want an essay to complete within 3 hours ?

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Network Forensics-1

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. 

The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

1) What types of network investigations are typical of those that fall under the topic of network forensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

· No Plagiarism 

· Each Answer Should be 400 words without References.

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

Operational excellence assignment week 7

 

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).  Reflect on the various challenges are present in the digital era.  Will things get better or more complicated as times goes on?  Explain.  What are some methods to assimilate new generations into the workforce to think about competitive advantage?

The above submission should be one -page in length and adhere to APA formatting standards.

**Remember the APA cover page and the references (if required) do not count towards the page length**

week 6

 

This week’s journal article focuses on attribution theory and how it  influences the implementation of innovation technologies. Two types of  employee attributions are noted in the article (intentionality and  deceptive intentionality), please review these concepts and answer the  following questions:

Provide a high-level overview/ summary of the case study

Note how constructive intentionality impacts innovation implementations

Find another article that adds to the overall findings of the case  and note how attribution-based perspective enhances successful  innovation implementations. Please be explicit and detailed in answering  this question.

Be sure to use the UC Library for scholarly research. Google Scholar  is also a great source for research. Please be sure that journal  articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

week 6

minimum 500 words 

Blockchain Technology

What are the implications for Basic Attention Token” (BAT) and Blockstack relative to global marketing?

Encryption Methodologies to Protect an Organization’s Data Paper

 

Assignment Content

  1. Companies are susceptible to losing customer data to cyber-attackers and human errors, so organizations must properly protect their data and network. 

    In this assignment, you will create an Encryption Policy for CIO review. Use the organization you chose in the discussion Classifying an Organization’s Sensitive Data.

    Write a 2- to 2½-page policy, and ensure you:

    • List the organization’s sensitive data that must be protected.
    • Complete a matrix that compares the asymmetric and symmetric encryption methodologies (PKI, TLS, SSL) for protecting data within the network.
    • Describe at least 2 primary threats that could compromise the organization’s data.
    • Describe how the encryption methodologies thats hould be implemented to protect the organization’s sensitive data.
    • Format your citations according to APA guidelines.

re: questions

1. Explain and describe 5 data cleansing techniques involved in data transformation during the data visualization projects. 500 words

2.  What is the difference between discrete and continuous variables? 100 words

3. There are many data collection processes or methods involved in a data visualization project.  Identify five and explain in no more than a paragraph.100 words

4.  Why assessing the data type and size are critical when examining the data during a data visualization project?100 words

5. Date values could be erroneous.  Explain  some common errors you may see with bad date values100 words

6. A common statistical approach to data visualization is univariate.  Explain. 100 words

Business Intelligence week 3

Discussion: I have attached the pdf question which has all the details for discussion

Knowledge and skills paper: Attached the question image.

Please refer to attachments and let me know if u have any questions

Discussion

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Why are firewalls so important within an IT environment? What are the different firewalls and are all types still in use today?

List three network threats and list the IT infrastructure domain that the threat may harm. Why/How does those threats harm that particular domain?