Discussion (course – Bussiness Continuation Plan & Disaster Recovery Plan )

 

The discussion posts for this course are in two parts, the Initial Post and the Reply Post.

Initial Post: Compose and submit well-written paragraphs that contain a minimum of 200 words, which address the following: 

A. Research and select an organization that effectively implement the disaster recovery and business continuity plan. Identify the list of activities involved in the process and highlight the significance of this plan to the organization.

B. Discuss the Business Impact Analysis in Disaster Recovery and Business Continuity Plan

The post should include adequate citations and references that adhere strictly to the APA format.

PLEC Week 2

 Answer Each question in 2-3 lines with in line satiations 

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

EH week8 DB

Hello,

i need this paper by 10/14 afternoon.

Strictly No plagiarism please use your own words.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

300 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Research

 

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

emerging threats and counter measures

 

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Digital Forensics Tools and Tech – New England

 

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Security as a Service

 Discuss  400 words or more discuss why Security as a Service is a good investment.

 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

Information Technology (IT) Industry Analysis 2-3 page Paper

Information Technology (IT) Industry Analysis

The IT industry is always evolving and IT plays a very important role in business. Several of the technology companies that have dominated IT are Fortune 500 and even Fortune Global 500 organizations bringing in billions of dollars in revenue. Companies like IBM and HP started as hardware vendors, but now have ventured into software, and other areas of IT. Their contributions have shaped the IT industry. 

For this assignment, you will choose one of the IT industry leaders discussed in the Week One Lecture and create an analysis of that company. Include the following elements in your analysis supporting your statements using the required sources for this assignment. **I CHOSE MICROSOFT**

Explain how the organization started in the IT industry.

Explain the current state of the organization.

Evaluate the impact the technology organization you chose has had on business and/or business operations.

Analyze the role of IT in the chosen business and describe the innovations the organization has launched. Explain the reasons the innovations were either successes or failures for the company.

The IT Industry Analysis paper

Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).

Must include a separate title page with the following:

Title of paper

Student’s name

Course name and number

Instructor’s name

Date submitted

Must use at least one credible source in addition to the course text.

Must document all sources in APA style.

Must include a separate references page that is formatted according to APA style 

Data Mining for COVID

This is for Course Data Mining and Please write about

2 Pages for Data Analyzing/Analytics using Data Mining techniques for COVID in USA

1 Page for Data Analyzing/Analytics using Data Mining techniques for COVID in Europe

1 Page for Data Analyzing/Analytics using Data Mining techniques for COVID in China and South Korea

Please include diagrams/graphs where possible.  

Assignments

Case Study C – NationState Insurance

Case Study Project C – Be sure to address each question in the Case study, and explain your rationale thoroughly. Be sure you saved your file with your full name, and title of this project. Example: 

Details: You will be given a case study to solve from the textbook. While your responses will vary, properly documenting your response from valid resources is a requirement. This assignment requires you to use proper citations and references from the textbook and alternate sources. Thoughtful opinions/research based on the literature, and from the textbook are necessary, so be sure to review the chapter prior to completing these activities. This task is like a research paper, so please take your time when preparing your responses. Separating each case study with a title and proper formatting is essential so that I can read and follow your paper. A one (1) page response is NOT – NOT going to earn you maximum points. The Case Study response will be submitted on the assigned due date from the past weeks (see submission due dates and rubric). The Dropbox will close after the due date and late submission will not be accepted. Case study projects are NOT posted on the discussion board, they are submitted as an assignment. 

Reading Required : 

Nationstate Insurance –   Case Study C

Chapter 17,   “Application Portfolio Management”

Chapter 18, “Microsoft   Windows and the Security Life Cycle”

Chapter 19, “Best   Practices for Microsoft Windows and Application Security”

————————————————————————————————————————————————————————————————————————————————————————————————————

Discussion 6 & Discussion 7 

     

Required Readings 

Chapter 17,   “Application Portfolio Management”   – Discussion 6 

Chapter 21,   “Information Delivery: IT’s Evolving Role” — Discussion 7