Data mining Discussion#6

 

Financial services are experienced by consumers and businesses. This may be with a checking or savings account, credit cards, loans, and other offerings. With all of these services available, there is a level of financial fraud that occurs. This may be with credit card charges not done by the credit card holder, fake checks, or other issues. In analysis, these would be an anomaly or outlier.

For the discussion question, please choose a form of financial fraud a consumer may experience and an approach or method the bank may to detect this. 

Write C program to encrypt and decrypt a file

 Encryption:

 1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)

 Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.   

kindly bid carefully, i will not revise my budget once assigned

task I

 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Task 2′

Submit a Word document that addresses each of the following:

  • Chapter 10
    • Define and describe business continuity.
    • Define and describe disaster recovery.
    • Discuss pros and cons of cloud-based backup operations.
    • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.
    • Create a DRP for a company with which you are familiar.
  • Chapter 11
    • Define software architecture.
    • Define and describe SOA.
    • Compare and contrast a web page and a web service.
    • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.
    • Discuss what it means for a web service to be interoperable.
  • Chapter 12
    • Discuss key items that should be included in an SLA.
    • Define predictive analytics and discuss how an IT manager might use such analytics.
    • Discuss how an IT manager might use load testing on a site.
    • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.
    • With respect to cloud-based solutions, list and discuss 5 to 10 operations or tasks an IT manager should oversee.
  • Chapter 13
    • List and describe common system requirements one should consider before moving an application to the cloud.
    • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
    • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
    • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.
    • List and describe budget considerations one should evaluate before moving an application to the cloud.
    • List and describe IT governance considerations one should evaluate before moving an application to the cloud.
    • Define and describe cloud bursting.

Discussion Week 1 Strat plan

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

Please make your initial post should have 500 words and the post will do at least TWO of the following:

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Access control discussion 12

Which remote authentication offers the best protection? and why?

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

R Milestone 2

In this milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page. 

Articlee writind

Either draw a graph with the given specifications or explain why no such graph exists:

A tree with twelve vertices and fifteen edges

Notes: 

1. Write or type your work neatly and completely.