Data Security Assignment

 Write an essay of at least 450 words discussing discussing IAM in a federated cloud application. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Python Porgramming List Comprehension

 

Convert the following from a list comprehension to a non-comprehension, i.e. regular Python code.

Hint: Use 2 nested for loops

x1 = [1,2]
x2 = [3,4]

print("B:", [(x, y) for x in x1 for y in x2])
Output:
B: [(1, 3), (1, 4), (2, 3), (2, 4)]

Physical security- failed

 Physical security Failed – 5 pages APA format – No plagarism

 

For this Homework Assignment:

Search the Internet for an article where physical security failed:

  • Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
  • Submit at least 5 full pages double spaced (not including your required cover page, reference pages, abstract, or table of contents)
  • No photos or graphs
  • Reference all sources used
  • Your paper must be APA formatted (including a separate cover page and reference page) 
  • Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section

research paper

 

While this weeks topic highlighted the uncertainty of Big Data. Pick one of the following for your Research paper.:

  • 1.Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.
  • 2.The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • 3.New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.
  • 4.More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.
  • 5.Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to    tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

InfoTech in a Global Economy

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Organizations have problems patching vulnerabilities

Question A

  • What are some of the reasons why organizations have problems patching vulnerabilities

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.

500 words 

APA format

IT-project management QN5b

 

Provide a MS Windows troubleshooting example from your experience. 

  • Explain the situation.
  • Explain what made the troubleshooting of the problem so difficult.
  • Explain step-by-step how you solve the problem.
  • What would you have done differently now that you are becoming more informed about MS Windows and troubleshooting?

cloud computing

 

Discuss  500 words or more discuss why Security as a Service is a good investment.

Use at least three sources.  Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.