150 to 200 words

 
Describe the components of a decision tree in data mining. Give an example problem and provide an example of each component in your decision making tree.  Please give an APA format references as well.

Subject Data Mining 

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!

Web security

1. Write an Abstract on Sensitive Data Exposure in 300 words.

2. Write final project paper on  Sensitive Data Exposure in 500-700 words

3.  Do some research on Threat Response software. Find one particular software package to investigate in   200-300 words.

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else. 

4. Pick a topic for your research project  on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey.   Use at least five sources.  Write in essay format not in bulleted, numbered or other list format. (500 Words)

Penetration Testing Report

Prepare a plan to conduct a complete penetration testing on one or two targets.  Create a professional and well-formatted Penetration Testing Report of 5 to 10 pages following industry recommended guidelines.

For your assignment, please address the following:

  • Task 1: Best Practices are discussed in the report
  • Task 2: A planning and Pre-Attack phases are clearly addressed
  • Task 3: The Attack and Post-Attack phases are clearly addressed
  • Task 4: A Summary Conclusion and Recommendations sections are included.

ET WK6 paper

Threat Modeling —— 5 FULL PAGES

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles (PEER REVIEWED) to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

dis_dsdba13

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

CALCULUS 2 WITH PROGRAMMING

I need someone who preferably hasa degree in computer science or mathematics who has can help me with an assignment that includes calculus two and programming. Please message me if you excel in BOTH programming and CALC 2

Week 8 Status Report

 

 

Use the Week 8 Status Report Template to complete this assignment.

In Week 10, you will provide a detailed project presentation for your new information system project. Because of its importance to the  organization, your presentation must be thoughtful and visually appealing. To help you stay on track for this three-week effort, the executives have assigned you a project manager. For each week leading up to the presentation, you are expected to turn in a short (less than one page) status report.

It must address just four things:

  1. What did you expect to accomplish on the project this week?
  2. What did you actually accomplish on the project this week?
  3. What issues have arisen, and what help do you need?
  4. What do you expect to accomplish on the project next week?

Please write up your responses as a series of bullet points in memo form. There is no need for a cover page

Research paper

Write 3-5 page (excluding cover page and references) APA formatted research paper.  The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.