Need help in homework832

The final portfolio project is a three-part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of a blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6 pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.

Discussion Post-DNS

  In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Discussion

What is the firewall evaluation criteria for your organization? Does your organization have one and in your opinion does it addresses the overall network security or does it have gaps? Either way, talk about how it can be improved.

Discuss how the advent of AI/MI and how it may affect network security. What do you think network security will look like 5 years, 10 years, or 15 years from now. How will the cloud play into this scenario or will there be something bigger than the cloud that could affect network security?

File

Business Intelligence

 

Business Intelligence Manager Resume

Attached Files:

Friday: Reflective Assessment – Business Intelligence Resume

Saturday: Reflective Assessment – Characteristics of A Data Whisperer

Take a cursory look at this link on data whisperer…..

The data whisperer — Why you need one, and why it’s not your data scientist

Sunday: Reflective Assessment – Modern Data Scientist/Business Intelligence Manager

Example –

Review the business intelligence manager resume sample provided in this folder. Select and discuss 2 components of the Business Intelligence Manager resume that relates to your future or current job.

Your reflective assessment paper should be at least 100 words, double-spaced, and typed in an easy-to-read MS Word (other processors are fine to use but save it in MS Word format).

150 to 200 words

 
Describe the components of a decision tree in data mining. Give an example problem and provide an example of each component in your decision making tree.  Please give an APA format references as well.

Subject Data Mining 

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!

Web security

1. Write an Abstract on Sensitive Data Exposure in 300 words.

2. Write final project paper on  Sensitive Data Exposure in 500-700 words

3.  Do some research on Threat Response software. Find one particular software package to investigate in   200-300 words.

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else. 

4. Pick a topic for your research project  on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey.   Use at least five sources.  Write in essay format not in bulleted, numbered or other list format. (500 Words)

Penetration Testing Report

Prepare a plan to conduct a complete penetration testing on one or two targets.  Create a professional and well-formatted Penetration Testing Report of 5 to 10 pages following industry recommended guidelines.

For your assignment, please address the following:

  • Task 1: Best Practices are discussed in the report
  • Task 2: A planning and Pre-Attack phases are clearly addressed
  • Task 3: The Attack and Post-Attack phases are clearly addressed
  • Task 4: A Summary Conclusion and Recommendations sections are included.