discuss some key terms in business.

Discussion: This week we discuss some key terms in business.  Please define what a business process is and note the tools of documentation within business processes and why they are important to understand.

Note: The first post should be made by Wednesday 11:59 p.m., EST. 

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

Use Sage to solve the following problems.

Use Sage to solve the following problems. 

For this questions assume that we are using dsa with domain parameters:

p = 7,877,914,592,603,328,881

q = 44449

g = 2,860,021,798,868,462,661

Use these domain parameters to determine if the signatures are valid in parts (a)-(c)

  1. public key y = 3798043471854149631, hash value H = 59367, and signature (r,s) = (31019, 4047)
  2. public key y = 1829820126190370021, hash value H = 77241, and signature (r,s) = (24646, 43556)
  3. public key y = 4519088706115097514, hash value H = 48302, and signature (r,s) = (36283, 32514)

Perform a signing operation for the below parts (a)-(b)

  1. private key x = 8146, hash value H = 22655
  2. private key x = 1548, hash value H = 32782

Discussion

 

At the end of chapter 8,  case studies and examples are presented about actual exploited risks. Choose Critical Infrastructure case studies and describe the risk that was exploited.  Also,  tell how you think that exploit could be avoided using proper technology and security policies.  

Your main post needs to be at least 300 words long 

Project Assignment:

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • Why are organizations interested in fostering good business ethics?
  • What approach can you take to ensure ethical decision making?
  • What trends have increased the risk of using information technology in an unethical manner?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

essay- Cloud Computing

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Data Storage in the Cloud, Cloud Storage Device Mechanisms, or Collaboration in the Cloud.

You may choose to review only scholarly peer reviewed articles and papers.

Use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier 

URL: https://ucumberlands.libguides.com/security

Data Science

How do you reconcile the “learning and experimentation” model of development-test-measure with developing relevant for on-time digital personalization?

Discussion (Chapter 4):

What are the privacy issues with data mining? Do you think they are substantiated?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.

Data Mining

Write one page on how data mining helps to gain competitive advantage for businesses. Include at least 2 references and in-text citation.

Programming

Explain all the folders that would be present when creating a game application in Python.