Discussion

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

Team managment dis 5

 

Discussion Conflict with Teams and Individual Creativity

Part One: Conflict

List and briefly define the three types of team conflict discussed in the textbook. Chapter 8 in my text. 

Describe a conflict from your work team (What type was it?  What was it about?  How was it resolved?) 

Part Two: Creativity

List and define the three creativity measurements from the textbook. 

How can team conflict lead to team creativity?  

Need 350 word content along with references.

Facial Expression Recognition

Write a final paper on Facial Expression Recognition with including these topics.

Introduction

History

Types of comparisons in Facial Recognition

Components of Face Recognition

How Face Recognition Works

Face Recognition Techniques

Popular Face Recognition Algorithms

Databases

Advantages and Disadvantages

Sample of Devices

Conclusions

DAta mining week 8 assignment

Imagine a Clustering problem where the educational researchers would like to find clusters of students (group of students) who have similar correlation patterns when it comes to correlation of their GPA vs Income of their parents. And you are hired as the Data Scientist to do this job. 

What kind of Objective Function would you design?

Why?

Please use your own reasoning and explain in details.

Conclusion on Cloud Computing Implementation in United Health Group

 Conclusion on Cloud Computing Implementation in United Health Group and challenges before implementation.

Just the conclusion is needed.

 

The paper must adhere to APA guidelines including Title and Reference pages.

Use the Academic Writer Tutorial: Basics of Seventh Edition APA Style website to learn more about APA style.

  • References should be 2016 or later.
  • Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.

Only single page is requried

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

digital forensic-week-4-D

Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay describing that case and how it relates to this topic.(300 words)

Link: https://www.youtube.com/watch?v=DAfjiGgiVzA

Discussion- 500 words(APA FORMAT AND CITATIONS)

  Select an article from the Journal of Management Information Systems .  Post a summary of the theory, research design, analysis, and conclusions regarding the article you selected.  You must pick a different article than others in the class has used in previous weeks.