 500 words.
  2. Only Scholarly references.

Wk 3 – Security Standards, Policies, and Procedures Manual

 

Assignment Content

  1. Cyber security engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

    Take on the role of Cyber Security Engineer for the organization you chose in Week 1.

    Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template, with recommendations to management of security standards, policies, and procedures that should be implemented in your chosen organization.

    Research and include the following:

    • Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. 
    • Recommend appropriate policies and procedures for: 
    • Data privacy 
    • Data isolation 
    • NDA 
    • IP Protection 
    • Passwords 
    • Acceptable use of organizational assets and data 
    • Employee policies (separation of duties/training) 
    • Risk response 
    • Avoidance 
    • Transference 
    • Mitigation 
    • Acceptance 
    • Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative]
    • HIPPA 
    • FERPA 
    • ISO 
    • NIST 
    • SEC 
    • Sarbanes/Oxley 
    • Incident response 
    • Preparation 
    • Identification 
    • Containment 
    • Eradication 
    • Recovery 
    • Lessons learned 
    • Auditing 
    • Environmental/Physical 
    • Administrative
    • Configuration

BigData Research paper final

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Resource:  A. Ali, S. Latif, J. Qadir, S. Kanhere, J. Singh, “Blockchain and the Furture of the Internet: A Comprehensive Review”, arxiv.org, URL: https://arxiv.org/pdf/1904.00733v1.pdf?

Your paper should meet the following requirements:

• Be approximately 7 pages in length, not including the required cover page and reference page. Be sure to use proper APA formatting and citations to avoid plagiarism.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Conclude your paper with a detailed conclusion section. 

• Support your answers with the readings from the course, the course textbook, and at least 3 scholarly journal articles and at least 5 peer-reviewed articles to support your positions, claims, and observations. 

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Program Maintenance

 

Create an actionable plan including executive level support and  budget allocation to ensure security controls can be rapidly updated and  expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

  1. Procedures to track performance
  2. Procedures to monitor and measure performance for areas of improvement
  3. Procedures to identify new threats, vulnerabilities, or any countermeasures
  4. Procedures to obtain feedback on the effectiveness of policies
  5. Procedures and technical tools to monitor the internal and external environment
  6. Procedures for budget allocation
  7. Procedures to catch any oversights

APA style is not required, but solid academic writing is expected.

Refer  to ” Cybersecurity Program Maintenance Scoring Guide,” prior to  beginning the assignment to become familiar with the expectations for  successful completion.

Assignemnt

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Hardware & Software Security

Topic: Hardware & Software Security 

Abstract – Brief summary that identifies the   purpose, goal, problem, methods, results, and conclusion of your work. (Format- Introduction, Body and Conclusion). Include separate page.

Paper Format- Write 3 full-pages word, double spaced paper, written in APA format, showing sources and a bibliography.

Include this information for your research:

Purpose-

· Why did you decide to do this study or project?

· How did you conduct your research?

· What did you find?

· Why is this research and your findings important?

· Why should someone read your entire essay?

Problem-

· What problem is your research trying to better understand or solve?

· What is the scope of your study – a general problem, or something specific?

· What is your main claim or argument?

Method- 

· Discuss your own research including the variables and your approach.

· Describe the evidence you have to support your claim

· Give an overview of your most important sources.

Results-

· What answer did you reach from your research or study?

· Was your hypothesis or argument supported?

· What are the general findings?

Conclusion-

· What are the implications of your work?

· Are your results general or very specific?

References-

· Scholarly articles (ex. Harvard etc), peer-reviewed journals, publications, textbooks

Access controls

Subject: Access controls

Describe what you learned from Public Key Infrastructure and Encryption.

APA Format. 300 words

Preview the document

IT project needs

 

Instructions:

  1. Search the internet for tips on how to distinguish software needs versus software wants.
  2. From your research, summarize 3 of the most common tips.
  3. Describe in your own words what happens with a technology project that fails to define the needs of the project.
  4. Research what makes a technology solution focused and easy to use (focused on the NEEDS).

From this week’s supporting links, review Five tips for any technology project’s needsPreview the document 

  • Which one of the tips is the most important in your eyes?
  • Why?
  • Which tip is the least important?
  • Why?

DQ

Hi

cybersecurity implementation 

the techniques have to be applicable to the field of AI/Cloud

Industry-wise — related to banking/manufacturing, anything would be fine

Contents will be Abstract, Introduction, Technical Discussion, Implementation, Conclusion,