Create data visualization

For this project, you are going to become an educational advisor for a fictional educational institution.  The Vice President of Instruction of the institution has provided you with the raw data of the assessment scores of their students’ final exam in their GED Preparation Course.  The course consists of scores in mathematics and English and Pass or Fail Overall Score.  There is also information in regard to the demographics of the students.

Based on the raw data that you have been provided, you are going to develop a   presentation using visuals of the data that have been provided.  You are going to make recommendations to the Vice President of Instruction of the University of suggested improvements that can be made based on your analysis of the data that has been provided to you.

Within   your data presentation include:

A   variety of graphics that illustrate the represented data

An   explanation of what each graphic represents

Explain   how the graphics should be interpreted (include a key)

Finally,   summarize your analyzation of the data and provide the VP with some suggestions to improve the quality of instruction within the school.  Refer to your visuals within your summary.

For this assignment, you can use any method that you want to use.  Some students use Microsoft Word, some students have used Powerpoints.  

Please make sure that you look at the example that is also attached!!

Select one network scanning software tool and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

 Select one network scanning software tool (there is a list in your required reading slides, you can find the slides in attachments. ) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Please write 350 words essay.

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

 

OVERVIEW

This week we will be examining the range of industries in which sensitive, protected, or confidential data is copied, viewed, shared, stolen, altered or blocked.

Cyber Foundations

 

Application Assignment 2 – Krebs on Security

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  
 

3 questions

  

1) What are some of the industry standard certifications that exists.  Which ones are the most sought after in the IT security field? 350 words.

2) Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 300 words

3) Securing IoT Devices: What are the Challenges? 1000 words

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

Case study

 Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations. 

computer security

 

Using the Web or other resources, find out what your state’s laws are regarding cyber stalking.

Write a brief essay describing those laws and what they mean.

250 words and 2 references

written assignment

 Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? 

Assignment 8

Please work through the following tutorials located at the following locations:

Python is a great language for doing data analysis, primarily because of the fantastic ecosystem of data-centric Python packages. Pandas is one of those packages, and makes importing and analyzing data much easier. Pandas builds on packages like NumPy and matplotlib to give you a single, convenient, place to do most of your data analysis and visualization work. In this python data science tutorial, you’ll use Pandas to analyze data on video game reviews from IGN, a popular video game review site. The data was scraped by Eric Grinstein, and can be found here. As you analyze the video game reviews, you’ll learn key Pandas concepts like indexing.

Exercise 1 Link: https://www.dataquest.io/blog/pandas-python-tutorial/

You need basic Python knowledge for this tutorial. If you understand if-else statements, while and for loops, lists, and dictionaries, you’re set to make the most out of this tutorial. You also need a code editor like Visual Code Studio, PyCharm, or Atom. In addition, while we walk through every line of code so you never feel lost, knowing basic pandas would help. Check out our pandas tutorial if you need a refresher.

Exercise 2 Link: https://www.dataquest.io/blog/regular-expressions-data-scientists/

Please screenshot your results and upload them to this Assignment Link.

information Technology

The procedures in this tutorial will work for all recent versions of Microsoft Word, including Word 2019, Word 2016, and Office 365. There may be some slight differences, but for the most part these versions are similar.