article

 

Read the attached PDF article entitled, “How Blockchain Technology Can Benefit Marketing: Six Pending Areas Research Areas”.

The six pending research areas mentioned in the article are:

1) Fosters disintermediation

2) Aids in combatting click fraud,

3) Reinforces trust and transparency,

4) Enables enhanced privacy protection,

4) empowers security, and

6) Enables creative loyalty programs.

After reading the article in full, select on of the mentioned six areas of research and write an article reflection minimum 8-9 maximum page paper identifying the following;

1) Describe and provide the overall research area mentioned in the article in a synopsis

2) What did the article state in how Blockchain can benefit that marketing area overall?

3) What further research did the article recommend?

4) What do you think can be the approach to further research the topic? What approach would you recommend to take and what type of research method would make sense?

5) What is an example of a company that you believe would benefit from this type of research and why?

6) Outside of Blockchain, what other piece of marketing technology can help this area?

7) What do you recommend is the best way to approach for a company to implement this area of research into their company?

Paper must be 12Pt. Font, Times New Roman, Double Spaced, with title page and reference page. Minimum of 3 references, to include the article required. The title page and references page do NOT count towards the minimum.

cloud computing

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning one of this week’s topics, e.g. Virtualization, or Securing the Cloud.

Select only scholarly peer reviewed articles and papers.

Must use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier 

URL: https://ucumberlands.libguides.com/security

Hide Details

Assignment

 

  • BITCOIN – In case you have not watched the explanationHide Details

    https://www.khanacademy.org/economics-finance-domain/core-finance/money-and-banking/bitcoin/v/bitcoin-what-is-it

  • ItemReading AssignmentAttached Files:
  • ItemComputing a Digital SignatureWhat is a Digital Signature?

    There are two things that you have to prove when you are signing a document:

    1. Your identity
    2. The integrity of the document
    3. Let us see how we can achieve these two requirements in the digital world. The first thing we are going to do is to guarantee that a document is authentic. I think we have the process to ensure that a document has not changed in transmission or in storage. Hashing the document will produce a hash value that is unique to the document. Using SHA-1, when we hash a document, we’ll compute a 160-bit hash value. This is sometimes called a message digest.

      We now have a message or file, a hash value that can be used to prove the authenticity of the message or file. Now, what we are going to do is encrypt the hash value with the private key of the owner of the document. The document and the encrypted hashed value of the message or file are transmitted.

      The recipient receives the document and the encrypted hash value. Remember, WE ARE NOT WORRIED ABOUT CONFIDENTIALITY HERE. The first thing the recipient does is decrypt the ENCRYPTED HASH VALUE using the public key of the owner of the document. How would we know if the decryption is successful? The recipient computes the SHA-1 (Hash value) of the original message. If the decryption is successful, the computed has value and the decrypted value will be the same. If these values are not the same, there are two possibilities – the public key does not belong to the original sender or the message was changed

      We have just validated the identity of the sender and also the document was not changed

  • ItemTLS/SSLTLS/SSL

    Now I am going to explain how TLS/SSL works.

    The user connects to the secure web site by typing say https://www.chase.com (Links to an external site.).

    There are a TCP SYN exchange and then the CLIENT sends the CLIENT HELLO

    The client sends a client hello message with the protocol version, the client random, and a list of cipher suites.

    The SERVER returns its CIPHER SUITE (details about the security protocols it supports), ITS CERtifiCATE and A SERVER HELLO and a SERVERHELLODONE

    In reply to the client hello message, the server sends a message containing the server’s SSL certificate, the server’s chosen cipher suite, and the “server random,” another random string of bytes that’s generated by the server.

    The client verifies the server’s SSL certificate with the certificate authority that issued it. Remember each browser has a list of CA preinstalled. This confirms that the server is who it says it is, and that the client is interacting with the actual owner of the domain.

    The client sends one more random string of bytes, the “premaster secret.” The premaster secret is encrypted with the public key and can only be decrypted with the private key by the server. (The client gets the public key from the server’s SSL certificate.)

    The server decrypts the premaster secret using its private key

    Both client and server generate session keys from the client random, the server random, and the premaster secret. They should arrive at the same results.

    The client sends a “finished” message that is encrypted with a session key.

    The server sends a “finished” message encrypted with a session key.

    The handshake is completed and now messages can be sent using the session keys.

  • ItemQuantum TheoryQuantum Physics – Here is an interesting quote: “If you think you understand Quantum Physics, you do not understand Quantum Physics” – Richard Feynman – Noble Price Winner in Physics

    Quantum Physics describes the smallest particles in our universe – molecules, atoms and, protons, neutrons and so on. Well, you and everything around you are Quantum Physics.

    In typical computers, we transform data to 0 and 1. This is done using high voltage and low voltage. We then use a series of logic. Remember the AND, OR, NOT, XOR that we discussed earlier. Yes, with theses Logical gates, we can compute and solve complex problems.

    This is excellent however, as we discussed in the section on Complex problems, when we deal with exponential complex problems, traditional computing can become unsolvable because of the time it will take to solve them. Remember, the complexity of RSA – factoring a number into in primes.

    In quantum computing, the basic computational unit is a Qubit. Think of them as our classical bits – o and 1. Qubit are much more powerful than bits. Here is the big kicker – a qubit can be in both zero state and one state at the same time. States of a qubit is represented using “ket 0” and “ket 1” notation its written as |0> and |1> and the basic measured state is just like classical 0 and 1.

    A qubit can be an electron with spin, a photon with polarization, impurity spins, trapped ions, neutral atom, semiconducting circuits. The explanation of these terms is beyond the scope of tis course. You may want to read about them.

    This looks difficult but the main point that we need to keep in mind is that the single qubit at any time can be in a super position of |0> and |1> and “it can be expressed as where a and b are amplitude (proportional to probabilities) of qubit being measured to 0 and 1 respectively and a² + b² =1.” A qubit can be in super position of two states, and once it is measured it will return one of the two states based on the probabilities of each state. Measuring a qubit itself influences the system, measurement of a qubit is similar to a gate which affect the state of the qubit.

    Let’s try two states,  00, 01, 10, 11 but the qubits can be in super position of all for states at the same time. This should be represented as:

    a|00> + b|01> + c|10> + d|11>

    For two qubits, we need 4 probabilities/amplitude (a, b, c, d), if we have three qubits we will need 8. So if we have n qubits, we will need 2^n numbers to represent the overall state of that quantum system. With small increase in the number of qubits, we can create systems which can represent enormous states, and this is dissimilar to classical computers.

    Well, I know this is complex and unfamiliar to you, I am going to leave you with the basics. Now, let’s define Quantum Algorithm.

    Quantum algorithm is a step-by-step procedure, where each of the steps can be performed on a quantum computer and this will involve quantum properties like, superposition and entanglement.

    Two popular algorithms that have been developed already are SHOR’s and Grover’s algorithms.

    SHOR Algorithm – Shor’s algorithm for integer factorization is one of the most famous one because of its implication in cryptography. The details are beyond the scope of this course

    Grover’s algorithm is also well known and used for searching an unstructured database or an unordered list.

    IBM Q is an industry-first initiative to build commercially available universal quantum computers for business and science. IBM Q Experience allows us to run quantum algorithms either using online composer or using its python library for free. The number of qubits in these systems are relatively small but will increase rapidly for sure.

    https://www.ibm.com/quantum-computing/

  • ItemQuantum Videohttps://www.youtube.com/watch?v=u1XXjWr5frE
  • AssignmentFinal Exam – NOTE THE DEADLINEFor the final exam – you are  going to explain the differences between Symmetrical and Asymmetrical encryption in a 10 minutes video. Use your favorite Video Capture software (Screen-Cast-to-Matic) and create a 5-slide powerpoint.
    Rubric
    Correctness of content – 50%
    Presentation – 50%

Discussion

Discussion 4 – What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Internet Exercise 7 – Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Needs to be APA 7 formatted

APA Sources *

*Full PDF *

https://apastyle.apa.org/products/publication-manual-7th-edition-introduction.pdf?_ga=2.183019553.642115030.1600870599-379008561.1600870599

Sample Paper 

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

*APA 6 vs APA 7 *

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_changes_7th_edition.html

DQ

analyze the structure of advanced encryption standards and why it makes it so strong

Digital Marketing Strategies 2020 and Beyond: https://www.youtube.com/watch?v=bGQG_-OG6fs

 

Watch the following videos on Digital Marketing:

Digital Marketing Strategies 2020 and Beyond: https://www.youtube.com/watch?v=bGQG_-OG6fs

Marketing Technology: https://www.youtube.com/watch?v=Q8yGCS0q0dk

After watching the videos, provide a video reflection paper that addresses the following. 

1) What are 3 key aspects of digital marketing in the future the videos highlighted as essential to know?

2) What key digital marketing technique or strategy do you believe is the most interesting and why?

3) What is the overall impact the videos suggest marketing technology has to be able to provide competitive advantage for a company?

4) What are the key fundamentals of marketing technology the video prescribes that all businesses should understand?

Paper should be 4-5 pages, double spaced, in Times New Roman, 12pt font, double spaced. Minimum of video references mentioned. Title page and references page required, but does not count towards minimum. 

Horizontal and Vertical Scaling

Create a paper that compares horizontal and vertical scaling. Be sure to include two situations for each scaling type where that scaling method would be beneficial.

Paper should be clear and detailed with a minimum of 600 words, sources must be cited in APA format and must have clear organization and flow.

Project 9 & 10

  

Project Part 9: Secure Windows Applications Policy

Scenario

One of the security improvements for the Always Fresh IT environment is to ensure all workstations and servers run secure applications. The company needs policies that set security requirements for the software. These policies will guide administrators in developing procedures to ensure all client and server software is as secure as possible.

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application.

Consider the following questions for web server software and web browsers:

1. What functions should this software application provide?

2. What functions should this software application prohibit?

3. What controls are necessary to ensure this applications software operates as intended?

4. What steps are necessary to validate that the software operates as intended?

Tasks

Create two policies—one for webserver software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps.

Use the following as a guide for both policies:

§ Type of application software

§ Description of functions this software should allow

§ Description of functions this software should prohibit

§ Known vulnerabilities associated with software

§ Controls necessary to ensure compliance with desired functionality

§ Method to assess security control effectiveness

Project Part 10: Evidence Collection Policy

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

web dev

Based on the feedback from your earlier assignment, make any changes necessary. You will continue to work on your site, adding the following elements:

  • Add any other pages to your site and adjust the navigational scheme
  • Use of CSS including:
    • An element selector
    • A class selector
    • An ID selector
    • A pseudo-class selector (try this on your hyperlinks!)
    • Use of float and clear around an image
    • Text-align
  • A form that includes a minimum of:
    • Five text fields
    • One text area field
    • The use of checkboxes
    • Radio buttons
    • A select field (either a list or a drop-down menu)
    • A Submit button
    • Optional use of an image button
    • The use of alert message on one page

Now that you have begun to write your pages in HTML, please add the following to a comment in the of your work: