Week

Association Analysis: Advanced Concepts

Cluster Analysis: Basic Concepts and Algorithms

Please pick a concept from above and   Explain why it was selected and note the various importance to data analytics.

BE JAA3

Summary:

Pick one of the following terms for your research: Integrity, ethical dilemma, conflict of interest, bribery, or fraud.

Instructions

Journal Article Summary & Discussion:

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words-this should be in the 150-200-word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected weekly reading assignment Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Emerging Threats and Countermeasures

Attached is the textbook for the below questions. 

1 full Page at least for each question

1. You are to discuss techniques for analyzing analytics tools such as RapidMiner, R Studio, or Python. R is the most popular overall tool among data miners, although Python usage is growing faster.

RapidMiner continues to be most popular suite for data mining/data science. RapidMiner is a data science software platform developed by the company of the same name that provides an integrated environment for data preparation, machine learning, deep learning, text mining and predictive analytics.

Discuss the techniques for analyzing analytics tools. Provide an example.

2. Each part of the technology infrastructure should be assessed for its risk profile. From that assessment, a determination should be made to effectively and efficiently allocate the organization’s time and money toward achieving the most appropriate and best employed overall security policies.  Do you agree or agree?

Discussion

Given the vast amount of known threat indicators and level of network activity today, automation has become a necessity. It’s often difficult and time consuming for human analysts to efficiently manage large amounts of granular data and a wide range of cognitive biases. Therefore, manual threat correlation is often too slow to keep up with the amount of data generated, results include a high number of false negatives and positives, and outputs are not always reproducible.

However, performing manual threat correlation processes will remain crucial. The human brain’s ability to leverage well-formed biases and perform higher-order reasoning is essential for assessing the validity and value being provided by whatever solutions your organization uses as well as building your cyber threat management team’s knowledge base. Thus, even when automated methods are employed, the final tier of analysis typically uses these human abilities for sense-making before any actions are taken.

Conduct your own research and discuss with the group the following:

  • Field Techniques of Comparison? 
  • Rules for Based Matching?
  • What is Fuzzy Matching?

Bonus point

How threat actors can evade detection via threat correlation ?

To post in the discussion board you must do the following:

1) Using APA format create a new thread. Use guidelines indicated above to help you write your post, 

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. 

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

References:

Reid, R.D., and Sanders, N. (2016). Operations management. 6th ed. Wiley.  ISBN: 978-1118

CYS-13-D

If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 300 words

Questions

         

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?