Cyber Security Research Paper

Research paper that builds the literature review for your hypotheses(on Cyber security attacks).  This paper should have 20 references(APA Format) and should be 10 or more pages in length. 

Practical Connection

  

Provide a reflection of at least 750 words (or 2.5 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories, and knowledge could be applied to an employment opportunity in your field of study.

Presentation

 In addition to your CLA2 report, please prepare a professional PowerPoint presentation summarizing your findings for CLA2. The presentation will consist of your major findings, analysis, and recommendations in a concise presentation of 15 slides (minimum). You should use content from your CLA2 report as material for your PowerPoint presentation. In addition, you should include learning outcomes from all your major assignments. This would include PA1, CLA1, PA2, and of course, CLA2 (unless otherwise specified by your Professor). An agenda, executive summary, and references slides should also be included. Please keep in mind that the university is moving towards a more digital footprint for our students. This means that your final CLA2 presentation may be recorded, so that you may include it in your “e-portfolio” (graduating students should have all of their CLA2 presentations on a flash-drive, in addition to student biography, resume, interests, etc.) 

Discussion 15

Select from the following list four (4) topics and discuss. Use only 70-words max per topic to discuss and present your answer.  The discussion questions this week are from Chapter’s 19-20  (Jamsa, 2013).

Chapter 19 topics:

  • Define scalability.
  • List five to ten potential relationships that align with the Pareto principle, such as how 80 percent of sales come from 20 percent of customers.
  • Compare and contrast vertical and horizontal scaling.
  • Explain the importance of the database read/write ratio.
  • Assume a site guarantees 99.99 percent uptime. How many minutes per year can the site be down?

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.
  • List and describe five potential uses for intelligent fabric.
  • List and describe five ways the cloud will influence the mobile application market, or vice versa.
  • Discuss the importance of HTML 5.
  • Discuss how the cloud will impact future operating systems.
  • List and describe three potential location-aware applications.
  • List and describe five ways intelligent devices may work together.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions. 

Organizational Analysis Paper

Each student will write 4-5 page paper on an organization of his or her choice. The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font. The organizational analysis will contain the following sections: 

  • Introduction of the organization, including history and background. 
  • Organizational strategy. 
  • Organizational design and your assessment of effectiveness. 
  • Organizational culture. 
  • Conclusion and what you would change about the selected organization for improvement.

At least two (2) sources are required. APA format source less than 5 years old.

Data Mining

Topic: Security, Privacy and Ethics in Data Mining.

In this task, you are required to read the journal articles provided below and write a short discussion paper based on the topic of security, privacy and ethics in data mining. You must:

identify the major security, privacy and ethical implications in data mining;

evaluate how significant these implications are for the business sector; and

support your response with appropriate examples and references (at least 2 additional references should be sought in addition to the ones below).

The recommended word length for this task is 700 to 1000 words.

Journal articles:

Ryoo, J. ‘Big data security problems threaten consumers’ privacy’ (March 23, 2016) theconversation.comhttp://theconversation.com/big-data-security-problems-threaten-consumers-privacy-54798

Tasioulas, J. ‘Big Data, Human Rights and the Ethics of Scientific Research’ (December 1, 2016) abc.net.auhttp://www.abc.net.au/religion/articles/2016/11/30/4584324.htm

Write an essay of at least 500 words analyzing a subject you find in the article attached related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

 

Write an essay of at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested

Datamining Disussion:cluster of objects from a binary transaction data set.

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Please ensure to use APA7 for your references and citations as you support your initial post.

Initial posts are to be 250 words minimum and are due by Thursday.

Replies (2) are 150 words minimum and are due by Sunday.