for PHD Doctorate

 Q3. In this exercise you’ll use R package tidyverse (see chapter 4 of Introduction to Data Science Data Analysis and Prediction Algorithms with R by Rafael A. Irizarry. You need to go through chapter 4 before attempting the following questions. Using dplyr functions (i.e., filter, mutate ,select, summarise, group_by etc. ) and “murder” dataset (available in dslab R package) and write appropriate R syntax to answer the followings: a. Calculate regional total murder excluding OH, AL, and AZ (Hint: filter(! abb %in% x) # here x is the exclusion vector) b. Display the regional population and regional murder numbers. c. How many states are there in each region? (Hint: n ()) d. What is Ohio’s murder rank in the Northern Central Region (Hint: use rank(), row_number()) e. How many states have murder number greater than its regional average (Hint: nrow() ) f. Display 2 least populated states in each region (Hint: slice_min() ) Use pipe %>% operator for all the queries. Show all the output results 

Discussion 3

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

paper 12

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

map reduction

You are supposed to do online research and find out one case study where MapReduce was used to solve a particular problem. I am expecting 4-5 page write-up. Please provide as much technical details as possible about solution through MapReduce. 

I am expecting maximum one page for business problem and 3 pages of technical solution. I want everyone to do research and provide their own write-up. I am not looking for copy-paste from some website. If I found out that it is copy-paste from some website then you will get ‘F’ grade in the course.

There are so many examples where MapReduce has solved complex business problems. Please use power point or Visio to draw technical diagrams to explain the solution. You have seen technical diagrams in our lectures throughout this class.

Create data visualization

For this project, you are going to become an educational advisor for a fictional educational institution.  The Vice President of Instruction of the institution has provided you with the raw data of the assessment scores of their students’ final exam in their GED Preparation Course.  The course consists of scores in mathematics and English and Pass or Fail Overall Score.  There is also information in regard to the demographics of the students.

Based on the raw data that you have been provided, you are going to develop a   presentation using visuals of the data that have been provided.  You are going to make recommendations to the Vice President of Instruction of the University of suggested improvements that can be made based on your analysis of the data that has been provided to you.

Within   your data presentation include:

A   variety of graphics that illustrate the represented data

An   explanation of what each graphic represents

Explain   how the graphics should be interpreted (include a key)

Finally,   summarize your analyzation of the data and provide the VP with some suggestions to improve the quality of instruction within the school.  Refer to your visuals within your summary.

For this assignment, you can use any method that you want to use.  Some students use Microsoft Word, some students have used Powerpoints.  

Please make sure that you look at the example that is also attached!!

Select one network scanning software tool and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up.

 Select one network scanning software tool (there is a list in your required reading slides, you can find the slides in attachments. ) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Please write 350 words essay.

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.

 

OVERVIEW

This week we will be examining the range of industries in which sensitive, protected, or confidential data is copied, viewed, shared, stolen, altered or blocked.

Cyber Foundations

 

Application Assignment 2 – Krebs on Security

This application assignment involves investigating two recent cybersecurity topics/events covered on the website KrebsOnSecurity.comKrebsOnSecurity.com presents the latest news and investigative reports on cybersecurity. This site is managed by Mr. Brian Krebs, who worked as a reporter for The Washington Post from 1995 to 2009 authoring over 1,000 blog posts for the Security Fix blog and well over 200 articles for The Washington Post newspaper and washingtonpost.com. 
Select two articles from the Website–one that details an information security concern and one that explains a new cybersecurity skill or knowledge.  The articles must have been published in the last six months.  For each of the two articles, you will then go find another article on the same topic from outside the KrebsOnSecurity.com site.  Referencing both articles (e.g., the one from Krebs and the one from somewhere else), your job is to provide a summary of the topic–largely in your own words–explaining how you as a cybersecurity professional would use/apply the information.  Limit your writeups to no more than one page for each of the two topics.  When complete, submit your two writeups as a single Word document via the submission functionality.
To summarize, this assignment involves identifying two articles from KrebsOnSecurity.com–one related to an information security concern and one related to a new security skill or knowledge base.  For each of the two articles, find one other article about the topic from somewhere else, providing you with two perspectives on the same topic.  Then, for each of the two topics you identified, write up a one page summary that incorporates information from both articles (the Krebs one and the non-Krebs one) you found.  Submit the separate writeups via a single, two-page document that clearly delineates between the two different writeups.  
 

3 questions

  

1) What are some of the industry standard certifications that exists.  Which ones are the most sought after in the IT security field? 350 words.

2) Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 300 words

3) Securing IoT Devices: What are the Challenges? 1000 words

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.